IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Sunday, 27 August


Dip update 67/n wherestheflux

[Orig: Aug 26, 2017]
Hi everyone,
Below is the light curve as of ~12 hours ago.  This graph does not show data taken last night at OGG because LCO data transferring/processing has been sluggish over the past 48 hours (also the reason there was no update yesterday).   
Have a great weekend!


Superconference Interview: Alan Yates Hackaday

In 2015, virtual reality was the future, which means we should all have it right now. One of the most technologically impressive VR sets is the HTC Vive, an amazing piece of kit thats jam-packed with sensors and has some really cool tech going on inside it.

One of the developers of the HTC Vive and the ever-important Lighthouse position sensors is [Alan Yates]. Hes of Valve and gave a talk at last years Superconference on Why the Lighthouse Cant Work. Being able to determine the absolute position of the Valves headset is hard, but absolutely necessary for VR. Anything else would be an incomplete VR experience at best, and give you nausea at worst.

We sat down with [Alan] after his talk last year, and now that interview is up. You can check that out below.

For the last few years, [Alan] has been working on VR at Valve. Virtual reality has a very specific set of problems that must be solved before the technology works, and the most important of these problems is turning a computer-generated world into something your brain thinks is real. This means precise position sensing which the Vive is solving with the Lighthouse. The Lighthouse is a set of boxes that emit infrared to be picked up by the headset. Its an elegant solution, but one that requires pushing the boundaries of current tech.

Dissecting the Lighthouse means a deep dive into the world of opamps and encoders stuff we all enjoy here at Hackaday. [Alan]s talk was one of the best at last years Superconference, and this years tickets are still available. If this is the kind of stuff that tickles an engineering nerve, make a plan to attend the Superconference in Pasadena, California on November 11th and 12th.

Filed under: cons, Interviews


Seasonal Cycling in Hadza Microbiomes SoylentNews

Scientists have studied the Hadza community in Tanzania and found that their microbiomes change based on the season and foods eaten:

In Tanzania, not far from the Serengeti, live the Hadza, a community of about 1,300 people. For such a small group, they attract a lot of scientific attention.

Many of the Hadza live solely on the animals they kill, along with honey, berries and a few other wild foods. For the first 95 percent of our species's history, there was no other way to live.

So the Hadza have been closely scrutinized for clues about the hunter-gather way of life: how they find their food, how much energy they use even how much sleep they get.

On Thursday, scientists described another way in which the Hadza are exceptional. Their gut microbiome the bacteria that live in their intestines swings through a predictable annual cycle.

Some bacterial species disappear entirely and then return, in a rhythm that likely reflects regular changes in the Hadza diet. Many gut bacteria that wax and wane drastically are rare in people living in industrialized societies.

Also at Science Magazine and NPR.

Seasonal cycling in the gut microbiome of the Hadza hunter-gatherers of Tanzania (open, DOI: 10.1126/science.aan4834) (DX)

Original Submission

Read more of this story at SoylentNews.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Saturday, 26 August


NVIDIA Rolls Out Jetson TX1 Developer Board SE At $199 USD Phoronix

For those looking for a very capable ARM developer board but have previously been put off by the Jetson TX1 at $579 USD, they now have a $199 developer board...


Compact Video Data Random Thoughts

Im thinking about watching a buttload of older films perhaps all from the 40s? Im not sure. In any case, Ive started poking around to see whats available, and I stumbled onto a 50 musicals box set for $7 (used), which made me so curious I just had to get it.

And it arrived today:

Its about as thick as two normal DVD covers



Using Artificial Intelligence To Make Beer Better Lifeboat News: The Blog

Rob McInerney, the founder & CEO of Intelligent Layer and co-founder of IntelligentX Brewing Company, explains the use of artificial intelligence in improving everyday products.

We wanted to see if in the future the most effective brands are the ones that talk to their customers not to make better advertising but to share ideas. We thought that theyd use artificial intelligence to help real people and brands talk to each other and we wanted to prove this in an industry which people have very strong views on and that which we had a pretty significant interest in as well Beer So we created intelligent X the worlds first beer brewed by artificial intelligence.


System76's Pop!_OS Not Using Wayland By Default, Figuring Out Default Apps Phoronix

System76 continues working on their Ubuntu fork called Pop!_OS that they intend to ship on their future laptops and desktops. They have now decided on some of the default applications as well as the decision to not yet ship Wayland by default...


Ubuntu 17.10 Enters The Feature Freeze Phoronix

Ubuntu 17.10, the Artful Aardvark, has crossed into the feature freeze this week...


How to Make Video Games 22 New Think Tank

Use arrays to keep Ms. Pac-Man in the maze, modeling a game board in an array, turning ghosts blue, animating ghosts, accessing game object scripts in code


Haiku Made Progress On Btrfs Support This Summer Phoronix

One of the Google Summer of Code projects this summer for the BeOS-inspired Haiku operating system was on porting the Btrfs file-system...


Health Insurer Aetna Accidentally Exposes Customers' HIV Statuses With Transparent Envelope Windows SoylentNews

A health insurer has accidentally exposed the HIV status of some customers with letters that can be partially read through a clear piece of plastic:

Health insurance company Aetna "stunned" some of its customers last month when it accidentally made their HIV statuses visible from the outside of envelopes, two legal groups said Thursday. The letters, which contained information about changes in pharmacy benefits and access to HIV medications, were sent to about 12,000 customers across multiple states, Aetna confirmed in a statement.

For some of these customers, a plastic window on the envelope exposed not only the patient's name and address, but also a reference to filling prescriptions for HIV medications. This meant that whoever picked up the mail that day a family member, a friend, a postal worker would have been able to see the confidential information, according to the Legal Action Center and the AIDS Law Project of Pennsylvania. It is not known exactly how many customers were affected.

Attorneys from both legal groups wrote to Aetna on Thursday demanding that the company immediately stop sending customers mail that "illegally discloses that they are taking HIV medication." It also demanded that the insurer take necessary measures to make sure such a breach doesn't happen again.

The legal groups wrote on behalf of Aetna customers in Arizona, California, Georgia, Illinois, New Jersey, New York, Ohio, Pennsylvania and the District of Columbia, according to their letter. The attorneys have so far received 23 complaints regarding the misstep, and more continue to come in, CNN reported.

The Legal Action Center and the AIDS Law Project of Pennsylvania provided this image of a Brooklyn, NY customer's letter, attached to their demand letter (PDF). The text reads: "Dear [REDACTED], The purpose of this letter is to advise you of options [...] Aetna health plan when filing prescriptions for HIV Medic [...] members can use a retail pharmacy or a mail order pharma".

Also at BBC, NPR, and STAT News.

Original Submission

Read more o...


Sticklyst Shows How KDE Frameworks Can Be Used On The Web Phoronix

Qt/KDE developer Daniel Nicoletti has written "Sticklyst" to show how KDE Frameworks 5 code can be used to construct web sites/applications...


Raspberry Pi Is The Brains Behind Automated Greenhouse Hackaday

[Asa Wilson] and his wife picked up a 10x12 greenhouse from Harbor Freight that for their location required some serious changes, understandable since theyre in Colorado on the western slope of Pikes Peak where the winds are strong and the normal growing season is short. After assembling it on a concrete footing and adding some steel bracing, they got to work on adding an environment management system based around a Raspberry Pi. Read on for a look at the modifications they made.

Fan controller ...


Darkwood Creators Share Game on The Pirate Bay, For Those Who Cant Pay TorrentFreak

Online piracy is an issue that affects many industries, and indie game development is certainly no exception.

While some developers see piracy as an evil that needs to be rooted out as soon as possible, others are more open to the motivations behind it.

The average game fan may not have the financial means to try out all the new titles that come out every month, for example. While these people are not by any means entitled to a free copy, sometimes the human element resonates with developers.

Acid Wizard Studio, the three college friends from Poland behind the horror game Darkwood, started thinking about this when they recently received an email from a desperate young fan.

The person in question wasnt a pirate. However, he did request a refund because he was worried that his parents would not like the extra spending.

When we read the explanation from someone who wrote that he needed the refund because he didnt want his parents to be stressed out when seeing the bill at the end of the month well, it made us feel quite bad, they explain on Imgur.

Acid Wizard Studio

The developers realized that this person wasnt alone. Many people had already pirated the game, often for a similar reason, while others use unauthorized key reselling platforms.

How they decided to respond is quite unique though. They uploaded a free copy on The Pirate Bay.

Theres no catch, no added pirate hats for characters or anything like that.

Below is a copy of the official torrent on The Pirate Bay. Just a few hours after the upload it has gained the attention of thousands of people, who are happily sharing it with others.

The official Darkwood torrent

The developers stress that anyone is welcome to grab a free copy. That said, they encourage people who like it and have the means, to buy it later. In any case, people should stay away from key sharing sites, referring to them as the cancer of t...


Who are you? How the story of human origins is being rewritten Lifeboat News: The Blog

Think again, because over the past 15 years, almost every part of our story, every assumption about who our ancestors were and where we came from, has been called into question. The new insights have some unsettling implications for how long we have walked the earth, and even who we really are.

The past 15 years have called into question every assumption about who we are and where we came from. Turns out our evolution is more baffling than we thought.

By Colin Barras

WHO do you think you are? A modern human, descended from a long line of Homo sapiens? A distant relative of those great adventure-seekers who marched out of the cradle of humanity, in Africa, 60,000 years ago? Do you believe that human brains have been getting steadily bigger for millions of years, culminating in the extraordinary machine between your ears?


Babylonian Tablet May Contain Oldest Evidence of Trigonometry SoylentNews

A reexamination of a Babylonian tablet has found what may be the first appearance of trigonometry:

Consisting of four columns and 15 rows of numbers inscribed in cuneiform, the famous P322 tablet was discovered in the early 1900s in what is now southern Iraq by archaeologist, antiquities dealer, and diplomat Edgar Banks, the inspiration for the fictional character Indiana Jones.

Now stored at Columbia University, the tablet first garnered attention in the 1940s, when historians recognized that its cuneiform inscriptions contain a series of numbers echoing the Pythagorean theorem, which explains the relationship of the lengths of the sides of a right triangle. (The theorem: The square of the hypotenuse equals the sum of the square of the other two sides.) But why ancient scribes generated and sorted these numbers in the first place has been debated for decades.

Mathematician Daniel Mansfield of the University of New South Wales (UNSW) in Sydney was developing a course for high school math teachers in Australia when he came across an image of P322. Intrigued, he teamed up with UNSW mathematician Norman Wildberger to study it. "It took me 2 years of looking at this [tablet] and saying 'I'm sure it's trig, I'm sure it's trig, but how?'" Mansfield says. The familiar sines, cosines, and angles used by Greek astronomers and modern-day high schoolers were completely missing. Instead, each entry includes information on two sides of a right triangle: the ratio of the short side to the long side and the ratio of the short side to the diagonal, or hypotenuse.

Mansfield realized that the information he needed was in missing pieces of P322 that had been reconstructed by other researchers. "Those two ratios from the reconstruction really made P322 into a clean and easy-to-use trigonometric table," he says. He and Wildberger concluded that the Babylonians expressed trigonometry in terms of exact ratios of the lengths of the sides of right triangles [open, DOI: 10.1016/] [DX], rather than by angles, using their base 60 form of mathematics, they report today in Historia Mathematica. "This is a whole different way of looking at trigonometry," Mansfield says. "We prefer sines and cosines ... but we have to really get outside our own culture to see from their perspective to be able to understand it."

Also at the University of New South Wales.



Next Land War in Asia May Be in Bhutan SoylentNews

The US and North Korea are not the only ones ratcheting up tensions in the Orient. From Japan-Forward[1]:

The armies of India and China are locked in a standoff over the strategic Doklam plateau, an area inside the sovereign territory of Bhutan. Under the purview of the Indian-Bhutan Friendship Treaty, signed in New Delhi in February 2007, the tiny kingdom called in for Indian help after the Peoples Liberation Army (PLA) moved in under orders from Beijing.

Asserting dubious claims and then engaging in bullying and revisionism to get its waythis is now becoming an oft-repeated Chinese pattern we have all seen before.Indeed, in the offensive launched in June 2017 in the Doklam plateauwhich China now claims is a traditional pasture for Tibetans (ignoring completely the fact that China predicates the claim in Doklam upon its equally untenable claim over Tibet)China attempted to build a road near the critical tri-junction border area among China, India, and Bhutan. This area is vital to Indias security.

In the specific case of Doklam, there is a fascinating twist to the tale. China did not foresee Indias tenacious military resistance and political fortitude in response to the PLAs Doklam encroachment. Unlike the Scarborough Shoal, where Filipino forces quit without a fight, India appears very unlikely to withdraw its troops unilaterally from the Doklam border area, and is standing up to China.

China and India are the first and second largest world militaries, perhaps it would be wise to heed the sage advice.
[1]:Japan-Forward is the English-language publication of the Sankei Shimbun, a large Japanese newspaper with an open Nationalist slant.

Original Submission

Read more of this story at SoylentNews.


Cluephone for Partiers Hackaday

[Sam Horne] adapted an old school landline phone to deliver clues to birthday party guests. When guests find a numerical clue, they type it into the keypad to hear  the next clue, which involves decoding some Morse code.

The phone consists of an Arduino Pro Mini, a MP3/WAV trigger, and the phone itself, of which the earpiece and keypad have been reused. [Sam] had to map out the keypad and solder leads connecting the various contact points of the phones PCB to the Arduinos digital pins. He used a digitally-generated voice to generate the audio files, and employed the Keypad and Password Arduino libraries to deliver the audio clues.

This seems like a great project to do for a party of any age of attendee, though the keying speed is quick. Hopefully [Sam]s guests have a high Morse WPM or are quick with the pen! For more keypad projects check out this custom shortcut keyboard and printing a flexible keyboard.

Filed under: Arduino Hacks


Cisco IOS vulnerabilities open Rockwell Industrial Switches to attacks Security Affairs

Vulnerabilities in Cisco IOS expose Rockwell Allen-Bradley Stratix and ArmorStratix industrial Ethernet switches to remote attacks.

Some models of the Allen-Bradley Stratix and ArmorStratix industrial Ethernet switches are exposed to remote attacks due to security flaws in Ciscos IOS software.

According to the security alert issued by ICS-CERT, an authenticated remote attacker can exploit the flaws to execute code on an affected system or to trigger a DoS condition and consequent reload of the device.

Successful exploitation of these vulnerabilities could allow an authenticated, remote attacker to execute code on an affected system or cause an affected system to crash and reload. states the ICS-CERT.

Critical Infrastructure of any sectors worldwide is impacted, including Critical Manufacturing, Energy, and Water and Wastewater Systems.

Critical infrastructure relies on Ciscos IOS software for secure integration with enterprise networks, this implies that Cisco IOS flaws can also affect Rockwell Automation products.

Rockwell Automation promptly informed customers of the high severity vulnerabilities in Cisco IOS and IOS XE. Nine flaws affect the versions 1, 2c and 3 of Simple Network Management Protocol (SNMP) subsystem.

The tech giant publicly disclosed the vulnerability on June 29 and provided workarounds, not it is notifying customers about the availability of security patches.

The nine issues, that have been tracked with codes from CVE-2017-6736 to CVE-2017-6744, were all patched by the company. All the flaws could be exploited by a remote unauthenticated attacker by sending specially crafted SNMP packets, resulting in arbitrary code execution or causing the system to reload.

The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. states the advisory published by CISCO in June.

As reported by the advisory, an authenticated attacker who knows the SNMP read-only community string of a target system could remotely execute code or cause the device to reload by sending a specially crafted SNMP packet via IPv4 or IPv6.



Temperatures Plunge after Technical fix Terra Forming Terra

Fortunately this has not gone on for years and it got caught early and was then fixed.  What were they thinking?  This is not data for which an artificial floor is inconsequential.  It could even be dangerous in the wrong place as anyone who has experienced minus sixty is well aware.  The margins become real narrow there.

It is really odd considering just how controversial real measurements have become with heat island effects.

Yet it does remind us that we are vulnerable to real error at the programing level conducted by non specialists in most cases in most fields.

Date: 04/08/17 

Graham Lloyd, The Australian 

Recorded temperatures at the Bureau of Meteorologys Thredbo Top automatic weather station have dropped below -10C in the past week, after action was taken to make the facility fit for purpose.

A record of the Thredbo Top station for 3am on Wednesday shows a temperature reading of -10.6C. This compares with the BoMs monthly highlights for June and July, both showing a low of -9.6C.

The BoM said it had taken immediate action to replace the Thredbo station after concerns were raised that very low temperatures were not making it onto the official record. Controversy...


Russia GMO-Free - Prepares To Become Top Producer of Organic Food Terra Forming Terra

We are building up for catastrophic blow back on the whole agribusiness model in which roundup in particular is used.  It will be triggered by epidemic levels of unnecessary autism effectively disabling huge numbers of the population.  Now i do know also that the problem will be treated successfully but not by actually curing it.

Thus Russia will lead the whole movement and gain wonderfully in reputation.

U.S. Media Silent As Putin Declares Russia GMO-Free As They Prepare To Become Top Producer of Organic Food

Most of you know that Russian President Putin has Russia saying not yet to GMOs and asserting their national focus on establishing themselves as the worlds largest exporter of organic food, as well as providing their people with healthy non-GMO food.

This wasnt just a spare of the moment decision either. It came about following years of analyzing the downside to using GMO foods and their overall effects on its consumers. Since there are no biotech industries that thrive there, Russia had no real dog in the fight, so to speak.

Part of Russias agricultural system includes small private rural gardens that provide produce to the countrys overall welfare. It is estimated that around 40 percent of all vegetable and fruit crops come from that sector alone

As part of Russias drive to provide nothing but organic food for itself, as well as other nations in Europe, the Middle East, and Asia, it is reported that the Kremlin has been awarding land free of charge to farmers or gardeners who pledge to produce only organic fruits and veggies.

This was found in an article by Baxter Dmtry on


Time to End the Lost Afghan War Terra Forming Terra

Yes, perhaps it is.  winning this war has never been a military proposition simply because it has a cultural problem that must be solved first.  The military can only provide an umbrella.

Solving the cultural problem is possible but will have to be solved at home first and then in much easier battle spaces than the mountains of Afghanistan.

The tribes themselves have nothing to be proud of. They retain barbarism and and this provides no capacity for real growth.  In fact peace is their only choice for a way forward and was always possible.  It is no victory when you absorb ridiculous casualties for nothing in return. 

The rest of the world hosts seven billion people.  They host rocks and sand.  The rest of the world can walk in tomorrow morning and simply extract all women and children to be distributed globally at the rate of one family per thousand while the men eat sand.

Other options exist but that is the cheapest and the easiest to implement in time and space.  We could even provide a dowry of $50,000 per head and be cheaper than what we have already spent.

Time to End the Lost Afghan War


Media reports claim President Donald Trump let loose on his generals behind closed doors, blasting them royally for their startling failures in Afghanistan, Americas longest war.

The president has many faults and is a lousy judge of character. But he was absolutely right to read the riot act to the military brass for daring to ask for a very large troop and budget increase for the stalemated Afghan War that has cost $1 trillion to date.

Of course, the unfortunate generals are not really to blame. They have been forced by the last three presidents to fight a pointless war at the top of the world that lacks any strategy, reason or purpose and with limited forces. But they cant admit...


New device can heal with a single touch, and even repair brain injuries Terra Forming Terra

 What makes this huge is that it also is a natural solution for burn victims as well.  particularly in producing vascular patways in the damaged skin that helps clean up the damage.

This work is unexpected and revolutionary.  that it has active military support is no surprise.

And the applications for brain damage is so important for PTSD .

New device can heal with a single touch, and even repair brain injuries
 Aug. 7, 2017

A new device has been developed at The Ohio State University, which turns cells into other types of cells required for treating diseased conditions. During testing, one touch completely repaired injured legs of mice over three weeks! USA TODAY

(Photo: The Ohio State University Wexner Medical Center)

A new device developed at The Ohio State University can start healing organs in a "fraction of a second," researchers say.

The technology, known as Tissue Nanotransfection (TNT), has the potential to save the lives of car crash victims and even deployed soldiers injured on site. It's a dime-sized silicone chip that "injects genetic code into skin cells, turning those skin cells into other types of cells required for treating diseased conditions," according to a release.

In lab tests, one touch of TNT completely repaired injured legs of mice over three weeks by turning skin cells into vascular cells.



Germans Force Microsoft to Scrap Future Pushy Windows 10 Upgrades SoylentNews

Submitted via IRC for TheMightyBuzzard

Microsoft sparked fury when it aggressively pushed its Windows 10 operating system onto people's PCs from unexpected downloads to surprise installations.

Now a consumer rights group has forced Redmond to promise it will never do it again, in Germany at least.

In 2015, Microsoft offered existing Windows 7 and 8 users a free upgrade to its new cloud-friendly OS, and rapidly become increasingly ambitious about getting it onto machines. After bundling the upgrade alongside its monthly security patches and resorting to tricky tactics, loads of users found they were downloading gigabytes of unwanted Redmond code.

This riled a lot of folks, but Germany one of the few countries that takes consumer rights seriously actually took action. The Consumer Center in Baden-Wrttemberg filed a cease-and-desist complaint against Redmond regarding the practice, and the software giant has unexpectedly caved and promised never to do it again.

"We would have wished for an earlier introduction, but the levy is a success for more consumer rights in the digital world," said Cornelia Tausch, CEO of the Center.


Original Submission

Read more of this story at SoylentNews.


Blast Your Batterys Sulphates, Is It Worth It? Hackaday

When a friend finds her caravans deep-cycle battery manager has expired over the summer, and her holiday home on wheels is without its lighting and water pump, what can you do? Faced with a dead battery with a low terminal voltage in your workshop, check its electrolyte level, hook it up to a constant current supply set at a few hundred mA, and leave it for a few days to slowly bring it up before giving it a proper charge. It probably wont help her much beyond the outing immediately in hand, but its better than nothing.

A lot of us will own a lead-acid battery in our cars without ever giving it much thought. The alternator keeps it topped up, and every few years it needs replacing. Just another consumable, like tyres or brake pads. But theres a bit more to these cells than that, and a bit of care and reading around the subject can both extend their lives in use and help bring back some of them after they have to all intents and purposes expired.

One problem in particular is sulphation of the lead plates, the build-up of insoluble lead sulphate on them which increases the internal resistance and efficiency of the cell to the point at which it becomes unusable. The sulphate can be removed with a high voltage, but at the expense of a dangerous time with a boiling battery spewing sulphuric acid and lead salts. The solution therefore proposed is to pulse it with higher voltage spikes over and above charging at its healthy voltage, thus providing the extra kick required to shift the sulphation build up without boiling the electrolyte.

If you read around the web, there are numerous miracle cures for lead-acid batteries to be found. Some suggest adding epsom salts, others alum, and there are even people who talk about reversing the charge polarity for a while (but not in a Star Trek sense, sadly). You can even buy commercial products, little tablets that you drop in the top of each cell. The problem is, they all have the air of those YouTube videos promising miracle free energy from magnets about them, long on promise and short on credible demonstrations. Our skeptic radar pings when people bring resonances into discussions like these.

So so these pulse desulphators work? Have you built one, and did it bring back your battery from the dead? Or are they snake oil? Weve featured one before here, but sadly the web link it points to is now only available via the Wayback Machine.

Filed under: chemistry hacks ...


When Not to Use Docker: Understanding the Limitations of Containers SoylentNews

Submitted via IRC for TheMightyBuzzard

Docker is a great tool. But Docker containers are not a cure-all. If you really want to understand how Docker is impacting the channel, you have to understand its limitations.

Docker containers have become massively popular over the past several years because they start faster, scale more easily and consume fewer resources than virtual machines.

But that doesn't mean that Docker containers are the perfect solution for every type of workload. Here are examples of things Docker can't do or can't do well:

  • Run applications as fast as a bare-metal server.
  • Provide cross-platform compatibility.
  • Run applications with graphical interfaces.
  • Solve all your security problems.

I kinda miss just running services directly on physical servers. Guess I'm getting old.


Original Submission

Read more of this story at SoylentNews.


Judge Limits DOJ's Search of Anti-Trump Website Data SoylentNews

Submitted via IRC for TheMightyBuzzard

After the US Department of Justice demanded from DreamHost data that could identify visitors of anti-Trump website and the web host refused to comply with such an unreasonably broad request for data, the DOJ narrowed the scope of its demand by excluding unpublished media and HTTP access and error logs from it.

On Thursday, District of Columbia Superior Court Judge Robert Morin ruled that DreamHost must comply with the narrowed warrant, but has further limited the government's access to the asked-for data, in order to limit exposure of sensitive user information.

He has asked the federal prosecutors to present a list of investigators who will have access to the data and list of methods they will be using to go through it to find information pertinent to their investigation. The investigation aims to find out who's responsible for property damage in downtown Washington during the Inauguration Day protests.

"The production of evidence from this trove of data will be overseen by the court. The DOJ is not permitted to perform this search in a bubble. It is, in fact, now required to make its case with the court to justify why they believe information acquired is or is not responsive to (aka: 'covered by') the warrant," DreamHost explained.

Good. It's about time the judiciary started saying no to executive overreach.


Original Submission

Read more of this story at SoylentNews.


A Disc Shooter For When Rubber Bands Or Nerf Darts Arent Enough Hackaday

There are times in everybodys life when they feel the need to shoot at things in a harmless manner. For those moments there are rubber bands and Nerf darts, but even then they feel like mere toys. If that is the point at which you find yourself, then maybe [Austin]s home-made electric disc shooter can help.

Operation of the shooter is simple enough. A stack of 3D-printed plastic discs is loaded into a tubular magazine, from which individual disks are nudged by a motor-driven cam controlled by the trigger. Once the disc leaves the magazine it reaches a vacuum cleaner belt driven by a much more powerful motor, that accelerates the disc to ejection velocity.

If disc shooters are too tame for you, there is always the Great Coil Gun War.

Filed under: toy hacks


The first men to conquer death will create a new social order a terrifying one Lifeboat News: The Blog

Immensely wealthy and powerful men like Peter Thiel and Elon Musk want to live forever. But at what cost?


Never mind killer robots even the good ones are unpredictable Lifeboat News: The Blog

A researchers at the University of Oxford explains how a group of robots may behave differently to just one individual robot on its own, and it may lead to unpredictable behaviors.


Elon Musks Neuralink Gets $27 Million to Build Brain Computers Lifeboat News: The Blog

Neuralink Corp., the startup co-founded by billionaire Elon Musk, has taken steps to sell as much as $100 million in stock to fund the development of technology that connects human brains with computers.


Trump nominates Andrei Iancu to be director of patent office The Hill: Technology Policy

The White House announced Friday that President Trump intends to nominate Andrei Iancu to be the director of the United States Patent and Trademark Office (USPTO).Iancu is currently the managing partner of Irell & Manella LLP, a Los Angeles-...


Samsung to Expand Bixby, Voice Recognition Features to More Smart Home Appliances by 2020 SoylentNews

Submitted via IRC for TheMightyBuzzard

For four consecutive quarters up through May, Samsung has dominated the home appliances market. With the announcement of the Galaxy Note 8 and its expanded Bixby capabilities such as Quick Commands (using small phrases to perform multiple actions simultaneously), as well as the global rollout of Bixby voice in English to over 200 countries earlier this week, Samsung is making a firm statement: that its Bixby AI, whether you want it or not, is here to stay.

But taking advantage of its success in the home appliances market involves staying ahead, and to do that, there must be a new perspective from which to approach the market. Since Bixby is an 8-year labor of love for the Korean giant, and the voice assistant has now rolled out to mobile devices, bringing the new AI to the home is the next best thing. To this end, Samsung says that it looks to expand Bixby and voice assistant capabilities to smart home appliances by 2020.

This means that Bixby will be used to control the home through Samsung Connect. Samsung's Family Hub refrigerator already utilizes Bixby to perform certain commands (Samsung rolled out Bixby via a software update to the Family Hub 2.0 refrigerator back in May), but the Family Hub will be used to call robot vacuum cleaners to the kitchen or turn on the washing and drying machines (as the Family Hub will control the kitchen setting). Samsung Connect will be used to tie the entire home together, as home automation dictates.


Original Submission

Read more of this story at SoylentNews.


Links 25/8/2017: Linux Turns 26 Years Old, QupZilla is Now Falkon, Introduction of Sailfish X, Go 1.9 Techrights

GNOME bluefish



  • Meet the Entroware Zeus, a Powerful Linux Laptop

    A hulking great 15.6-inch laptop with the power to match. On paper, Im impressed at how well the Entroware Zeus manages to balance top tier performance and yet retain the benefits of portability.

    The sleek aluminium chassis measures just 18.6mm thick, and the whole laptop weighs in at just 1.9KG surprisingly light for a portable workstation.

  • Guide to Linux App Is a Handy Tool for Every Level of Linux User

    Remember when you first started out with Linux? Depending on the environment youre coming from, the learning curve can be somewhat challenging. Take, for instance, the number of commands found in /usr/bin alone. On my current Elementary OS system, that number is 1,944. Of course, not all of those are actual commands (or commands I would use), but the number is significant.

  • Entroware have unleashed Zeus, a powerful new Ultra Mobile Linux laptop
  • Desktop

    • Microsoft will never again sneakily force Windows downloads on users

      There have been various controversies with Windows 10, from issues with privacy and telemetry, to ads and forced upgrades. Following a court case, Microsoft has vowed to never force upgrade files onto users again.

      Windows users in Germany were particularly unimpressed when Microsoft forcibly downloaded many gigabytes of files to upgrade from Windows 7 and 8 to Windows 10. Having held out for 18 months, and losing its case twice, Microsoft has finally agreed to stop its nefarious tactics.

    • ...


Meta: Welcome New Trolls! SoylentNews

Welcome, new trolls! We're pleased as punch to have you aboard, unfortunately as you may have noticed our moderators are unable to give you the moderations you've been working so hard for. Since we can't really do much about people not moderating more, we're going to be giving out more points so that the ones that do can give you the attention you so desperately crave.

Moderators: Starting a little after midnight UTC tonight, everyone will be getting ten points a day instead of five. The threshold for a mod-bomb, however, is going to remain at five. This change is not so you can pursue an agenda against registered users more effectively but so we can collectively handle the rather large uptick in anonymous trolling recently while still being able to have points remaining for upmodding quality comments. This is not an invitation to go wild downmodding; it's helping you to be able to stick to the "concentrate more on upmodding than downmodding" bit of the guidelines.

Also, this is not a heavily thought-out or permanent change. It is a quick, dirty adjustment that will be reviewed, tweaked, and likely changed before year's end. Questions? Comments?

Read more of this story at SoylentNews.


This Bio-Hacking Anti-Aging Product Has a Unique Cult Following: Doctors Lifeboat News: The Blog

One in 10 Elysium customers are doctors. Is Basis about to go mainstream?


Blinking LEDs on the Internet of Printers Hackaday

When you ask for recommendations on which 3D printer to buy, damn the cost, the Ultimaker is consistently at the top of the list. Theres a reason for the popularity of this printer its easy to use, extremely high quality, and has an entire freakin Linux system running somewhere under the hood. That last bit is opening up a few doors to some interesting hacks, like using a 3D printer as an RGB LED.

The Doodle3D team has been playing around with the Ultimaker API to see if they can make their software work with the Ultimaker printer. The Ultimaker has RGB LEDs, so obviously the simplest proof of concept in futzing around with an API is to blink a few LEDs. The actual code was written in HTML, JavaScript, and Node in just two hours. The author admits its ugly, but it works. Cant go wrong with that.

While this is just a simple test of the Ultimaker API, its surprisingly high up on the Google results when you search, Ultimaker API. Thats a shame, because theres a lot of power under the hood of this printer. If you have some sort of mod youd like to throw into the ring, heres the Hackaday Tip Line.

You can check out the demo video of this hack below.

Filed under: 3d Printer hacks


Oops! Aetna exposed 12,000 customers' HIV statuses through envelope window Graham Cluley

American managed health care company Aetna is in hot water for accidentally exposing the HIV statuses of 12,000 of its patients.

David Bisson reports.


Elon Musks $27m Matrix plan to plug the human brain into a computer revealed Lifeboat News: The Blog

Neuralink is working to link the human brain with a machine interface by creating micron-sized devices.

He said creating a brain-machine interface will be vital to help humans compete with the godlike robots of the future.

Neuralink was registered in California as a medical research company last July, and he plans on funding the company mostly by himself.


Facebook hires former NYT public editor to help with transparency The Hill: Technology Policy

Facebook has hired former New York Times public editor Liz Spayd to consult on the social media companys efforts to be more transparent in its decision making.According to the company, Spayd will be tasked with helping Facebook pull the...


Proof of Concept Released for Dangerous iOS Kernel Exploit SoylentNews

Submitted via IRC for TheMightyBuzzard

iOS 10.3.2, which Apple released in mid-May, patches seven AVEVideoEncoder vulnerabilities and one IOSurface flaw discovered by Adam Donenfeld of mobile security firm Zimperium. The security holes, which Apple says can be used by an application to gain kernel privileges, are believed to affect all prior versions of the iOS operating system.

The vulnerabilities are tracked as CVE-2017-6979, CVE-2017-6989, CVE-2017-6994, CVE-2017-6995, CVE-2017-6996, CVE-2017-6997, CVE-2017-6998 and CVE-2017-6999. The bugs were discovered between January 24 and March 20, when they were reported to Apple.

Donenfeld, who disclosed his findings this week at the Hack in the Box security conference in Singapore, said he identified the vulnerabilities while analyzing iOS kernel modules. His analysis led to a little-known module, called AppleAVE, which appeared to lack basic security.

Donenfeld demonstrated how some of the flaws in AppleAVE and IOSurface, which can lead to denial-of-service (DoS), information disclosure and privilege escalation, can be chained to achieve arbitrary read/write and root access. The exploit is said to bypass all iOS security mitigations.

"These vulnerabilities would allow elevation of privileges which ultimately can be used by the attacker to take complete control over affected devices," the researcher said in a blog post.

We really need to standardize TLA definitions. PoC confused me for about half a second in the original headline [Ed: changed it to avoid further confusion here].


Original Submission

Read more of this story at SoylentNews.


With the USS McCain collision, even Navy tech cant overcome human shortcomings Lifeboat News: The Blog

With the USS McCain collision, even Navy tech cant overcome human shortcomings.

One mistake can cascade into a disaster in heavy marine traffic, regardless of tech.


Following the lead of companies like Amazon and Google, commercial interest in artificial intelligence is skyrocketing Lifeboat News: The Blog

So we investigated 3 questions about artificial intelligence:

1. How are militaries around the world using AI?
2. What about AI worries the Pentagon?
3. Is AI dangerous?


How BioViva Uses Genetic Therapies to Fight Father Time Lifeboat News: The Blog

Good quick interview. Technical, and a mention that its not just about telomeres.

BioViva is looking for a way to slow aging. Globalive Chairman Anthony Lacavera talks to CEO Elizabeth Parrish, who is using herself as a test subject and claims to have seen some fascinating results. (Source: Bloomberg)


Apple removes Iranian apps, citing U.S. sanctions The Hill: Technology Policy

Apple is aggressively taking Iranian-based apps out of its App Store, citing U.S. sanctions against the country.Over the last several days, the Cupertino, Calif.-based technology giant has removed apps created by developers based in Iran from its...



Custom Cut Pinwheel Makes a Useful HVAC Duct Flow Meter Hackaday

Everyone is familiar with pinwheels, and few of us havent crafted one from a square of paper, a stick, and a pin. Pinwheels are pretty optimized from a design standpoint, and are so cheap and easy to build that putting a pinwheel to work as an HVAC duct flow meter seems like a great idea.

Great in theory, perhaps, but as [ItMightBeWorse] found out, a homemade pinwheel is far from an ideal anemometer. His experiments in air duct flow measurements, which previously delved into ultrasonic flow measurement, led him to try mechanical means. That calls for some kind of turbine producing a signal proportional to air flow, but a first attempt at using a computer fan with brushless DC motor failed when a gentle airflow couldnt overcome the drag introduced by the rotor magnets. But a simple pinwheel, custom cut from patterns scaled down from a toy, proved to be just the thing. A reflective optosensor counts revolutions as the turbine spins in an HVAC duct, and with a little calibration the rig produces good results. The limitations are obvious: duct turbulence, flimsy construction, and poor bearings. But for a quick and dirty measurement, its not bad.

Looking for an outdoor anemometer rather than an HVAC flow meter? Weve got one made from an old electric motor, or a crazy-accurate ultrasonic unit.

Filed under: misc hacks


Apple to Build Iowa Data Center, Get $207.8 Million in Incentives SoylentNews

Submitted via IRC for TheMightyBuzzard

Apple Inc will build a $1.375 billion data center in Waukee, Iowa, Apple and state officials said on Thursday, with $207.8 million in incentives approved by the Iowa Economic Development Authority and Waukee city council.

Apple will purchase 2,000 acres (8.09 square km) of land in Waukee, about 20 miles (32 km) west of Des Moines, to build two data centers. The company will receive a $19.65 million investment tax credit for creating 50 jobs.

Apple said the project will generate more than 550 jobs in construction and operations, but did not specify how many of those jobs would be long-term positions.

Speaking alongside Iowa Governor Kim Reynolds, Apple Chief Executive Tim Cook said the facility "will create hundreds of jobs for people in Iowa from construction to engineering."

Cook said Apple will contribute up to $100 million toward a "public improvement fund" for the city of Waukee, adding the first project supported by the fund will be a youth sports complex that "will be open to all."

It's nice that they won't be outsourcing the data mining of all your personal information and metadata. Merica!


Original Submission

Read more of this story at SoylentNews.


Deep View of Antares Centauri Dreams

Red supergiants are stars more massive than 9 times the mass of the Sun, a late stage of stellar evolution in which the stars atmospheres become expansive, while lowering in density. Antares, the brightest star in the constellation Scorpius, is about 12 times as massive as the Sun, but its diameter is 700 times larger. Its mass was once thought to be 15 times that of the Sun, with three solar masses of material being shed during its lifetime. If located in our Solar System, its outer edges would reach somewhere between the orbits of Mars and Jupiter.

Now we have word that scientists using the European Southern Observatorys Very Large Telescope Interferometer (VLTI) at Paranal Observatory in Chile have been able to map the surface of this star, and to measure the motion of its surface material. What we get out of all this is the best image of the surface and atmosphere of any star other than our own.

Image: VLTI reconstructed view of the surface of Antares. Credit: ESO.

Lead author Keiichi Ohnaka and colleagues were able to create a two-dimensional velocity map of Antares atmosphere, using three of the VLTIs auxiliary telescopes these are 1.8 meter instruments that feed the interferometer and can be moved from place to place on the VLT platform. The VLTI can combine the light of four different telescopes, using either its 8.2 meter unit instruments or the smaller auxiliary telescopes. In this case, three of the auxiliaries were complemented by AMBER, a near-infrared spectro-interferometric instrument.

With the help of the latter, the team was able to make separate images of the surface of Antares over a small range of infrared wavelengths. The ensuing map of the relative speed of atmospheric gases across the Antares disk grew out of calculations revealing the speed differential between gas at different positions on the star, and the average speed of gas over the entire star.

Wed like to know more about how supergiants like Antares lose mass as they enter their final stages. The paper reveals that the distribution of turbulent low-density gas was unexpectedly complex. Its presence much further from the star than predicted could not be explained by convection, which involves the transfer of energy from the core to the outer atmosphere of many stars the extended atmosphere is much larger than convection models can produce.

From the paper:

Since convection alone cannot explain the density a...


Judge limits DOJs search of anti-Trump website data Help Net Security

After the US Department of Justice demanded from DreamHost data that could identify visitors of anti-Trump website and the web host refused to comply with such an unreasonably broad request for data, the DOJ narrowed the scope of its demand by excluding unpublished media and HTTP access and error logs from it. On Thursday, District of Columbia Superior Court Judge Robert Morin ruled that DreamHost must comply with the narrowed warrant, but has further More


Will artificial intelligence make our kids stupid and rude? Lifeboat News: The Blog

Scott Ott spearheads the questioning of human-computer interaction and its effect on society in this Right Angle. Steve Green and Bill Whittle are talking on this topic.

Artificial intelligence, brain, brain diseases, AI lectures, AI conferences, AI TED talks, mind and brain, programming languages, AI movies, AI books in english, french, chinese, russian and turkish.


QupZilla Web Browser Becomes KDE Falkon Phoronix

The QupZilla open-source web-browser built using Qt WebEngine and in development for the past seven years is now part of the KDE project and has renamed itself to Falkon...


Nanotube-based Yarns Harvest Energy From Twisting and Stretching IEEE Spectrum Recent Content full text

Nanotube yarns offer an alternative to piezoelectric and triboelectric devices for harvesting energy Illustration: Shi Hyeong Kim/Hanyang University, Seoul, South Korea Illustration of a torsionally tethered coiled harvester electrode and counter and reference electrodes in an electrochemical bath, showing the coiled yarn before and after stretch.

An international team of researchers led by researchers at the University of Texas (UT) at Dallaswhere they have been working on making carbon nanotube-based yarns for well over a decadehas devised a way to make these carbon nanotube yarns into devices that can harvest energy from stretching or twisting them.

In research described in the journal Science , the initial results show promise for immediate use in powering small sensor nodes in Internet of Things (IoT) applications. The team says its nanotube yarns could produce larger amounts of energy by flexing and twisting in response to the movement of ocean waves.

While it appears as though these nanotube yarns are exploiting a piezoelectric effect, in which a material can generate an electric charge in response to applied mechanical stress, the yarns behavior makes it more closely tied to so-called electroactive polymers (EAPs), which are a kind of artificial muscle.

Basically what's happening is when we stretch the yarn, we're getting a change in capacitance of the yarn. Its that change that allows us to get energy out, explains Carter Haines, associate research professor at UT Dallas and co-lead author of the paper describing the research, in an interview with IEEE Spectrum.

This makes it similar in many ways to other types of energy harvesters. For instance, in other research, it has been demonstratedwith sheets of rubber with coated electrodes on both sidesthat you can increase the capacitance of a material when you stretch it and it becomes thinner. As a result, if you have charge on that capacitor, you can change the voltage associated with that charge.

We're more or less exploiting the same effect but what we're doing differently is we're using an electric chemical cell to do this, says Haines. So we...

Hackaday Prize Entry: CPAP Humidifier Monitor Alarm Hackaday

CPAP (Continuous Positive Airway Pressure) machines can be life-changing for people with sleep apnea. [Scott Clandinin] benefits from his CPAP machine and devised a way to improve his quality of life even further with a non-destructive modification to monitor his machines humidifier.

With a CPAP machine, all air the wearer breathes is air that has gone through the machine. [Scott]s CPAP machine has a small water reservoir which is heated to humidify the air before it goes to the wearer. However, depending on conditions the water reservoir may run dry during use, leading to the user waking up dried out and uncomfortable.

To solve this in a non-invasive way that required no modifications to the machine itself, [Scott] created a two-part device. The first part is a platform upon which the CPAP machine rests. A load cell interfaced to an HX711 Load Cell Amplifier allows an Arduino Nano to measure the mass of the CPAP machine plus the integrated water reservoir. By taking regular measurements, the Arduino can detect when the reservoir is about to run dry and sound an alarm. Getting ones sleep interrupted by an alarm isnt a pleasant way to wake up, but its much more pleasant than waking up dried out and uncomfortable from breathing hot, dry air for a while.

The second part of the device is a simple button interfaced to a hanger for the mask itself. While the mask is hung up, the system is idle. When the mask is removed from the hook, the system takes measurements and goes to work. This makes activation hassle-free, not to mention also avoids spurious alarms while the user removes and fills the water reservoir.

Non-invasive modifications to medical or other health-related devices is common, and a perfect example of nondestructive interfacing is the Eyedriveomatic which won the 2015 Hackaday Prize. Also, the HX711 Load Cell Amplifier has an Arduino library that was used in this bathroom scale refurb project.

The HackadayPrize2017 is Sponsored by:


New Campaign Uses Facebook Messenger to Distribute Malware HackRead

By Waqas

A security researcher David Jacoby has revealed that Facebook Messenger

This is a post from Read the original post: New Campaign Uses Facebook Messenger to Distribute Malware


Nobody Speak The Isoblog.

Wikipedia says:

A music video for Nobody Speak was released on August 24, 2016. The video, which has been described as brutal [and] politically charged, features political representatives in a meeting. The leaders of the groups begin a rap battle against each other, which after around 90 seconds turns into an all-out brawl involving virtually everyone in the meeting room. The video finishes with one leader preparing to impale his counterpart with an American flag.

The leaders of the groups are played by Igor Tsyshkevych and Ian Bailey. Shadow commented on the video, saying that they wanted to make a positive, life-affirming video that captures politicians at their election-year best. We got this instead. Killer Mike also commented on the video, saying that Its such a dope video its what I really wish Trump and Hillary would just do and get it over with.

Thanks to Christian Vogel for pointing me at the WP entry for the video.


Crash test: 2.4t concrete barrier vs. 10t truck The Isoblog.

mdr Version, Youtube Version

German mdr Regional TV has done a rather spectacular set of crash tests (Video with german narration, but the video speaks for itself). They were running a test of a 10t truck vs. a set of 2.4t concrete truck barriers, at 50 kph collision speed.

As expected, the truck goes trough the barrier almost without any speed loss in a frontal collision. That is mostly, because the barriers are unanchored, so they are sent spinning. The truck loses both frontal wheels, though, and is consequently harried.

A second test with a 45 deg collision goes spectacularly wrong: The truck is inflected into the barrier, and goes through the barrier at a right angle again, instead of being deflected and guided following the barrier.

Further investigation reveals that a truck has of course an extremely sturdy, rectangular frame on which the entire chassis and the load rest. The frame is being caught by the barrier and acts as a hook, drawing the load into the barrier instead of being guided by it.

The video is interesting on multiple levels:

  • It shows how much more energy there is in a moving, loaded truck compared to a personal vehicle at the same speed. Where personal vehicles and motorbikes are being pulverised by a 2.4t barrier, the truck at 4 times the weight of the barrier simply moves the barrier away and sends it skidding and spinning.
  • That is not just true in a terrorist attack. The same energy is in play every time you are moving in traffic next to a truck or bus. And you car is about half the weight of such a concrete barrier, unless you are sitting in a SUV. Bicycles do not even register (Article in German).
  • It shows that a proper barrier needs to be solidly anchored to the ground in order to be able to take the energy out of the moving truck. Friction alone is not going to help. Thats expensive and horrendously complicated in terms of event logistics.
  • The tone of the entire report is needlessly alarmist. Of cou...


Driverless Lorries To Be Tested On UK Roads by End of 2018 Hackaday

The [BBC] is reporting that driverless semi-trailer trucks or as we call them in the UK driverless Lorries are to be tested on UK roads. A contract has been awarded to the Transport Research Laboratory (TRL) for the trials. Initially the technology will be tested on closed tracks, but these trials are expected to move to major roads by the end of 2018.

All  of these Lorries will be manned and driven in formation of up to three lorries in single file. The lead vehicle will connect to the others wirelessly and control their braking and acceleration. Human drivers will still be present to steer the following lorries in the convoy.

This automation will allow the trucks to drive very close together, reducing drag for the following vehicles to improve fuel efficiency.Platooning as they call these convoys has been tested in a number of countries around the world, including the US, Germany, and Japan.

Are these actually autonomous vehicles? This question is folly when looking toward the future of self-driving. The transition to robot vehicles will not happen in the blink of an eye, even if the technological barriers were all suddenly solved. Thats because its untenable for human drivers to suddenly be on the road with vehicles that dont have a human brain behind the wheel. These changes will happen incrementally. The lorry tests are akin to networked cruise control. But we can see a path that will add in lane drift war...


Florida Court Orders Pirate Site KissAsian to Pay 1.8M in Damages TorrentFreak

ABS-CBN, the largest media and entertainment company in the Philippines, continues its legal campaign against pirate sites in the US.

The company has singled out dozens of streaming sites that offer access to Pinoy content without permission, both in the US and abroad.

This week a federal court in Florida signed a default judgment against KissAsian, one of the biggest targets thus far. Since the defendants failed to show up it was a relatively easy win.

The lawsuit in question was filed in February and accused KissAsian of both copyright and trademark infringement. According to ABS-CBN, the site was using its trademarks and copyrighted content to draw visitors and generate profit.

ABS-CBN is suffering irreparable and indivisible injury and has suffered substantial damages as a result of Defendantsunauthorized and unlawful use of the ABS-CBN Marks and Copyrighted Works, the complaint read.

When the operators of the pirate site failed to respond to the allegations, the media company asked for a default judgment. United States District Judge William Dimitrouleas has now approved the companys request, granting it $1 million in trademark damages, and another $810,000 for copyright infringement.

The order (pdf)

In addition, the judge granted a request to hand over the domain name to ABS-CBN, which hasnt happened thus far.

While the order is a clear win for the Philippine media conglomerate, it might be hard to recoup the damages from the unknown operators of the site. In fact, it doesnt appear that the site is going to cease its activities anytime soon, as the order requires.

Soon after was put at risk, the sites operators simply relocated to a new domain name;

We are transferring domain, new domain is, and kissasian beta mirror is not working temporarily, it will be done in next 5-10mins. Sorry for the inconvenience! a statement on Facebook reads.

And so it continues.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONY...


Only SPIR-V & KHR_no_error Are Left Blocking OpenGL 4.6 In Mesa Phoronix

It's only the in-progress SPIR-V and KHR_no_error work left preventing the RadeonSI and Intel OpenGL drivers in Mesa from exposing OpenGL 4.6...


Happy Birthday, Linux SoylentNews

Twenty-six years ago today, someone from Finland posted the following message to comp.os.minix:

Hello everybody out there using minix -

I'm doing a (free) operating system (just a hobby, won't be big and
professional like gnu) for 386(486) AT clones. This has been brewing
since april, and is starting to get ready. I'd like any feedback on
things people like/dislike in minix, as my OS resembles it somewhat
(same physical layout of the file-system (due to practical reasons)
among other things).

I've currently ported bash(1.08) and gcc(1.40), and things seem to work.
This implies that I'll get something practical within a few months, and
I'd like to know what features most people would want. Any suggestions
are welcome, but I won't promise I'll implement them :-)

                Linus (

PS. Yes - it's free of any minix code, and it has a multi-threaded fs.
It is NOT protable (uses 386 task switching etc), and it probably never
will support anything other than AT-harddisks, as that's all I have :-(.

Here's wishing him and his creation another twenty-six happy years of world domination.

Original Submission

Read more of this story at SoylentNews.


What G+ thinks you like to read The Isoblog.

The latest incarnation of Whats hot

Google plus always has had a content discovery feature. In the past that have been the infamous Whats hot entries. Postings that went into that category usually attracted a ton of spammers and even more haters, and one had a pretty blood crusted banhammer until the waves were through. Ask me how I know

The current incarnation of Whats hot is marginally better at selecting and offering content, because it is somewhat more personalised. This is actually interesting, because the top bar shows a list of clickable keywords, which can give you a way to filter and also show you what Google plus would associate with your behavior.

My list is: (+ = correct) (- = incorrect) (f = probably suggested because of the people I follow, not an actual interest) (o = neutral) (i = only ironically)

Machine Learning (+), Architecture (+), Electric Cars (+), Interactive Maps (+), Astronomy (+), European Union (+), Retrocomputing (o), Star Trek (+), Tabletop RPGs (+), Articles to get you thinking (o), North American National Parks (o), Artificial Intelligence & Robotics (+), All Things Google (+), Ingress (-, f), Bikes & Cycling (+) , Computer Security (+), Fashion (+), Vinyl (-), Audio (-), Project Management (o), Steampunks (+), Tennis (-), Mighty Morphin Power Rangers (-), Gardening (i), Marine Life (+), Chemistry (+), Comics (o), Medical Science (+), Electronics (+), Magic: The Gathering (-), Lighting (+), Destination: Toronto (f), Fungi (f), Scuba Diving (f), Knitting & Crochet (f), Norse Mythology (f), Potterheads (f), Pest Control (-), Nature Photography (o), K-Pop (f), Dollhouse Miniatures (-), Amazing Earth (o), Maps & Globes (o), Chess (-), Landscaping (i), Toy Models & Crafts (o), The Global Economy (+), Woodworking (f), Coffee & Tea (o), Weddings (o), Cats and Dogs (-)



USB + C = Peril? Hackaday

You hear about people finding USB drives and popping them into a computer to see whats on them, only to end up loading some sort of malware onto their computer. It got me to thinking, given this notorious vulnerability, is it really a great idea to make electronics projects that plug into a computers USB port? Should I really contribute to the capitulation-by-ubiquity that USB has become?

A of couple years ago I was working on an innocuous project, a LED status light running off of USB. It ran off USB because I had more complicated hopes for itsome vague notion about some kind of notification thing and also it was cool to have access to 5 V right from the puter. This was about the time that those little RGB LEDs connected to USB were all the rage, like blink(1), which raised $130,000 on Kickstarter. I just wanted to make a status light of some sort and had the parts, so I made it.

Its absurd, of course. My meager engineering skills ought not interest anyone. On the other hand, couldnt so...


Mobile Trojan Development Kits allow creating ransomware without the need to write code Security Affairs

Researchers at Symantec have discovered Trojan Development Kits that allow creating Android ransomware without the need to write code.

Ransomware continues to represent a serious threat to users and organizations.

Unfortunately, it is easy for crooks arranging their own ransomware campaign by using numerous RaaS services offered online.

Recently researchers at Symantec discovered a new Android ransomware-as-a-service (RaaS) kit that allows creating a ransomware even without specific knowledge.

The new Android apps have spotted by researchers at Symantec that noticed some advertisements on hacking forums and social networking messaging service popular in China.

Wannabe malware authors can start using TDKs by firstly downloading the free app. The apps are available from hacking forums and through advertisements on a social networking messaging service popular in China. reads the post published by Symantec.

The app, which has an easy-to-use interface, is no different from any other Android app apart from the fact that it creates malware.

To generate the malware, all the user needs to do is choose what customization they want by filling out the on-screen form.

The Trojan Development Kits (TDKs) allows wannabe hacker to create their own ransomware with a few steps through an easy-to-use interface.

Trojan Development Kits

To create the ransomware, users can download one of such apps, install and open it. The app displays the following options to customize the ransomware:

  • The message to display on...


Ubuntu 17.10 Continues Refining Its GNOME Shell Theme Phoronix

Will Cooke of Canonical is out with another weekly update on the latest happenings for the Ubuntu 17.10 desktop as the "Artful Aardvark" release continues getting closer...





Were still examining this book 


Now its time to get on with actually doing something based on the knowledge in this book. Theres also a follow up to this book, called The Advanced Machine Language Book of The Commodore 64, which continues in the same vein.


Im going to try and attempt to explain and demonstrate the very daunting tasks of drawing lines (the whole basis of graphics) and playing polyphonic music on the C64, which is childs play on other contempory computers, such as the Sinclair ZX Spectrum (drawing lines, but only playing monophonic music), Atari 8 bit, BBC Micro, Acorn Electron (one channel sound only), and MSX computers.


Readers are actually supposed to carry out these exercises for themselves instead of just sitting back, reading these articles, and looking at any accompanying pics and videos. To do this youll need to either install an emulator such as VICE, or C64 Forever, or have a Commodore 1...


Review: Securing the Internet of Things Help Net Security

About the authors Shancang Li is a senior lecturer in the cyber security research unit, Department of Computer Science and Creative Technologies at University of the West of England, Bristol, UK. His security background ranges from network penetration testing, wireless security, mobile security, and digital forensics. Li Da Xu is an IEEE Fellow and an academician of Russian Academy of Engineering. He is an Eminent Professor in Department of Information Technology and Decision Science at More


Video Friday: Robogami, Flying Snake Robots, and Autonomous Car Eclipse IEEE Spectrum Recent Content full text

Your weekly selection of awesome robot videos

Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next two months; here's what we have so far (send us your events!):

IEEE ICARM 2017  August 27-31, 2017  Hefei, China
IEEE RO-MAN  August 28-31, 2017  Lisbon, Portugal
CLAWAR 2017  September 11-13, 2017  Porto, Portugal
FSR 2017  September 12-15, 2017  Zurich, Switzerland
Singularities of Mechanisms and Robotic Manipulators  September 18-22, 2017  Johannes Kepler University, Linz, Austria
ROSCon  September 21-22, 2017  Vancouver, B.C., Canada
IEEE IROS  September 24-28, 2017  Vancouver, B.C., Canada
RoboBusiness  September 27-28, 2017  Santa Clara, Calif., USA
Drone World Expo  October 2-4, 2017  San Jose, Calif., USA
HAI 2017  October 17-20, 2017  Bielefeld, Germany
ICUAS 2017  October 22-29, 2017  Miami, Florida, USA

Let us know if you have suggestions for next week, and enjoy today's videos.

Of course designing robots is challenging, but if someone were to make it easy, how could we justify publishing all of these papers and putting on conferences and stuff? Sigh, thanks MIT.

Designing robots usually requires expertise that only mechanical engineers and roboticists have, says PhD student and co-lead author Adriana Schulz. Whats exciting here is that weve created a tool that allows a casual user to design their own robot by giving them this expert knowledge.

Casual roboticists? Is that a thing you can be...?



WebKitGTK+ Security Advisory WSA-2017-0007 Open Source Security

Posted by Carlos Alberto Lopez Perez on Aug 25

WebKitGTK+ Security Advisory WSA-2017-0007

Date reported : August 25, 2017
Advisory ID : WSA-2017-0007
Advisory URL :
CVE identifiers : CVE-2017-1000121, CVE-2017-1000122.

Several vulnerabilities were...


RadeonSI May Eventually Switch To NIR Completely Phoronix

RadeonSI developers have been working on supporting the NIR intermediate representation within their Gallium3D driver as a means to support ARB_gl_spirv for being able to load SPIR-V shaders in OpenGL and interact with the RADV Vulkan driver code paths, which is making use of NIR. It's looking like in the future the RadeonSI driver could end up using NIR completely by default...


Tips for an Information Security Analyst/Pentester career - Episode 14: OSINT (pt 1) The S@vvy_Geek Tips Tech Blog


Over this episode, we're going to cover open source intelligence (OSINT), aka passive reconnaissance.

I've dealt with active reconnaissance already, where the pentester/hacker interacts actively with the target. This is the case for tools like Nmap or HTTrack.

Active reconnaissance might not always feasible or allowed and might not be your best shot.

Depending on rule of engagement and, as a general consideration, you might want to start with OSINT, first.

According to Wikipedia, "Open Source Intelligence (OSINT) is a term used to refer to the data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources). It is not related to open-source software or public intelligence".

OSINT is a type of recon performed by retrieving information about the target company/person/organization based on public registries and public domain information, such as Internet domain registrars (Arin for North America), social media, job posting and other tools, without activating any interaction with the target whatsoever.

The information collected this way allows to perform a more targeted and spot-on pentest, reducing the "noise" level and keeping a lower profile with regard to the target.

if you need or want to move to active reconnaissance, you're gonna have more information on the target, increasing your potential success rate.

Brief hands-on overview


I performed a passive recon on

Whois command (OS X)



Tips for an Information Security Analyst/Pentester career - Episode 15: OSINT (pt 2) The S@vvy_Geek Tips Tech Blog

Over this episode, we are going to delve deeper into open source intelligence by using two advanced tools, allowing to automate reconnaissance by sifting through websites, search engines, domains, social media and a lot of more sources.

A) recon-ng

This tool, developed by Black Hills Cyber Security, is very advanced and allows to automate reconnaissance by using a bunch of available bundled modules. This software comes preinstalled with Kali Linux, but is available for download for all platforms.

For the purposes of this tutorial, I only analyzed domains and companies.

Your first need to enter manually the domain or company you want to perform a search about.

For domains, you need to enter the command add domains, followed by the name of the domain you want to add, as shown below.

Similarly, in order to add a company, you need to use add companies, followed by the name of the company you want to add.

Entering search domains- in the command prompt, we can see all modules available for domains.

I'm going to analyze here a couple of specific domain modules. 

To use a module, alike Metasploit, you need to enter use, followed by the module name.

As a general rule, if we enter show info, we can see more information about the specific module we're using. If we enter show options, we can set up additional options to customize the way that specific module works.


Blind SQL Injection in Wordpress plugin wordpress-gallery-transformation v1.0 Open Source Security

Posted by Larry W. Cashdollar on Aug 25

Title: Authenticated Blind SQL Injection in Wordpress plugin wordpress-gallery-transformation v1.0
Author: Larry W. Cashdollar, @_larry0
Date: 2017-07-22
Download Site:
Vendor Notified: 2017-08-07
Vendor Contact: plugins () wordpress org
Description: Transforms word press into...


Faster forwarding OpenBSD Journal

Hrvoje Popovski directed our attention to a new blog post from mpi@ discussing one improvements in the performance of the networking stack.

Read more


Senate Dem wants answers on FTC's quick approval of Amazon-Whole Foods deal The Hill: Technology Policy

Sen. Amy Klobuchar (Minn.), the ranking Democrat on the Senate antitrust subcommittee, is demanding answers on the speed with which the Federal Trade Commission (FTC) approved Amazons $13.7 billion purchase of Whole Foods.In a statement...


Magnetothermal Genetics: A Fourth Tool in the Brain-Hacking Toolbox IEEE Spectrum Recent Content full text

Scientists showcase another way to hack into the brain to control physical behavior in mice Photo: Rahul Munshi/University at Buffalo

A scientist wanting to hack into an animals brain used to have three different tools to choose from: electric current, drugs, and light. Now theres a fourth: magnetic fields. In a paper published last week in the open-access journal eLife , scientists at the University at Buffalo used magneto-thermal genetics to manipulate brain cells in mice, enabling the researchers to control the animals behavior.

Magneto-thermal genetics has been previously shown to activate neurons in anesthetized rodent brains, but this is the first time anyone has reported using the tool to manipulate animal behavior, says Arnd Pralle, the University at Buffalo biophysicist who led the research.

Brain hacking tools help scientists better understand the wiring of the brainthe arrangement of neural circuits and which ones control different movements and behaviors. These tools could someday lead to the development of artificial human eyes and ears, or treatments for paralysis, traumatic brain injury, and diseases such as Parkinsons and depression.

Over the past few years, major funding agencies have encouraged scientists and bioengineers to focus their work on the bodys internal wiring. The U.S. National Institutes of Health (NIH) and DARPA have been doling out grants for work on both the peripheral and central nervous systems.

Engineers play a key role in the research. The bodys nervous systems communicate, after all, in a language of electrical signals. Researchers must not only map those signals, but also figure out how to interface with them, and override them when they malfunction.

Magnetic fields can do the job (following some complicated, multi-step bioengineering). In Pralles experiments, he and his team injected a virus containing a gene and some helper genetic elements into the brains of mice. This genetic material gets incorporated into the DNA of the mouses brain cells, or neurons. The foreign gene makes the neurons heat sensitive. Next, they injected magnetic nanoparticles into a specific region of the mouse brain that latch onto the neurons in that region. They then applied alternating magnetic fields, which cause the nanoparticles to heat up a couple of degrees. The rise in temperature triggers the h...

New projects on Hosted Weblate Michal iha's Weblog

Hosted Weblate provides also free hosting for free software projects. The hosting requests queue has grown too long, so it's time to process it and include new project.

This time, the newly hosted projects include:

If you want to support this effort, please donate to Weblate, especially recurring donations are welcome to make this service alive. You can do them on Liberapay or Bountysource.

Filed under: Debian English SUSE Weblate


It took 14 years for this Massachusetts hospital to detect a data breach Graham Cluley

It took a Massachusetts hospital 14 years to detect a data breach. To make matters worse, even after all that time - it wasn't the medical center itself that discovered the incident.

David Bisson reports.


Free Software Directory meeting recap for August 18th, 2017 FSF's blog

Every week free software activists from around the world come together in #fsf on to help improve the Free Software Directory. This recaps the work we accomplished at the Friday, May 26th, 2017 meeting.

Our most recent meeting was focused on adding new entries. While it was lightly attended, we did get quite a few new packages added. As is often the case, we also filed numerous bugs with projects that had licensing issues. By far the most common issue we tend to come across with a package's licensing is that they haven't included a license at all! We often find packages that contain notices in the headers of the source files indicating that the work is under the GNU General Public License, but then there won't actually be a copy of the license. It's a simple mistake, but thankfully easy to correct. We did discuss possibly creating some new educational materials to help spread the message: "Don't forget your license!" More work will have to be done on that front.

If you would like to help update the directory, meet with us every Friday in #fsf on from 12 p.m. to 3 p.m. EDT (16:00 to 19:00 UTC).


Vault 7 Leak: CIA Collected Biometric Data from Partner Agencies HackRead

By Waqas

New Vault 7 Documents by WikiLeaks Show How CIA Collected

This is a post from Read the original post: Vault 7 Leak: CIA Collected Biometric Data from Partner Agencies


Major leap towards storing data at the molecular level Lifeboat News: The Blog

From smartphones to supercomputers, the growing need for smaller and more energy efficient devices has made higher density data storage one of the most important technological quests.

Now scientists at the University of Manchester have proved that storing data with a class of molecules known as single-molecule magnets is more feasible than previously thought.

The research, led by Dr David Mills and Dr Nicholas Chilton, from the School of Chemistry, is being published in Nature. It shows that magnetic hysteresis, a memory effect that is a prerequisite of any data storage, is possible in individual molecules at 213 C. This is tantalisingly close to the temperature of liquid nitrogen (196 C).


Game of Thrones season 7 episode 7 finale: As promised Mr.Smith Group leak detailed stroryline TechWorm

Game of Thrones season 7 episode 7 finale The Dragon and the Wolf Detailed storyline and plot spoilers leaked

You must have heard the adage there is a code of honor among thieves Mr.Smith Group, the hackers who hacked into HBO servers seem to be a living testimony to this code. They had yesterday promised (only reported on Techworm and Independent) that they will leak the entire script of Game of Thrones season 7 episode 7 finale The Dragon and the Wolf today. And they did it!!!

A Reddit post detailing the complete storyline of Game of Thrones season 7 episode 7 finale The Dragon and the Wolf was made today. The entire leak has the Mr.Smith Group signature as the storyline seems to be intended for internal HBO use and is dated April 2016 way before the first GoT S07 episode was even released.

For those who cant wait to see what the Night King would do with the resurrected dead Viserion can visit the Reddits Game of Thrones spoilers-dedicated subreddit, Freefolk. The Redditor Teamkhaleesi who made the storyline thread claims that the hackers send him the entire storyline. The hacker put up his email on his website, so I emailed him back then now he sent me a complete overview of episode 7, u/Teamkhaleesi wrote (sic).

If you are a GoT fan, you will require a lot of patience with the leaked storyline which is a whopping 20 pages long. The Independent, the only website along with Techworm which claimed that Mr.Smith Group will leak GoT S07E07 Finale Episode said that an individual claiming to belong to the so-called Mr. Smith Group sent them a similar 20-page story outline along with a shorter episode summary through email.

The chances of actual Game of Thrones season 7 episode 7 finale The Dragon and the Wolf video getting leaked are very remote as HBO has taken the security of the episode to a whole new level according to sources close to the network. Those interested in knowing whether Jon Snow and Daenerys Targareon will fall in love (as the title suggests) should visit the Reddit thread (which we cannot publish due to strict DMCA guidelines from HBO)

The Game of Thrones season 7 episode 7 finale The Dragon and the Wolf will be aired on 27th August 2017 on the HBO Network throughout the world, Sky Atlantic, Star India, and Hotstar.

The post Game of Thrones season 7 episode 7 finale: As promised Mr.Smith Group leak detailed stroryline appeared first on...


A 3D Printed Junction Transistor Model Hackaday

Transistors are no doubt one of humankinds greatest inventions. However, the associated greatness brings with it unprecedented complexity under the hood. To fully understand how a transistor works, one needs to be familiar with some Quantum Mechanics! As perhaps any EE undergraduate would tell you, one of the hardest subject to fathom is in fact semiconductor physics.

Take your pick: Mathematical equations governing the various currents inside a BJT

A good place to start to comprehend anything complex is by having an accurate but most importantly, tangible model at hand. Semiconductors are hard enough to describe with elaborate mathematical tools, is a physical model too much to ask?

[Chuck] has designed, printed and explained the workings of a BJT transistor using a 3D printed model. We really like this model because it goes a long way to shed light on some of...


The Myth of the Skills Gap SoylentNews

The idea that American workers are being left in the dust because they lack technological savvy does not stand up to scrutiny. Our focus should be on coordination and communication between workers and employers.

Technology enthusiasts and entrepreneurs are among the loudest voices declaiming this conventional wisdom (see "The Hunt for Qualified Workers").

Two recent developments have heightened debate over the idea of a "skills gap": an unemployment rate below 5 percent, and the growing fear that automation will render less-skilled workers permanently unemployable.

Proponents of the idea tell an intuitively appealing story: information technology has hit American firms like a whirlwind, intensifying demand for technical skills and leaving unprepared American workers in the dust. The mismatch between high employer requirements and low employee skills leads to bad outcomes such as high unemployment and slow economic growth.

The problem is, when we look closely at the data, this story doesn't match the facts. What's more, this view of the nation's economic challenges distracts us from more productive ways of thinking about skills and economic growth while promoting unproductive hand-wringing and a blinkered focus on only the supply side of the labor marketthat is, the workers.

What do you think, is there a shortage of skilled workers ??

Original Submission

Read more of this story at SoylentNews.


Jolla Announces Sailfish X Phoronix

As some more Linux phone news this week besides Android Oreo and Purism's Librem 5 smartphone effort, Jolla has just announced their plans for shipping Sailfish X...


The Future of Computing Depends on Making It Reversible IEEE Spectrum Recent Content full text

Its time to embrace reversible computing, which could offer dramatic improvements in energy efficiency Illustration: Chad Hagen

Illustration: Chad Hagen

For more than 50 years, computers have made steady and dramatic improvements, all thanks to Moores Lawthe exponential increase over time in the number of transistors that can be fabricated on an integrated circuit of a given size. Moores Law owed its success to the fact that as transistors were made smaller, they became simultaneously cheaper, faster, and more energy efficient. The payoff from this win-win-win scenario enabled reinvestment in semiconductor fabrication technology that could make even smaller, more densely packed transistors. And so this virtuous circle continued, decade after decade.

Now though, experts in industry, academia, and government laboratories anticipate that semiconductor miniaturization wont continue much longermaybe 5 or 10 years. Making transistors smaller no longer yields the improvements it used to. The physical characteristics of small transistors caused clock speeds to stagnate more than a decade ago, which drove the industry to start building chips with multiple cores. But even multicore architectures must contend with increasing amounts of dark silicon, areas of the chip that must be powered off to avoid overheating.

Heroic efforts are being made within the semiconductor industry to try to keep miniaturization going. But no amount of investment can change the laws of physics. At some pointnow not very far awaya new computer that simply has smaller transistors will no longer be any cheaper, faster, or more energy efficient than its predecessors. At that point, the progress of conventional semiconductor technology will stop.

What about unconventional semiconductor technology, such as carbon-nanotube transistors, tunneling transistors, or spintronic devices? Unf...


Evolution Host SSD and HDD Starter Packs on sale now! Low End Box

Mike from Evolution Host just sent in an offer for 50% off their VPS plans and were happy to bring the offer to you. Theyve got 7 locations, two of which are new (Dallas and Nuremberg).

In their own words: 

Evolution Host has been in existence since 2012 and openly trading in hosting solutions since 2013. (Formerly We strive for innovation and expansion by utilizing the latest technologies available and trying to reach as many locations as we can to provide our clients the best experience possible. Our support team is the core of our business, it is our goal to ensure every client is more than satisfied with their Evolution Host experience.

We include free DDoS Protection in each location. We do not simply use our upstream providers protection, when an attack makes it through their protection, we analyze the traffic and implement a permanent solution for the client. We also utilize Internap Route optimization technology in our USA locations and also have off-site backups in cases of natural  disasters etc. Our webservers are geo distributed between France, Canada, USA and Australia. Therefore the control panel will be more responsive for any clients close to these regions. The global spread ensures that the majority of users are close to a web server.

They accept PayPal and Bitcoin as payment, their WHOIS is public, and you can find their legal doc here.

The offers:

SSD Offers:

Mini SSD Package
1x vCPU
7GB SSD space
1TB transfer
100Mbps uplink
1x IPv4
/112 IPv6
Coupon: LEB50

Starter SSD Package
1x vCPU
10GB SSD space
1TB transfer
125Mbps uplink
1x IPv4
/112 IPv6
Coupon: 30BOX

HDD Offers:

Mini HDD Package
1x vCPU
25GB HDD space...


Fappening 2: Private Photos of Nicole Scherzinger, Faye Alicia Brookes, Dakota Johnson and Addison Timlin leaked TechWorm

Call it Fappening 2 or Fappening 3!!! Hackers keep their promise by leaking intimate and personal photos and videos of  Nicole Scherzinger, Faye Alicia Brookes, Dakota Johnson and Addison Timlin

Call it what you want, Fappening 2.0 or Fappening 3.0 but the NSFW leaks are real. The hackers on Thursday had promised more Fappening leaks and true to their word, the hackers leaked private and intimate images of Fifty Shades of Greys Dakota Johnson, actress Faye Alicia Brookes, Pussycat Dolls member Nicole Scherzinger, and Addison Timlin.

The latest leak came days after the iCloud hackers had released explicit and private photos of Miley Cyrus, Kristen Stewart, Lindsey Vonn, Katharine McPhee and Anne Hathaway. This was followed by NSFW leaks of ace golfer, Tiger Woods and his ex-girlfriend, Olympic Skier, Lindsey Vonn.

Lindsey Vonn who is preparing for the 2018 Winter Olympics blasted the hackers for intruding her privacy and leaking images which are said to be from 2015 when she was going steady with Tiger Woods. She has also initiated legal proceedings against the notorious gossip website for carrying the images.

The hackers on their part had promised more Fappening leaks and today they leaked private and explicit images of Dakota Johnson, actress Faye Alicia Brookes, Pussycat Dolls member Nicole Scherzinger, and Addison Timlin. The hackers used the same modus operandi to leak the images, i.e. using the celeb gossip website.

This leak like others also contains images and a video clip showing celebrities in their private moments. For instance, Nicole Scherzinger can be seen on her bed and in the washroom, Faye Alicia Brookes can be viewed in a video clip sharing personal moments with her partner while Dakota Johnson and Addison Timlin can be seen together taking a bath.

Fappening 2.0: List of Celebrities whose NSFW images have been leaked and whom to expect next [Updated]

Unlike Lindsey, the current Fappening victims have chosen to not comment on the leaks. After the infamous Fappening 1.0 of 2014, the hackers had started leaking celeb NSFW images in the month of April this year. This was named as Fappening 2.0 by website including yours truely.

The current crop of leaks seems to from the same set because this is the sixth time this year that personal photos and video clip of celebrities have been leaked. As before, t...


uSat finally decoded Daniel Estvez

More than a year ago, I spoke about my efforts to decode uSat-1 and -2. I got as far as reverse-engineering the syncword and packet length, and I conjectured that the last 4 bytes of the packet were a CRC, but without the scrambler algorithm I couldn't do much. Recently I've been exchanging some emails with Gerardo Richarte from Satellogic, which is the company behind the uSat satellites. He has been able to provide me the details of the protocol that I wasn't able to reverse engineer. The result of this exchange is that a complete decoder for uSat-1 and -2 is now included in gr-satellites, together with an example recording. The beacon format is still unknown, but there is some ASCII data in the beacon. Here I summarise the technical details of the protocol used by uSat. Thanks to Gerardo for his help and to Mike DK3WN for insisting into getting this job eventually done.

The first thing to admit is that I got the syncword wrong: I thought that the syncword was 0x00F2D566, but the correct syncword is 0x01E5AACC. Note that the correct syncword is just 0x00F2D566 shifted to the left by one bit. The reason for this error is that when the preamble is an alternating sequence of 0's and 1's, it is difficult to guess if the preamble ends as ...0101 or as ...1010. An error in this guess will shift the reverse-engineered syncword by one bit. Of course, after guessing the syncword incorrectly, all my packets were shifted one bit. It took us several days to realise this.

uSat packets are 64 bytes long, as I correctly guessed, and they are scrambled. However, a (64, 60) Reed-Solomon code is applied after scrambling, so the first step in the decoding process is to decode the Reed-Solomon code. The RS code used by uSat is compatible with the implementation in the rscode library, so I have just included the relevant files from this library into gr-satellites. Note that the 4 last bytes of the packet are not a CRC, as I expected, but rather the Reed-Solomon check bytes.

After doing Reed-Solomon decoding and stripping these 4 last bytes, we are left with a 60 byte packet. The first two bytes are a header, and the remaining 58 bytes are the beacon. The first byte of the header is the length of the beacon, so its content is always 58. The second byte of the header is a CRC-8 of the 58 bytes comprising the beacon. However, the beacon is scrambled, so it must be descrambled before checking the CRC-8. Note that 2 byte header is not scrambled.

The scrambler is just an...


Go 1.9 released

Version 1.9 of the Go language has been released. "The most important change to the language is the introduction of type aliases: a feature created to support gradual code repair." See the release notes for details.


Samsung leader sentenced to five years in prison in bribery case The Hill: Technology Policy

Samsung leader Jay Y. Lee was sentenced to five years in prison on Friday by a South Korean court for his role in a bribery scandal that also brought down the countrys president, according to Reuters.Lee was convicted of bribing former...


Security updates for Friday

Security updates have been issued by Fedora (taglib), Mageia (augeas, gstreamer1.0, perltidy, thunderbird, unrar, and xmlsec1), openSUSE (GraphicsMagick), and Oracle (kernel and thunderbird).


SHACamp 2017, A Personal Review Hackaday

There are a series of stages to coming down from a festival. After the hectic rush of travel there are the several days of catching up on lost sleep and picking up the threads of your life again, then once a semblance of order has been regained theres that few weeks of emptiness. Your life will never be the same again, its all so mundane.

I'm pleased to say the Hackaday and Tindie stickers were very popular.Im pleased to say the Hackaday and Tindie stickers were very popular.

Its now a couple of weeks since the SHACamp 2017 hacker festival in the Netherlands was in full swing, and the write-up below has slowly taken shape over that time amid the other work of being a Hackaday scribe and editor. Its early morning here in Southern England as I write this, so on the equivalent day while I was at SHACamp at this time I would have been carrying a large pack of stickers for distribution on the swapping table through the rising sunlight of a camp still largely asleep after the previous nights revelry. Past our German and Dutch immediate neighbours, down the ramp from the dyke, the cardboard tent depot on my left and the food court on my right, to the information tent. Greet the bleary-eyed volunteer at the end of their...


Guide to Linux App Is a Handy Tool for Every Level of Linux User

Guide to Linux App Is a Handy Tool for Every Level of Linux User


Some Early AMD Ryzen Threadripper 1950X Linux Benchmarks Phoronix

Yesterday along with the completely Linux-trouble-free Ryzen 7 (it indeed went overnight without any issues coming up via the kill-ryzen script), I finally got my hands on the AMD Threadripper. In particular, the Ryzen Threadripper 1950X that features sixteen physical cores yielding 32 threads via SMT, 3.4GHz base frequency, 4.0GHz boost clock frequency, and quad-channel DDR4 support. This Threadripper 1950X is a beast but will set you back $999 USD and has a 180 Watt TDP. I'll have my much more thorough AMD Ryzen Threadripper 1950X Linux review next week including many more benchmarks, performance-per-dollar, and system power use / performance-per-Watt metrics, but here are some very early results for those anxious to see this HEDT PC on Linux.


Mobile biometric driver's licenses coming to a state near you MassPrivateI

image credit: MorphoTrust

MorphoTrust (MT) is trying to convince motorists that mobile biometric drivers licenses (MDL) are a good thing. Two years ago MT convinced the Iowa Department of Transportation (DOT) to pilot their mobile driver's license program.

MT wants you to download an image of your driver's license to your smartphone and use that instead of a physical license. A KTVQ video revealed how the MT app uses facial recognition to verify an individual's identity.

Using a mobile biomteric driver's license poses numerous privacy concerns.

MT and the DOT claim motorists can hit a button that will allow the police to only see your license information. But what if you forget to hit the button, would the police officer have access to all your personal information?

The reasons to never use MDL's are too numerous to mention here, but an article in USA Today does a good job of addressing some of my privacy concerns.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Friday, 25 August


New infosec products of the week: August 25, 2017 Help Net Security

Malwarebytes for Android features proprietary anti-ransomware technology Malwarebytes released Malwarebytes for Android, featuring targeted defense against mobile malware, ransomware, adware, infected applications and unauthorized surveillance. To optimize the mobility of these features, Malwarebytes for Android can be easily managed from a desktop widget. The app can also be controlled using SMS to remotely lock a device, remediate a device if it is being held ransom, and reset device pin codes. Elcomsoft Phone Breaker 7.0 extracts More


Elon Musks Boring Company Wins Approval to Dig a Two-Mile Test Tunnel in California

Via: The Verge: The City Council in Hawthorne, California voted four to one last night in favor of a plan from Elon Musks Boring Company to dig a two-mile-long underground test tunnel. The Boring Company, which operates from SpaceXs headquarters in Hawthorne outside Los Angeles, had until now only dug into and under its own []


A Thorium-Salt Reactor Has Fired Up for the First Time In Four Decades SoylentNews

Arthur T Knackerbracket has found the following story:

The road to cleaner, meltdown-proof nuclear power has taken a big step forward. Researchers at NRG, a Dutch nuclear materials firm, have begun the first tests of nuclear fission using thorium salts since experiments ended at Oak Ridge National Laboratory in the early 1970s.

Thorium has several advantages over uranium, the fuel that powers most nuclear reactors in service today. First, it's much harder to weaponize. Second, as we pointed out last year in a long read on thorium-salt reactors, designs that call for using it in a liquid form are, essentially, self-regulating and fail-safe.

The team at NRG is testing several reactor designs [javascript required] on a small scale at first. The first experiment is on a setup called a molten-salt fast reactor, which burns thorium salt and in theory should also be able to consume spent nuclear fuel from typical uranium fission reactions.

The tests come amid renewed global interest in thorium. While updated models of uranium-fueled power plants are struggling mightily to get off the ground in the U.S., several startup companies are exploring molten-salt reactors. China, meanwhile, is charging ahead with big plans for its nuclear industry, including a heavy bet on thorium-based reactors. The country plans to have the first such power plants hooked up to the grid inside 15 years. If they pull it off, it might just help usher in a safer future for nuclear power.

-- submitted from IRC

Original Submission

Read more of this story at SoylentNews.


How to take a screenshot on windows 7, 8 and 10 Hub of handy tutorials

You can take a screenshot on just about any platform, and Windows is no different. It has a bulit-in option that works great for basic tasks, but many third-party programs offer more ease of use and features. In this article Ill show you a few different ways to take a screenshot in Windows 10.

Method 1: Take Quick Screenshots with Print Screen

The Print Screen button on your keyboard can take a screenshot and save it as a file, take a screenshot without saving it as a file, or take a screenshot of only one window (instead of the whole screen). The print screen button may be labeled as PrtScn, PrntScrn, Print Scr, or something similar. On most keyboards, the button is usually found between F12 and Scroll Lock. On laptop keyboards, you may have to press the Function or Fn key to access the Print Screen feature. When you press the key, it will look like nothing happened, but the screenshot has been saved to your clipboard.

To Save Your Screenshot as a File

Press the Windows logo key + PrtScn. If youre using a tablet, press the Windows logo button + volume down button. On some laptops and other devices, you may need to press the Windows logo key + Ctrl + PrtScn or Windows logo key + Fn +...


A step toward practical quantum encryption over free-space networks Help Net Security

Researchers have sent a quantum-secured message containing more than one bit of information per photon through the air above a city. The demonstration showed that it could one day be practical to use high-capacity, free-space quantum communication to create a highly secure link between ground-based networks and satellites, a requirement for creating a global quantum encryption network. Quantum encryption uses photons to encode information in the form of quantum bits. In its simplest form, known More


This Week in Open Source News: The Linux Foundation's 2017 Open Source Jobs Report Released & More

This Week in Open Source News: The Linux Foundation's 2017 Open Source Jobs Report Released & More


Zero'ing memory, compiler optimizations and memset_s David Wong | Cryptologie | HTML

tl;dr: use this code

When a program uses a secret key for some cryptographic operation, it will store it somewhere in memory. This is a problem because it is trivial to read what has been previously stored in memory from a different program, just create something like this:

#include <stdio.h>

int main(){
    unsigned char a[5000];
    for(int i = 0; i < 10000; i++) {
        printf("x", a[i]);

This will print out whatever was previously there in memory, because the buffer a is not initialized to zeros. Actually, C seldom initializes things to zeros, it can if you specifically use something like calloc instead of malloc or static in front of a global variable/struct/...

This is a problem.

To remove a key from memory, developers tend to write something like this:

memset(private_key, 0, sizeof(*private_key));

Unfortunately, when the compiler sees something like this, it will remove it. Indeed, this code is useless since the variable is not used anymore after, and the compiler will optimize it out.

How to fix this issue?

A memset_s function was proposed and introduced in C11. It is basically a safe memset (you need to pass in the size of the pointer you're zero'ing as argument) that will not get optimized out. Unfortunately as Martin Sebor notes:

memset_s is an optional feature of the C11 standard and as such isn't really portable. (AFAIK, there also are no conforming C11 implementations that provide the optional Annex K in which the function is defined.)

To use it, a #define at the right place can be used, and another #define is used as a notice that you can now use the memset_s function.

#define __STDC_WANT_LIB_EXT1__ 1
#include <string.h>
#include <stdlib.h>

// ...

#ifdef __STDC_LIB_EXT1__
memset_s(pointer, size_data, 0, size_to_remove);

Unfortunately you cannot rely on this for portability. For example on macOS the two #define are not used and you need to use memset_s directly.

Martin Sebor adds in the same comment:

The GCC -fno-builtin-memset option can be used to prevent compatible compilers from optimizing away calls to memset that aren't strictly speaking necessary.

Unfortunately, it seems like macOS' gcc...


Security issues of the top and bottom government organizations Help Net Security

SecurityScorecard released its annual U.S. State and Federal Government Cybersecurity Report, which paints a grim picture of the overall cyber health of the nations government entities. Industry ranking by social engineering In the midst of investigations into a potential 2016 election hacking, regular major malware events, and an overall increase in the number of sophisticated cyberattacks, the report highlights that the government sector is lagging compared to almost every other industry. However, there are some More


RE: CVE Request: Multiple security issues in OpenJPEG Open Source Security

Posted by on Aug 25


I'll submit them to cveform next week. And I'll update this thread when more information is available.


-----Original Message-----
From: winsonliu()
Sent: 2017824 9:26
To: 'Vladis Dronov' <vdronov () redhat com>; oss-security () lists openwall com; 'Alan Coopersmith' <alan.coopersmith
() oracle com>
Cc: cve-assign <cve-assign () mitre org>
Subject: RE:...


Company Behind Dakota Access Oil Pipeline Sues Greenpeace SoylentNews

The company that built the disputed Dakota Access oil pipeline filed a lawsuit against Greenpeace and other groups on Tuesday, alleging that they disseminated false and misleading information about the project and interfered with its construction.

In its lawsuit, which was filed in federal court in North Dakota, Texas-based Energy Transfer Partners requests damages that could approach $1 billion.

The company alleges that the groups' actions interfered with its business, facilitated crimes and acts of terrorism, incited violence, targeted financial institutions that backed the project and violated racketeering and defamation laws. The company seeks a trial and monetary damages, noting that disruptions to construction alone cost it at least $300 million and requesting triple damages.

The group of defendants "is comprised of rogue environmental groups and militant individuals who employ a pattern of criminal activity and a campaign of misinformation for purposes of increasing donations and advancing their political or business agendas," the company said in a statement.

Greenpeace attorney Tom Wetterer said the lawsuit is "meritless" and part of "a pattern of harassment by corporate bullies."

The lawsuit is "not designed to seek justice, but to silence free speech through expensive, time-consuming litigation," Wetterer said.

Original Submission

Read more of this story at SoylentNews.


Wooden Word Wristwatch Wows Woomies Hackaday

[HakuG] wanted to make a watch for his roommates, and had a design project due. He killed two birds with one stone, and then some. The result is a classic word clock, but with a refined all-wood look thats also small enough to wear on your wrist.

Nothing good ever comes out right the first time, and the log of [HakuG]s different versions is full of different attempts, all of them just fine in their own right, but none of them perfect. Kudos to [HakuG] for sticking with it and refining the project far past the initial prototype stage to something that really looks like a finished product.

Of course weve covered word clocks before. Heck, weve even seen a beautiful wooden one. But were pretty sure that this is the first wooden word-clock watch weve ever written up, and its surely one of the nicest.

Thanks [Paul Hein] for the link!

Filed under: clock hacks


Digital Natives Lifeboat News: The Blog

With accelerating change and innovation what will be the most exciting aerospace careers and professions of the next 20 or 50 years? Commentary from TIM ROBINSON.


How to Survive the Great Tech Panic of 2017 Lifeboat News: The Blog

Of course, every generation regards its reckoning with new technology as a turning point for the species. But whats important to realize, whether our blip in history is truly pivotal or just another moment of five-alarm normalcy, is this: The choices people make in the face of anxiety always determine whether the world they leave behind looks more utopian than dystopian.

Every generation regards its reckoning with new technology as a turning point for the species. You just have to learn to stop worrying and love the future.


Moby Project and Open Source Summit North America

Docker will be at Open Source Summit from to highlight new development with the Moby Project and its various components: containerdLinuxKit, InfraKitNotary, etc.

Come see us at Booth #510 to learn more about:


SDL Lands Initial Support For OpenGL KHR_no_error Phoronix

The Simple DirectMedia Library (SDL) now has initial support for the KHR_no_error extension that was included in this summer's release of OpenGL 4.6...


OpenChrome DRM Still Being Ported To Newer Kernel, Lengthy Process Phoronix

Self-appointed OpenChrome project maintainer Kevin Brace who for the past year or so has been single-handedly managing the open-source VIA "OpenChrome" graphics driver code-base, is still working towards getting the work-in-progress Direct Rendering Manager (DRM) driver working on newer builds of the Linux kernel...


Robot Mechanic Could Prevent Satellites From Becoming Space Junk Lifeboat News: The Blog

Lets say you are the program manager of a very large, complex system. Perhaps its an aircraft, or a building, or a communications network. Your system is valued at over US $500 million. Could you imagine being told that you wont ever be able to maintain it? That once its operational, it will never be inspected, repaired, or upgraded with new hardware?

Welcome to the world of satellite building. After a satellite is launched, it is on a one-way journey to disrepair and obsolescence, and there is little anyone can do to alter that path. Faults (which are called anomalies in the space business) can only be diagnosed remotely, using data and inferential reasoning. Software fixes and upgrades may be possible, but the nuts and bolts remain untouched. The upshot: Even if a satellite is operating well, it could lose its state-of-the-art status just a few years into a typical 15-year lifetime.

If governments and private companies could actively repair and revitalize their satellites in geosynchronous orbitand move them to new orbits as neededthey could extend the lifespans of their investments and substantially defer the cost of building and launching replacements.


Go 1.9 Adds Type Aliases, Parallel Compilation Phoronix

Version 1.9 of Google's Go programming language is now available for developers...


Half a Dozen Clever Linux Command Line Tricks

Some very useful commands for making life on the command line more rewarding.

Working on the Linux command can be a lot of fun, but it can be even more fun when you use commands that take less work on your part or display information in interesting and useful ways. In todays post, were going to look at half a dozen commands that might make your time on the command line more profitable.


Cloud Foundry Foundation: A Platform Where Competitors Collaborate

The Linux Foundation is host to more than 100 open source projects, but only a handful are foundations unto themselves. Cloud Foundry Foundation is unique in its standing as a Linux Foundation project: a nonprofit foundation and an open source project that came to the table fully formed.


How To Flash Android (Flyme) On Meizu MX4 Ubuntu Edition Web Upd8 - Ubuntu / Linux blog

Meizu MX4 Ubuntu Edition

This is a quick guide for how to reflash Fyme OS on Meizu MX4 Ubuntu Edition. Flyme is based on Android with some redesign along with extras. It doesn't ship with Google apps, but those are easily installable.

You can flash Flyme 5.1.12G or 6.1.0G (released recently), both based on Android 5.1. To see what's new in Flyme 6, check out THIS page. Using the steps below, you should receive future Flyme OS updates automatically, so there's no need to reflash anything manually for any OS updates.

Flash Android (Flyme) On Meizu MX4 Ubuntu Edition)

Before proceeding, make sure your phone is charged. Also, like with any flashing procedure, this may brick your device, so use these instructions at your own risk! And finally, I should mention that I didn't yet try to perform a reverse procedure (install Ubuntu Touch back) so if you plan on doing this in the future, you'll have to figure out how to do it yourself.

1. What you'll need

1.A. adb and fastboot.

In Ubuntu, adb and fastboot are available in the official repositories. To install them, use the following commands:
sudo apt install adb fastboot

These can also be downloaded from HERE (for Linux, Mac and Windows).

1.B. Flyme firmware (global version).

The Meizu MX4 global firmware is available to download from HERE.

1.C. recovery.img from Flyme OS.

This can be downloaded from HERE or HERE.

Place the firmware along with the recovery image in your home folder.

2. Enable Developer mode on your Meizu MX4 Ubuntu Edition (About phone > Developer mode).

3. You may encounter an error...


Mozilla's Servo Made Several Advancements This Summer Phoronix

Mozilla had several student developers contributing to their next-gen Servo engine via this year's Google Summer of Code. Overall the work appears to be a big success and boost for Servo...


Linux Turns 26 Years Old Phoronix

Today is the day most commonly associated as the birthday of Linux. Happy 26th birthday Linux!..


Science Abandons Trump! SoylentNews

Daniel Kammen, a renewable energy expert appointed last year as a science envoy to the State Department, resigned Wednesday, citing President Trump's response to the violence in Charlottesville as the final straw that led to his departure.

Kind of makes you wonder, you know, what kind of President could provoke a science envoy to the State department to resign. But not far to look! As Kammen goes on:

In a resignation letter posted to Twitter, Kammen wrote that Trump's remarks about the racial violence in Virginia had attacked "core values of the United States" and that it would have "domestic and international ramifications."

Even American scientists have ethics, and will not serve violent racist regimes, like Nazi Germany. So there is that.

But the most interesting thing, is the encryption:

However, his most biting message may have come in the form of a hidden acrostic: The first letter of each paragraph spelled out I-M-P-E-A-C-H.

Original Submission

Read more of this story at SoylentNews.


Easy-to-Use Apps Allow Anyone to Create Android Ransomware Within Seconds The Hacker News

"Ransomware" threat is on the rise, and cyber criminals are making millions of dollars by victimizing as many people as they canwith WannaCry, NotPetya and LeakerLocker being the ransomware threats that made headlines recently. What's BAD? Hacker even started selling ransomware-as-a-service (RaaS) kits in an attempt to spread this creepy threat more easily, so that even a non-tech user can


As Expected, Dennis Crouch Continues Spreading Myths and Falsehoods to Help Patent Trolls and Patent Extremists Techrights

King of the trolls/patent maximalists in scholarly clothing?

Dennis Crouch at the University of Houston Law Center
Photo credit: University of Houston Law Center

Summary: A patent maximalists blog of Dennis Crouch continues to meddle and calls for meddling (in the form of briefs) ahead of a Supreme Court decision that primarily deals with patent quality and impacts patent trolls

YESTERDAY, Crouchs series of anti-PTAB posts (e.g. [1, 2]) culminated in admission of his own error. He then wrote about Dismantling Inter Partes Review (the very essence of PTAB). Its no secret that he is a PTAB foe, but nowadays he makes it far too obvious.

One might even say not baselessly that Crouch has inadvertently become little more than a lobbyist of patent trolls and aggressors. He is disguised as an academic, so courts would be inclined to listen to him. Oil States has now filed its very well written opening merits brief, Crouch wrote, probably inviting the patent maximalists who read his blog to do the same. Briefing will continue over the next few months, and I expect substantial amicus filing on both sides of the case, as well as input from President Trumps Department of Justice, he added.

We expect the patent industry to use this as an opportunity to try to destroy PTAB.Its not hard to know which side he is on, having bashed PTAB for a very long time. He surely knows whats at stake here. He ends with these words: One way that the court could rule against Oil States is by ruling that the IPR cancellation process involves public rights rather than private property rights.

Same old nonsense from him, comparing patents to property or...


Teaching Kids Coding, by the Book

Over the past five years, some 40,000 girls have learned to code through the Girls Who Codes summer camps and afterschool programs. But Ms. Saujani wanted to expand the groups reach, and was looking for new ways to recruit girls into the tech industry.


Quintuple-Sized LEGO Go-Kart Hackaday

[Matt Denton] was inspired by [James Bruton]s scaled up LEGO and decided to create his own giant LEGO project. He found a classic model that he wanted to scale up.  1985s Technic Go-Kart (set #1972) contained 98 pieces and seemed manageable.

He wanted to create something his 8yo nephew [Ruben] could sit in, but had to rule out a fully kid-sized go-kart. It had also to be (at least somewhat) economical with regards to plastic and printing time. [Matt] settled on sizing the largest piecethe 28 plateto fit diagonally on the 11x11 bed of his Lulzbot Taz5.

It took 168 hours to print all 98 parts (some of them in a series of smaller pieces), 5 kilos total of filament at mostly 20% infill. The resulting car can be assembled and disassembled just like LEGOno glue! The rack and pinion steering actually works and the Ninjaflex-tired wheels roll as one would expect. So, pretty much the same as the real model only five times bigger. The only non-LEGO components are threaded rods down the middle of his cross axles as well as the hose, just Neoprene hosing from a hardware store.

[Matt] is well-known to Hackaday readers, being one of the original BB-8 builders as well as co-creator of the Mantis walking robot. Hell be on hand this weekend in Maker Faire Hannover to share this project, Mantis, and others.

Filed under: 3d Printer hacks


At EPO, Producing Stronger Patents (or Being Able to Produce Them) is Also a Matter of Professional Pride for the Examiners Techrights

If the EPO produced an academic journal, nobody would subscribe to read it

Peer Review for Journals: Evidence on Quality Control, Fairness, and Innovation, J. Scott Armstrong, The Wharton School, University of Pennsylvania

Summary: Producing European Patents (EPs) that are solid and have merit is still a priority for examiners at the European Patent Office (EPO), but not for the management

THE ACCELERATION of granting, to be followed by accelerated litigation, is a horrible legacy of Battistelli. PPH, Early Certainty, PACE, UPC etc. are designed to tilt the system in favour of bullies and patent trolls, not actual inventors. It is basically a rather gross distortion of what the patent system (not only in Europe) was intended to do and supposed to accomplish. Patent examiners are clever enough to understand this, whereas Battistelli and his unqualified team understand nothing but power and leverage (and gratuitous bonuses for themselves).

The worryingly low quality of patents (EPs) granted over the past few years threatens to engulf Europe with litigation; UPC would give such litigation even more teeth.The UPC is quite likely dead, but the EPOs management tries to float it in headlines like these ones from the past 24 hours [1, 2].

Germany and the UK still need to ratify the Unified Patent Court Agreement before the unitary patent system can come into force, one article says. Once a European patent has been granted, a separate, simple post-grant procedure can be initiated at the EPO with a view to obtaining a Unitary Patent, says the other. But there is no UPC yet and there may never be UPC at all. Nor should be

The worryingly low quality of patents (EPs) granted over the past few years threatens to engulf Europe with litigation; UPC would give such litigation even more teeth&#8217...


This Linux Tool Could Improve the Security of IoT Devices SoylentNews

Submitted via IRC for TheMightyBuzzard

Snappy, a software deployment and management system designed by Canonical for the Ubuntu operating system, could be a shortcut to building trusted IoT applications.

The first rule of building a secure and feature-rich ecosystem is software management  push and pull software updates and software discovery through an app store mechanism from a trusted source.

In the go-to-market IoT race, though, that often doesn't happen. Many Internet of Things (IoT) product developers have ignored the traumatic early history of Microsoft Windows, Android and web platforms, and expoits of IoT devices because software updates have not been designed in are regularly reported.

Those earlier platforms have been hardened, updates have been automated, and the app discovery and installation have been made trustworthy. IoT developers need to follow their lead. 

Snappy, a software deployment and package management system designed and built by Canonical for the Ubuntu operating system, could be a shortcut to building a trusted IoT application.

The Ubuntu-Core required to integrate Snappy software management system uses 612MB, and snapd, the endpoint software management service needed to interact with Snappy, uses 15MB. The IoT device would need 627MB-plus memory for the IoT app called a snap. Because of memory and computational constraints, it is not a solution for ultra-low-power, small memory microcontroller devices but would work with 32-bit devices like the Raspberry Pi. Nevertheless, a review of Snappy is worth the time because it clearly explains a fairly complete approach to the problem of trusted software management and distribution.


Original Submission

Read more of this story at SoylentNews.


Entire Kim Dotcom Spying Operation Was Illegal, High Court Rules TorrentFreak

In the months that preceded the January 2012 raid on file-storage site Megaupload, authorities in New Zealand used the Government Communications Security Bureau (GCSB) spy agency to monitor Kim and Mona Dotcom, plus Megaupload co-defendant Bram van der Kolk.

When this fact was revealed it developed into a crisis. The GCSB was forbidden by law from conducting surveillance on its own citizens or permanent residents in the country, which led to former Prime Minister John Key later apologizing for the error.

With Dotcom determined to uncover the truth, the entrepreneur launched legal action in pursuit of the information illegally obtained by GCSB and to obtain compensation. In July, the High Court determined that Dotcom wouldnt get access to the information but it also revealed that the scope of the spying went on much longer than previously admitted, a fact later confirmed by the police.

This raised the specter that not only did the GCSB continue to spy on Dotcom after it knew it was acting illegally, but that an earlier affidavit from a GCSB staff member was suspect.

With the saga continuing to drag on, revelations published in New Zealand this morning indicate that not only was the spying on Dotcom illegal, the entire spying operation which included his Megaupload co-defendants was too.

The reports are based on documents released by Lawyer Peter Spring, who is acting for Bram van der Kolk and Mathias Ortmann. Spring says that the High Court decision, which dates back to December but has only just been made available, shows that the whole surveillance operation fell outside the authorization of the GCSB legislation as it was at the relevant time.

Since Dotcom is a permanent resident of New Zealand, its long been established that the GCSB acted illegally when it spied on him. As foreigners, however, Megaupload co-defendants Finn Batato and Mathias Ortmann were previously considered valid surveillance targets.

It now transpires that the GCSB wasnt prepared to mount a defense or reveal its methods concerning their surveillance, something which boosted the case against it.

The circumstances of the interceptions of Messrs Ortmann and Batatos communications are Top Secret and it has not proved possible to plead to the allegations the plaintiffs have made without revealing i...


Inside the Ring: Report: AI threatens humanity Lifeboat News: The Blog

Rooting for the AIs.

Artificial intelligence is revolutionizing warfare and espionage in ways similar to the invention of nuclear arms and ultimately could destroy humanity, according to a new government-sponsored study.

Advances in artificial intelligence, or AI, and a subset called machine learning are occurring much faster than expected and will provide U.S. military and intelligence services with powerful new high-technology warfare and spying capabilities, says a report by two AI experts produced for Harvards Belfer Center.

The range of coming advanced AI weapons include: robot assassins, superfast cyber attack machines, driverless car bombs and swarms of small explosive kamikaze drones.


This Small Quantum-Computing Firm Wants to Supercharge AI Startups Lifeboat News: The Blog

Berkeley-based quantum computing firm Rigetti will allow 40 machine learning startups from 11 countries to make use of its devices to help crunch their AI problems.

Rigetti is small compared to its main rivalsthe likes of Google, IBM, and Intel. But as weve reported in the past, the firm is working on a complex chip architecture that promises to scale up well, and should be particularly suited to applications like machine learning and chemistry simulations. Thats why we made it one of our 50 Smartest Companies of 2017.

But, like IBM and Google, part of Rigettis business model has always been to develop a kind of quantum-powered cloud service that would allow people to make use of its technology remotely. The newly announced partnershipwhich will be with companies from Creative Destruction Lab, a Canadian incubator that focuses on science-based startupsis a chance to test that theory out using Rigettis Forest programming environment.


FBI Arrests Another Hacker Who Visited United States to Attend a Conference The Hacker News

The FBI has arrested a Chinese citizen for allegedly distributing malware used in the 2015 massive OPM breach that resulted in the theft of personal details of more than 25 Million U.S. federal employees, including 5.6 Million federal officials' fingerprints. Yu Pingan, identified by the agency as the pseudonym "GoldSun," was arrested at Los Angeles international airport on Wednesday when he


Zerodium payouts for Messaging, Email App Exploits are $500,000 Security Affairs

Zerodium payouts include up to $500,000 for RCE and privilege escalation vulnerabilities affecting popular instant messaging and email applications.

The zero-day and exploit broker Zerodium, founded by former VUPEN co-founder Chaouki Bekrar, offers $500,000 for a zero-day exploit in secure messaging Messaging (i.e. such as WhatsApp, Signal, Facebook Messenger, iMessage, Telegram, WeChat, Viber) and Email App.

Secure messaging apps continues to represent a serious obstacle to the investigations conducted by law enforcement agencies and secret services, for this reason, zero-day exploits are precious commodities.

The firm has officially announced that it will reward experts for remote code execution and privilege escalation vulnerabilities affecting popular instant messaging and email applications.

The company published separate payout lists for mobile device exploits and desktop and server exploits.

zerodium payouts

Zerodium offers half a million dollars for SMS/MMS flaws and exploits targeting default email apps on both iOS and Android.

The company will pay up to $1.5 million for a remote iPhone jailbreak that will not need any user interaction, while the same exploit with user interaction will be paid up to $1 million.

Looking at the payout lists we can notice new entries in the mobile category, such as baseband, and media file and document vulnerabilities.

Zerodium will pay up to $100,000 for sandbox escapes, code-signing bypasses, kernel LPE, Wi-Fi RCE and LPE, and SS7 attacks.

Zerodium also announced that it would offer $300,000 for Windows 10 remote code execution zero days, especially exploits for Windows services suc...


Can Science Reverse Aging? Lifeboat News: The Blog

Futurist Jos Cordeiro talks longevity, AI, and the humanitarian crisis in Venezuela.

Like us on Facebook:
Follow us on Twitter:

Reason is the planets leading source of news, politics, and culture from a libertarian perspective. Go to for a point of view you wont get from legacy media and old left-right opinion magazines.

In 30 years, I will be younger than today, not older, says Jos Luis Cordeiro, whos a founding faculty member at Singularity University, a Silicon Valley-based think tank devoted to futurism. Why? Because we are going to have rejuvenation techniques, and these experiments are beginning right now.

A mechanical engineer with a degree from MIT, Cordeiro has worked in fields ranging from monetary policy to petroleum engineering, and he created the first formal future studies course at the Austrian School of Economics in Venezuela, his birth country.


Thorium salt reactor experiments resume after 40 years Lifeboat News: The Blog

Scientists at the Nuclear Research and Consultancy Group (NRG) the Netherlands, are looking back to the 1970s to meet the energy needs of the future. For the first time since 1976, the NRG team is conducting experiments in thorium molten salt reactor technology that could lead to cleaner, safer nuclear reactors capable of supplying energy on a global scale.


Iodine, Thyroid and Low Body Temperature Terra Forming Terra

The take home is that this is something you must do yourself.  Get a digital thermometer.  Check your temperature under the tongue. Add a drop of iodine to a glass of water.  Go from there as a daily practice.

One can become more rigorous, but that depends on you.  I will likely add a couple of drops to see if this cause convergence for me.  Yet a half degree is pretty modest but also meaningful and generally undesirable.  We want to close it up.

One also needs to take a supportive supplement with the higher dosage anyway and i have not hgone there yet..


Iodine, Thyroid and Low Body Temperature

Published on August 2, 2017

Who will benefit from taking iodine? Actually, the answer is just about everyone will benefit from more iodine. Did you know that over 30% of the US has thyroid problems and that is probably a huge underestimate considering how iodine deficient the population is in the United States and around the world.

Chronic fatigue, low body temperature, weight gain, dry skin and hair, constipation, heavy menstrual periods, thin or hairless lateral eyebrows, depression, even bipolar disease (2/3 of all bipolar patients become normal with correction to normal thyroid activity)all of these are symptoms of low thyroid activity.


These 7 Things Happen To You When You Die Terra Forming Terra


 This holds true for the properly prepared.  Not so true for the ill prepared and those could actually be the majority.  And it is still awful for those who take pleasure in other's pain.  What really comes out of all this is that our real physical spirit body participates in the after life in a way dependent on our own spiritual development and nothing else.

Accepting reality also means ensuring a good outcome by pursuing spiritual practice..

Denying the physical reality of the spirit  can make transition unpleasant.

These 7 Things Happen To You When You Die

by Steven Bancarz

 What happens to us when we die? Where does our soul go? Chances are, if you were brought up in a religious background you believe that there are only 2 places you can go: Heaven and Hell. If you are a good person and believe the right things, you spend eternity in Heaven. If you are a sinful person, you spend an eternity in hell. Thankfully, this is a false dichotomy. 

On top of the fact that it doesnt even make sense to think about only 2 options (both of which are eternal), there has been a lot of scientific investigation into what happens when people leave their bodies when it dies and then return after experiencing time in the...


New Research Discovers That Depression Is An Allergic Reaction To Inflammation Terra Forming Terra

 This is a two year old item i just came across. It spells out a clear biochemical pathway for depression as a potential disease, not unlike the common cold.
The take home is that a strong turmeric ginger pepper  brew will be helpful.  I use it as a base for a vegetable stew or soup and it works well.

You may only alleviate but all that helps.

In the meantime we have a working protocol to develop.
New Research Discovers That Depression Is An Allergic Reaction To Inflammation

 JANUARY 6, 2015

New research is revealing that many cases of depression are caused by an allergic reaction to inflammation. Tim de Chant of NOVA writes: Inflammation is our immune systems natural response to injuries, infections, or foreign compounds. When triggered, the body pumps various cells and proteins to the site through the blood stream, including cytokines, a class of proteins that facilitate intercellular communication. It also happens that people suffering from depression are loaded with cytokines. Inflammation is caused by obesity, high sugar diets, high quantities of trans fats, unhealthy diets in general, and other causes.



A.N. Wilson: Its time Charles Darwin was exposed for the fraud he was Terra Forming Terra

This is actually completely wrong headed and rehashes the debates of old.  The theory of evolution was very much in the air all through his life and no rational person thought that creation really happened in a day or two, anymore than anyone actually thought the world was flat.

Darwin made some guesses as to the driving force of evolution and that is fair enough once you accept evolution. That they have not stood the test of time is hardly a surprise. 
What has stood the test of time is the mere fact of biological evolution itself and that happens to be his real contribution.  What he did was take ship and gathered the masses of independent data necessary to put evolution and speciation on a rock solid foundation to which we have simply added too in the many decades following. 
Throw in modern statistical variation and it is unassailable. .

A.N. Wilson: Its time Charles Darwin was exposed for the fraud he was

Two of his theories about evolution are wrong and one resulting science inspired the Nazis

Charles Darwin, whose bearded face looks out at us from the 10 note, is about to be replaced by Jane Austen. Ive spent the past five years of my life writing his biography and mastering his ideas. Which do you throw out of the balloon? Pride and Prejudice or The Origin of Species?

Funnily enough, in the course of my researches, I found both pride and prejudice in bucketloads among the ardent Darwinians, who would like us to believe that if you do not worship Darwin, you are some kind of nutter. He has become an object of veneration comparable to the old heroes of the Soviet Union, such as Lenin and Stalin, whose statues came tumbling down all over Eastern Europe 20 and more years ago.


When Dark Humor Stops Being Funny - Facts So Romantic Nautilus

Experiencing small doses of negative emotions, elicited by an offensive joke, may make us more resilient to future, more serious set backs.Photograph by Barry Brecheisen / Getty Images

In either ninth or tenth grade, my friend Dan and I found a book of Truly Tasteless Jokes on the cafeteria floor. Our teenage psyches were quickly mesmerized, and we spent the majority of lunch reading it cover to cover. I laughed at one dead baby joke in particular (which I cant repeat here). It involved a blender.

To see if I was a psychopath for taking delight in dead babies, I asked the cartoons editor for the New Yorker, Bob Mankoff, for his opinion. Hes had plenty of time to ruminate on what makes a good joke, and he assured me that I was not a psychopath. Louis C.K., he points out, often gets giggles from depraved thoughts. He has a joke where he asks the audience to consider the love child molesters must have for molesting children, given the punishment if caught. It asks us to consider what is in the mind of a child molester, says Mankoff. Hes asking us to understand the things that drive them. Watching
Read More


Self-driving lorries to be tested on UK roads Lifeboat News: The Blog

Small convoys of partially driverless lorries will be tried out on major British roads by the end of next year, the government has announced.

A contract has been awarded to the Transport Research Laboratory (TRL) to carry out the tests of vehicle platoons.

Up to three lorries will travel in formation, with acceleration and braking controlled by the lead vehicle.


Evacuations in Texas as Category 3 Hurricane Harvey Nears Landfall SoylentNews

"The hurricane warning issued Thursday morning covers an area from Port Mansfield to Matagorda, while tropical storm warnings extend north of Matagorda to High Island, and south to the mouth of the Rio Grande on the Mexico border."

Hurricane Harvey is projected to become Category 3 hurricane, millions ordered to evacuate; forecasts of up to 30 inches rain, 115 MPH possible:

Texans are evacuating or holing up as life-threatening conditions are expected when Hurricane Harvey, the first US Category 3 hurricane to make landfall in nearly a dozen years, could bring flooding and a storm surge that could reach heights of six to 12 feet.

Harvey, which is expected to officially hit Category 3 status by Friday, is expected to make landfall between Texas' coast Friday night or Saturday morning.

[...] Texas and Louisiana both face the prospects of Biblical-level floods, as Harvey will slowly roam the area and is not expected to dissipate until at least Monday.

On Thursday afternoon, Harvey's winds strengthened to 80 mph (128 km/h). Rain is expected from 10 to 20 inches (25.4 to 50.8 cm), while some areas may see 30 inches (76 cm). Flash floods and 115 mph winds are also possible.

"Since Harvey is forecast to stall, we expect 10-20 inches of rain over a large part of southern and eastern Texas and southwestern Louisiana from Friday into early next week," AccuWeather hurricane expert Dan Kottlowski said.

Real-time wind and 3-hour precipitation amounts can be seen on this map.

Meanwhile, provides more technical information in its reporting:

Read more of this story at SoylentNews.


Links 25/8/2017: GIMP 2.9.6 Released, SUSE Cushions Btrfs Techrights

GNOME bluefish



  • 5 Reasons Linux Is Now a Great Option for Anyone

    With the rise of cloud services, more of us are now encountering Linux at work. People know its great for developers and does a good job of keeping the internet up and running but why would anyone want to use Linux at home?

    At best, mentioning you run Linux might make people think youre a hacker. More than likely, they might think youre a bit weird. At least thats how it is in the much of the U.S., where Windows is king and macOS is the only other option most people know exist.

  • Half a dozen clever Linux command line tricks

    Working on the Linux command can be a lot of fun, but it can be even more fun when you use commands that take less work on your part or display information in interesting and useful ways. In todays post, were going to look at half a dozen commands that might make your time on the command line more profitable.

  • Desktop

    • Meet the Laptops & Desktop PCs Being Sold with Ubuntu Budgie

      UK-based computer outfit Nimbusoft is gearing up to sell two laptops and an all-in-one desktop PC pre-loaded with the aforementioned nimble, GNOME-based Ubuntu spin.

      Product pages for these Ubuntu Budgie Edition devices are live over on the Nimbusoft website, although neither the company or the Ubuntu Budgie project itself has made an announcement about the partnership.

    • Germans force Microsoft to scrap future pushy Windows 10 upgrades

      Microsoft sparked fury when it aggressively pushed its Windows 10 operating system onto peoples PCs from unexpected downloads to surprise installations.

      Now a consumer rights group has fo...


DSLogic Plus Teardown and Review Hackaday

The DSLogic open source logic analyzer is on its second release (the plus version) and [OpenTechLab] has a comprehensive review of the new model, which, unlike the original model, includes a different method of connecting probes and provides a separate ground for each input pin.

The device is pretty simple inside with an FPGA, a RAM, and a USB microcontroller. Theres also a configuration EEPROM and a switching power supply. The device stores up to 256 megabits internally and can sample 400 million samples per second on 4 of its 16 channels. [OpenTechLab] even puts the board under a microscope and maps out the input circuit.

Unlike a lot of USB logic analyzers, the new arrangement of probes and dedicated ground allows the probes to use a very short flying lead that connects to a thin piece of coax. This improves the logic analyzer, but [OpenTechLab] notes that without termination resistors, the probes can modify the signal and he even shows a simulation of the effect along with an actual comparison of normal flying lead probes and the ones provided by the DSLogic.

[OpenTechLab] was an active contributor to Sigrok, and he discusses how the original DSLogic software was an unauthorized fork of Pulseview with all the Sigrok licensing and branding removed. Some of the video covers the controversial status of the DSView software which started life as PulseView.

We reviewed the original version back in 2015. Logic analyzers are simpler than used to be, both because you rarely have access to too many internal connections and the availability of cheap FPGA hardware.

Filed under: tool hacks


The Great US-China Biotechnology and Artificial Intelligence Race Lifeboat News: The Blog

The risk factor is that iCarbonX is handling more than personal data, but potentially vulnerable data as the company uses a smartphone application, Meum, for customers to consult for health advice. Remember that the Chinese nascent genomics and AI industry relies on cloud computing for genomics data-storage and exchange, creating, in its wake, new vulnerabilities associated with any internet-based technology. This phenomenon has severe implications. How much consideration has been given to privacy and the evolving notion of personal data in this AI-powered health economy? And is our cyberinfrastructure ready to protect such trove of personal health data from hackers and industrial espionage? In this new race, will China and the U.S. have to constantly accelerate their rate of cyber and bio-innovation to be more resilient? Refining our models of genomics data protection will become a critical biosecurity issue.

Why is Chinese access to U.S. genomic data a national security concern?

Genomics and computing research is inherently dual-use, therefore a strategic advantage in a nations security arsenal.


SpaceX Lost Money on the Latest Falcon 9 Launch SoylentNews

The SpaceX launch of Taiwan's Formosat-5 satellite was delayed by years following a switch from the Falcon 1e rocket and the two Falcon 9 explosions in 2015 and 2016. SpaceX launched the satellite successfully and recovered the first stage booster on a drone ship, but the company won't make any profit on the launch:

[...] Despite the delays, Taiwan didn't opt for another rocket provider like Orbital ATK, which operates the Minotaur rocket for missions to low-Earth orbit at a cost of around $30 million. Instead, SpaceX will pay 1.25 percent of the launch costs back to them for every month that Formosat-5 is delayed, according to the mission's contract.

So how much is SpaceX going to lose on this mission? If you remove the potential reusability of the Falcon 9 booster for a moment, a lot. According to a launch cost analysis by investment firm Jefferies International, SpaceX usually makes a 40 percent profit from $62 million commercial Falcon 9 launches with new boosters. That puts $25 million in the bank and $37 million toward direct launch costs. With Taiwan's severely reduced fare of $23 million, SpaceX is not only foregoing its profit but will be out-of-pocket for the remaining $14 million.

Also at NASASpaceFlight.

Original Submission

Read more of this story at SoylentNews.


Most Americans Live Paycheck to Paycheck

Via: CNBC: No matter how much you earn, getting by is still a struggle for most people these days. Seventy-eight percent of full-time workers said they live paycheck to paycheck, up from 75 percent last year, according to a recent report from CareerBuilder. Overall, 71 percent of all U.S. workers said theyre now in debt, []


Why Richard Branson, Bill Gates and Jack Welch all invested in this start-up that grows meat in a lab Lifeboat News: The Blog

San Francisco Bay area headquartered Memphis Meats announced a $17 million funding raise.


Scientists Are Defining Quantum-Computing Terms Because Everyone Is Confused - MIT Technology Review SoylentNews

Submitted via IRC for Bytram


One persons trapped ion is anothers electrostatically defined quantum dot. I'm talking about qubits, by the waythe quantum-computing equivalent of the bits in regular computers. But if you don't quite follow, don't worry: you're far from being alone.

"Confusions exist on what quantum computing or a quantum computer means," says Hidetoshi Nishimori, a professor at the Tokyo Institute of Technology who specializes in quantum computing.

[...] The snappily titled IEEE P7130 Standard for Quantum Computing Definitions Project will corral experts and define the most important terms in the field so that everybody is reading from the same page.

As this is a nascent field, addressing fragmented terminology now makes excellent sense there are a limited number of papers in the field at the moment, compared to what is envisioned for the future. Compare that to other professions where archaic terminology continues. What something was known as back-in-the-day continues to today because it would be too much work, now, to embrace a new, consistent taxonomy. Especially the medical profession and its terms for various parts of the human anatomy. What profession, if any, has successfully redefined its nomenclature as is envisioned here?


Original Submission

Read more of this story at SoylentNews.


Mini Oscar Mayer Wienermobile Takes Moxie in KC Hackaday

There are no shortage of fantastic and creative Power Racing Series cars, but heres an especially fun example. [Pete Prodoehl] of Milwaukee Makerspace and his teammates [Kathy Cannistra] and [Kyle White] built a Power Racing car based on the design of the iconic Oscar Mayer Wienermobile.

They created the wienie and bun out of fiberglass and foam. Meanwhile, with the KC Maker Faire approaching, the team scrambled to finish the project, with [Kyle] working on assembly while [Pete] tackled the electronics. [Kyle] also proved to be the best wiener rider, with everyone else getting thrown off.

It should be noted that Milwaukee Makerspace got a Moxie bump because a wienermobile is on the PPPRSs hit list of desirable designs. Anyone being the first to create a Top Gun F14, a Mystery Machine, or a non-DeLorean car from Back to the Future gets extra points.

If you like the Power Racing Series, youll be able to catch the wienermobile at both Maker Faire Detroit and Maker Faire Milwaukee. Also check out our posts on better racing with Power Wheels and checking a PPPRS car into baggage.

Filed under: transportation hacks


Hyperentanglement across roof tops paves the way toward a global quantum Internet Lifeboat News: The Blog

( the first time, physicists have demonstrated that hyperentangled photons can be transmitted in free space, which they showed by sending many thousands of these photons between the rooftops of two buildings in Vienna. Hyperentanglement means that the photons are simultaneously entangled in at least two different propertiesin this experiment, the researchers combined two two-dimensionally entangled properties to achieve four-dimensional hyperentanglement.

By showing that hyperentanglement transmission is feasible in the real world and not only in the lab, the physicists expect that the demonstration could one day be scaled up to establish a highly secure quantum Internet that uses satellites to quickly and securely transmit across the globe.

The physicists, led by Rupert Ursin at the Institute for Quantum Optics and Quantum Information (IQOQI) at the Austrian Academy of Sciences in Vienna, have published a paper on the distribution of hyperentanglement via atmospheric free-space links in a recent issue of Nature Communications.


Four new stable kernels

Greg Kroah-Hartman has announced the release of the 4.12.9, 4.9.45, 4.4.84, and 3.18.67 stable kernels. As usual, they contain fixes throughout the tree and users should upgrade.


Tabby's Star Dimming Could be Explained by a Saturn-Like Exoplanet SoylentNews

Rather than debris or alien megastructures, Tabby's star may host a Saturn-like exoplanet:

The "alien megastructure" star that has been puzzling us for the past few years might have a more ordinary explanation: an orbiting Saturn-like planet, complete with wobbling rings. [...] Speculation abounded, with explanations ranging from exoplanetary comets to a vast orbiting "megastructure" built by an advanced alien civilisation.

Now Mario Sucerquia and his colleagues at the University of Antioquia in Colombia have proposed another possibility: a ringed planet, similar to Saturn, orbiting close to the star. Such a planet would dim the star's light in an irregular way during a transit.

First, the rings would block some of the star's light, followed by the planet, which would dim it further. Then, after the planet passes, the rings would block some light again. But because the rings would be at a different angle each time, the small dips at the beginning and end of the transits would be larger or smaller. Without seeing many transits, there would be no obvious pattern to this.

"Saturn-like" can mean a variety of things for the hypothetical object. For example, the rings of 1SWASP J1407b are about 200 times the diameter of the rings of Saturn.

Anomalous lightcurves of young tilted exorings

Related paper: KIC 8462852: Will the Trojans return in 2021?

Previously: Tabby's Star Under Observation After Dimming Event Detected

Original Submission

Read more of this story at SoylentNews.


New Ryzen Is Running Solid Under Linux, No Compiler Segmentation Fault Issue Phoronix

As a quick update to the AMD Linux "Performance Marginality Problem" affecting some early Ryzen processors under heavy load, today I received a new Ryzen 7 processor and indeed it's been running strong now for the past few hours under demanding load and has yet to hit the compiler segumentation fault bug.


Leaked: Private Photos of Nicole Scherzinger, Dakota Johnson and Addison Timlin HackRead

By Carolina

Hackers have leaked private pictures of Fifty Shades of Greys Dakota

This is a post from Read the original post: Leaked: Private Photos of Nicole Scherzinger, Dakota Johnson and Addison Timlin 


Patrick McHardy and copyright profiteering (

Over at, Heather Meeker, a lawyer who specializes in open-source licensing, published a lengthy FAQ on the GPL enforcement efforts of netfilter developer Patrick McHardy. In it, Meeker looks at how much code McHardy has contributed, specifics of the German legal system that may make it attractive to copyright trolling (or profiteering), and steps that companies and others can take to oppose these kinds of efforts. "Copyright ownership in large projects such as the Linux kernel is complicated. Its like a patchwork quilt. When developers contribute to the kernel, they dont sign any contribution agreement or assignment of copyright. The GPL covers their contributions, and the recipient of a copy of the software gets a license, under GPL, directly from all the authors. (The kernel project uses a document called a Developer Certificate of Origin, which does not grant any copyright license.) The contributors individual rights exist side-by-side with rights in the project as a whole. So, an author like McHardy would generally own the copyright in the contributions he created, but not in the whole kernel."


HPR2365: Rolling out a radio-based internet service in rural England Hacker Public Radio

In the UK there is a lot of competition in the telecoms business but, in reality, most of the players rely on infrastructure owned and operated by one company - BT. Urban customers benefit greatly from this competition and probably have the cheapest telecom services in Europe as a result. The emphasis of the providers is, understandably, areas of high population concentrations. The problem is that nowadays a lot of people living in rural areas need fast and reliable internet connections to do their jobs and run their businesses. What do you do when you live in a remote area and the major internet providers have no plans to roll fast connections out to where you live? In this episode Beeza describes how he found a solution and managed to get it implemented.


Government Warns North Korean Cyber Attacks Continue Lifeboat News: The Blog

The Department of Homeland Security and FBI issued a new warning on Wednesday that North Korean government hackers are continuing to target critical U.S. infrastructure for cyber attacks.

A technical report by DHS National Cyber Awareness System reveals details of the tools and cyber methods being used by North Korean government hackers.

The alert said the North Korean government is using the cyber tools to target the media, aerospace, financial, and critical infrastructure sectors in the United States and globally.


Tech: DOEs grid report Lifeboat News: The Blog

DOEs grid study arrives Tesla vs. Lamborghini Energy and research wrap-up.


Study: Eye Test Could Predict Alzheimers Disease Years In Advance Lifeboat News: The Blog

An eye test could predict whether someone could have Alzheimers disease years in advance, according to a recent study.

Researchers from Cedars-Sinai and company NeuroVision Imaging found the disease affects the retina, which is the back of the eye, in a similar way to how it impacts the brain. Through this discovery, researchers conducted a noninvasive eye scan in an effort to detect key signs of Alzheimers before patients began experiencing symptoms of the disease.

The study, which was published Tuesday in JCI Insight, said a high definition eye scan was able to see the plaque in the retina, which correlated with the amount in the brain. The plaque is a buildup of toxic proteins called amyloid-beta deposits, which are key signs of Alzheimers. Build up in the brain may occur as early as two decades before people begin to experience signs of the disease.


Will Gene Editing Allow Us to Rid the World of Diseases? Lifeboat News: The Blog

Scientists recently used a gene-editing tool to fix a mutation in a human embryo. Around the world, researchers are chasing cures for other genetic diseases.

Now that the gene-editing genie is out of the bottle, what would you wish for first?

Babies with perfect eyes, over-the-top intelligence, and a touch of movie star charisma?


Experts warn of third revolution in warfare Lifeboat News: The Blog

A letter to the UN warns the world is getting closer to a dangerous third revolution in warfare.


Possibly the Most Up-Cycled, Hacked E-Bike Youll See All Week Hackaday

When it comes to bringing an idea to life its best to have both a sense of purpose, and an eagerness to apply whatever is on hand in order to get results. YouTubes favorite Ukrainians [KREOSAN] are chock full of both in their journey to create this incredible DIY e-bike using an angle grinder with a friction interface to the rear wheel, and a horrifying battery pack made of cells salvaged from what the subtitles describe as defective smartphone charging cases.

Battery pack made from cells salvaged out of defective equipment. Sometimes, you use what you have on hand.

Whats great to see is the methodical approach taken to creating the bike. [KREOSAN] began with an experiment consisting of putting a shaft on the angle grinder and seeing whether a friction interface between that shaft and the tire could be used to move the rear wheel effectively. After tweaking the size of the shaft, a metal clamp was fashioned to attach the grinder to the bike. The first test run simply involved a long extension cord. From there, they go on to solve small problems encountered along t...


A Buddhist Funeral Robot SoylentNews

Atlas Obscura has an article on a robot programmed to perform Buddhist funeral rites.

What's the hottest new trend in robotics? It might be religion. Hot on the heels of Germany's Protestant-inspired automated blessing machine, BlessU-2, a Japanese company has unveiled a smiling automaton programmed to conduct Buddhist funerals.

Also at Reuters and The Guardian.

Youtube has a clip with the robot in action, which may give you nightmares. The robot in question is a reprogrammed SoftBank Robotics Pepper model. In related news it turns out Japan has a Life Ending Industry EXPO.

Once again Philip K Dick is proven right.

[Additional video clip by the New York Post. - Ed]

Original Submission

Read more of this story at SoylentNews.


Why Its Still A Bad Idea to Post or Trash Your Airline Boarding Pass Krebs on Security

An October 2015 piece published here about the potential dangers of tossing out or posting online your airline boarding pass remains one of the most-read stories on this site. One reason may be that the advice remains timely and relevant: A talk recently given at a Czech security conference advances that research and offers several reminders of how being careless with your boarding pass could jeopardize your privacy or even cause trip disruptions down the road.

In Whats In a Boarding Pass Barcode? A Lot, KrebsOnSecurity told the story of a reader whose friend posted a picture of a boarding pass on Facebook. The reader was able to use the airlines Web site combined with data printed on the boarding pass to discover additional information about his friend. That data included details of future travel, the ability to alter or cancel upcoming flights, and a key component need to access the travelers frequent flyer account.

A search on Instagram for "boarding pass" returned 91,000+ results.

A search on Instagram for boarding pass returned 91,000+ results.

More recently, security researcher Michal paek gave a talk at a conference in the Czech Republic in which he explained how a few details gleaned from a picture of a friends boarding pass posted online give him the ability to view passport information on his friend via the airlines Web site, and to change the password for another friends United Airlines frequent flyer account.

Working from a British Airways boarding pass that a friend posted to Instagram, paek found he could log in to the airlines passenger reservations page using the six-digit booking code (a.k.a. PNR or passenger name record) and the last name of the passenger (both are displayed on the front of the BA boarding pass).

Once inside his friends account, paek saw he could cancel future flights, and view or edit his friends passport number, citizenship, expiration...


Advisory group on self-driving cars stalls under Trump The Hill: Technology Policy

The governments council on self-driving cars, which was working to speed up efforts to bring autonomous vehicles to the road, has stalled under the Trump administration.The Federal Committee on Automation held its first meeting on Jan. 16, with...



YouTube cracking down on hate speech The Hill: Technology Policy

YouTube is implementing a new feature it says will help curb hate speech on its platform.The company is targeting videos that contain controversial religious or supremacist content, but which do not violate its terms of service. Instead of taking...


The Coming Singularity: Ray Kurzweil Lifeboat News: The Blog

By 2045, well have expanded the intelligence of our human machine civilization a billion fold. That will result in a technological singularity, a point beyond which its hard to imagine.

Artificial intelligence, brain, brain diseases, AI lectures, AI conferences, AI TED talks, mind and brain, programming languages, AI movies, AI books in english, french, chinese, russian and turkish.


China's First Exascale Supercomputer Could be Used for Maritime Research SoylentNews

China's first exascale supercomputer, estimated to cost $150-300 million, could be used for marine science research with an eye for turning China into a maritime superpower:

News out of China today indicates the nation could stand up a peak exaflop supercomputer even sooner [than 2020]. The South China Morning Post reported that China will build its first exascale machine in Shandong province as soon as 2019 to support ocean research in the South China Sea and boost China's maritime expansion.

[...] The project reflects the mission of Chinese Communist Party leader President Xi Jinping to turn China into a "hai shang qiang guo," or maritime superpower. "It will help, for instance, the simulation of the oceans on our planet with unprecedented resolution. The higher the resolution, the more reliable the forecast on important issues such as El Nino and climate change," Feng Liqiang, operational director of the Marine Science Data Centre in Qingdao, Shandong, told the South China Morning Post. "It will give China a bigger say in international affairs."

Not everyone agrees that the project will catapult China to maritime preeminence. Chinese ocean scientists pointed out that the US holds significant advantages in terms of having decades of historical data, sophisticated HPC software and algorithms, as well as a culture of open access to scientific data. "The State Ocean Administration runs and hoards its own data sets, as do the PLA Navy, the Chinese Academy of Sciences and many universities. Every institute is treating data as private asset for the interests of their own research," Lu Xianqing, professor at the Key Laboratory of Physical Oceanography under the Ministry of Education in Qingdao, told the South China Morning Post.

Original Submission

Read more of this story at SoylentNews.


[$] Development statistics for the 4.13 kernel

As of this writing, the 4.13 kernel appears headed toward release on September 3, after a nine-week development cycle. It must, therefore, be about time for a look at the statistics for this development cycle. The picture that results shows a fairly typical kernel cycle with, as usual, few surprises.


Court Orders DreamHost to handover data on anti-Trump site HackRead

By Waqas

About a week ago, it was reported that the Department

This is a post from Read the original post: Court Orders DreamHost to handover data on anti-Trump site


GIMP 2.9.6 Released With GEGL Multi-Threading & Better HiDPI Support Phoronix

We are one step closer to the long-awaited GIMP 2.10 update with today seeing the newest development release, GIMP 2.9.6...


Remote Controlled Nerf Bomb Hackaday

There was a third-party multiplayer upgrade pack for one of the Quake games back in the 90s that included a whole slew of non-standard weapons. Among them one of the most memorable was a gravity well, that when thrown into the middle of a crowded room full of warring players would suck them into a vortex. Assuming its user had made it to safety in time, they would then be left the victor. The hyper-violent make-believe world of a first-person shooter is probably best left in a Pentium server from the 90s, with few direct parallels in the real world. Maybe laser tag, or Nerf battles, are the closest youll get.

If you are a Nerf enthusiast, then youll appreciate [Giaco Whatever]s CO2-powered remote-control Nerf bomb as an analogue of that Quake gravity well. It fires twelve darts at the press of a button on an infra-red remote control. The firing tubes sit in a nicely machined manifold connected via a solenoid valve to a little CO2 gas bottle. In the hectic world of a Nerf war it is slid out into the field of combat, its operator takes cover, and the other participants are showered in foam darts. There are probably kids who would sell their grandparents to own this device.

The build is detailed in the video below the break, along with a wonderfully tongue-in-cheek movie segment demonstrating it in action.

Weve given you a lot of Nerf projects over the years, but perhaps a couple of guns are best to leave for your enjoyment. One partially 3D printed, and the other fully.

Via Gizmodo. Thanks [Itay Ramot] for the tip.

Filed under: news, toy hacks


How To Get Android Oreo Right Now ? TechWorm

How to download Android 8.0 Oreo in your smartphones

Step 1: The first thing that youll need to do, is enroll with Googles Android Beta program.

Step 2: Once registered, youll need to check if your device supports Android 8.0 by hitting Enroll Device under a compatible handset.

Step 3: Once enrolled, you will need to accept the terms and conditions.

Step 4: Once that is done, Google will push the update to your device. You should get the update pretty soon but in case this is your first time registering with the Android Beta program, it might take up to 24 hours for Google to push  the update to your device.

The post How To Get Android Oreo Right Now ? appeared first on TechWorm.


ASUS Makes Motherboard With 19 PCIe Slots SoylentNews

ASUS will sell a motherboard that can support 19 GPUs. The product is intended for cryptocurrency mining:

ASUS this week teased the new "B250 Mining Expert" which boasts all those slots because as the name implies its role in life is mining cryptocurrency.

Do the math: 19 GPUS, 1,280 cores apiece ... this motherboard could end up hosting 24,320 cores before you fill the Intel LGA 1511 socket with a Skylake, Kaby Lake or Coffee Lake CPU. That chip's half-dozen or so cores are hardly worth counting!

The board is also equipped to slurp three power supplies, because all those GPUs are thirsty. There's also a capacitor dedicated to each PCIe slot to make sure the juice doesn't fluctuate and upset the precious mining machines. A mining-specific BIOS that lets you manage all those GPUs rounds things out.

What do you do with this after cryptocurrency mining is dead?

Original Submission

Read more of this story at SoylentNews.


t2k17 Hackathon Report: My first time (Aaron Bieber) OpenBSD Journal

The next t2k17 hackathon report comes from first time hackathon participant Aaron Bieber, who writes:

I have been an OpenBSD developer for just over five years now. This was my first hackathon.

I wasn't sure what to expect. I knew that there would be around 40 developers, there would be hacking on OpenBSD and that I would get to meet and work with the people who have made OpenBSD what it is today.

Read more


The Librem 5: Your Ultimate GNU/Linux FLOSS Smartphone nixCraft

Purism is well known for Linux based laptop with Coreboot. Now they started a crowdfunding campaign today for its smartphone called Purism Librem 5. What is so special about this phone? It is 100% powered by GNU/Linux. You can run any Linux distro on it. The phone provides high security and privacy features, i.e., it does not track you. This seems like an excellent device. One that I would certainly purchase or recommend to a privacy-conscious person.


Intel Quietly Drops Xeon Phi 7200 Coprocessors Phoronix

Intel has quietly killed off its line-up of Xeon Phi 7200 "Knights Landing" co-processor PCI-E cards...


Whats Eating the Bluefin? NothingIts at the Top of the Food Chain IEEE Spectrum Recent Content full text

Just kidding. Were eating it as sushi, and unless we cut back, well drive this majestic fish to extinction Photo-illustration: Stuart Bradford

opening illustration for "Numbers Don't Lie" column Photo-illustration: Stuart Bradford

Consider the tuna: Its near-perfect hydrodynamics and efficient propulsion, powered by warm-blooded muscles deep within the body, make it an outstanding swimmer. The largest ones top 70 kilometers per hour, or around 40 knotsfast for a powerboat, and far faster than any known submarine.

But their size and tasty meatiness have put the most majestic of these fish on the road to extinction. The white meat you get in cans comes from the relatively abundant albacore, a small fish, typically less than 40 kilograms (red canned meat comes from the abundant skipjack, another small tuna). In contrast, bluefin (in Japanese, maguro or hon maguro, true tuna) has always been the rarest tuna. Adults can grow to more than 3 meters and weigh more than 600 kg.

The bluefin is Japans first choice for sashimi and sushi. When these dishes became popular in Edo (Tokyo) during the 19th century, the choice cuts originally came from the less oily red inner muscles (akami); later the preference shifted to cuts from body sides below the midline (fatty chtoro) and from the fishs belly (extra-fatty toro). Exceptional bluefins have been sold for exceptional prices at Tsukijis New Years auctions. The record was set in 2013: US $1.76 million for a 222-kg fish. Thats nearly $8,000/kg!

Japan consumes about 80 percent of the worldwide bluefin catch, far more than its own allowed quota, and to fill the gap bluefins are now imported to Japan either fresh, as air cargo, or gilled, gutted, and frozen solid. The latter category is increasingly composed of fish caught in the wild and then fattened in cages, where theyre fed sardines, mackerel, and herring. The demand is reaching new highs as the sushi craze has turned a Japanese favorite into a global status food.

The reported worldwide catch of three bluefin species is now about 75,000 metric tons a year. Thats less than it was 20 or 40 years ago, but illegal catches and underreported landings, both widespread and constant for decades, remain substantial. A pioneering comparison of logbooks of Japans tuna-fishing fleet (thought to be highly accurate) and tuna sold in Japans principal fish markets showed at least a twofold discrepancy.

The principal fishing nations have...

Hackaday Prize Entry: Bloodhound Autonomous Radiolocation Drone Hackaday

If youre a first responder say, searching for someone lost in the outback, or underneath an avalanche and youre looking for someone with a radio beacon, whats the fastest way to find that beacon? Getting up high would be a good idea, and if youre using radio direction finding, youll want to be able to cover a lot of ground quickly if only to make the triangulation a bit easier. High and fast sounds like the perfect opportunity for a drone, right?

[Phil Handley]s Bloodhound project is an autonomous drone that can scan a wide area, listening for emergency beacons while alerting the search and rescue personnel. His test bed tricopter uses DT750 brushless outrunners controlled by 18A Turnigy Plush ESCs and powered by a 2200mAh LiPo. A metal-gear servo works the yaw mechanism. Hes also got a Pixhawk Autopilot, a ArduPilot flight controller, a NavSpark GPS, a software defined radio dongle, and a Raspberry Pi. He made the air frame out of wooden dowels, following RCExplorers tricopter design.

The next challenge involves radio direction finding, essentially creating Bloodhounds foxhunting skills. It needs to be able to autonomously track down a signal by taking readings from multiple angles. In addition to finding lost skiers, [Phil] also envisioned Bloodhound being used to track other beacons, of coursesuch as wildlife transponders or errant amateur rockets.

The HackadayPrize2017 is Sponsored by:
Texas Instruments


Researchers devise app to protect PINs and passwords Help Net Security

Every ATM or smartphone user can attest to the discomfort of having a stranger standing close enough to observe a financial transaction and potentially note a PIN or account number. Now researchers at the NYU Tandon School of Engineering have announced an application to combat such shoulder-surfing, whether in person or via a buildings video camera. IllusionPIN foils identify theft by deploying a hybrid-image keyboard to confuse would-be hackers Nasir Memon, NYU Tandon professor More


Guilty in Absence: Pirate Bay Founders to pay 405,000 to Record Labels HackRead

By Uzair Amir

The file sharing giant, The Pirate Bay, is in the

This is a post from Read the original post: Guilty in Absence: Pirate Bay Founders to pay 405,000 to Record Labels


Ex-Uber employee who alleged sexual harassment now fighting forced arbitration The Hill: Technology Policy

A former Uber employee who sounded the alarm about the companys alleged mistreatment treatment of women is now going after clauses in contracts that waive the rights of employees to sue the companies they work for. Susan Fowler has hired lawyers...


Another Ukrainian software makers site compromised to spread malware Help Net Security

The web server of Crystal Finance Millennium, a Ukraine-based accounting software firm, has been compromised and made to host different types of malware. The discovery of the compromise was accompanied by fear that there could be a repeat of the destructive NotPetya attack, which was traced back to hacked servers of Ukrainian software maker MeDoc. This time, fortunately, the attackers did not compromise the firms software and push out an update laden with malware. Instead, More


Amazon's acquisition of Whole Foods to be completed Monday The Hill: Technology Policy

Amazon announced that its acquisition of Whole Foods will be completed on Monday, just days after the deal received federal approval.The e-commerce behemoth said that starting Monday Whole Foods will start offering lower prices on certain products,...


16-bit Support Being Worked On For Intel ANV, Gallium3D TGSI Phoronix

16-bit "half-float" support is a popular topic among Mesa developers in recent days...


LIGO May Have Detected Merging Neutron Stars for the First Time SoylentNews

LIGO, the Laser Interferometer Gravitational-wave Observatory made physics history by managing to detect the previously elusive gravitational waves predicted by Einstein's Theory of General Relativity for the first time. They have, since they began operation, thrice observed the gravitational wave signatures emitted by the mergers of what are believed to be massive binary black hole systems. However, there is no confirmation of these events beyond the gravitational wave detection since black hole mergers may not emit anything else besides the gravitational waves. However, the merger of two neutron stars such as what is predicted to eventually happen to the HulseTaylor binary (which provided the first indirect confirmation of gravitational waves in the 1970s) will not only produce copious gravitational waves but possibly also a gamma ray burst or some other associated emission of electromagnetic radiation. The gravitational waves emitted by such an event would be weaker and harder for LIGO to detect, but on August 18th, noted astrophysicist J. Craig Wheeler tweeted a tantalising hint that they might actually have seen just such a thing happen:

New LIGO. Source with optical counterpart. Blow your sox off!

New Scientist reports that LIGO spokesperson David Shoemaker has not denied the rumour, and it seemed that four days after Wheeler's tweet the Hubble Space Telescope had been observing a neutron star binary candidate in the galaxy NGC 4993, which has since been deleted. From the article:

LIGO spokesperson David Shoemaker dodged confirming or denying the rumours, saying only "A very exciting O2 Observing run is drawing to a close August 25. We look forward to posting a top-level update at that time."

Speculation is focused on NGC 4993, a galaxy about 130 million light years away in the Hydra constellation. Within it, a pair of neutron stars are entwined in a deadly dance. While astronomers are staying silent on whether they are engaged in optical follow-ups to a potential gravitational wave detection, last night the Hubble Space Telescope turned its focus to a binary neutron star merger within the galaxy. A publicly available image of this merger was later deleted.

Further coverage and commentary from astrophysicist Ethan Siegel at Starts With A Bang.



Re: Linux kernel: fixed bug in net/core/flow_dissector.c Open Source Security

Posted by Seth Arnold on Aug 24

I think it is, it's an easy way to make sure all downstream consumers
are alerted to the issue.



Were Hiring Hackaday

Hackaday has been expanding into all kinds of new areas. We find ourselves stretched a bit thin and its time to ask for help. Want to lend a hand while making some extra dough to plow back into your projects? These are work-from-home (or wherever you like) positions and were looking for awesome, motivated people to help guide Hackaday forward!

Contributors are hired as private contractors and paid for each post. You should have the technical expertise to understand the projects you write about, and a passion for the wide range of topics we feature. If youre interested, please email our jobs line, and include:

  • Details about your background (education, employment, etc.) that make you a valuable addition to the team
  • Links to your blog/project posts/etc. which have been published on the Internet
  • One example post written in the voice of Hackaday. Include a banner image, at least 150 words, the link to the project, and any in-links to related and relevant Hackaday features

What are you waiting for? Ladies and Gentlemen, start your applications!

Filed under: Hackaday Columns


Private firm puts $500K bounty on Signal, WhatsApp zero-day vulnerabilities Lifeboat News: The Blog

Zero-day vulnerabilities targeting popular secure messenger applications, like Signal, Telegram and WhatsApp, can fetch payments of up to $500,000 from Zerodium, a buyer and seller of zero-day research, based on a newly released list of available awards offered by the U.S. firm.

The market for zero-day vulnerabilities an undisclosed software security hole that can be exploited by hackers is notoriously rich and murky. Traders tend to operate away from public scrutiny for a number of reasons that make it difficult to learn about the market.

Although Zerodium isnt known for the transparency of its business, the companys listings for vulnerabilities provides a window into the supply and demand behind the vulnerability resale industry.


People Versus Machines: The Impact of Minimum Wages on Automatable Jobs Lifeboat News: The Blog

Automation, unemployment, & low wage workers

We study the effect of minimum wage increases on employment in automatable jobs jobs in which employers may find it easier to substitute machines for people focusing on low-skilled workers from whom such substitution may be spurred by minimum wage increases. Based on CPS data from 19802015, we find that increasing the minimum wage decreases significantly the share of automatable employment held by low-skilled workers, and increases the likelihood that low-skilled workers in automatable jobs become unemployed. The average effects mask significant heterogeneity by industry and demographic group, including substantive adverse effects for older, low-skilled workers in manufacturing. The findings imply that groups often ignored in the minimum wage literature are in fact quite vulnerable to employment changes and job loss because of automation following a minimum wage increase.

You may purchase this paper on-line in.pdf format from ($5) for electronic delivery.


ARC Backend Merged In LLVM Phoronix

LLVM 6.0 SVN/Git now has landed a Synopsys DesignWare ARC processor back-end...


Futurist Gray Scott: We are Part of a Technological Cosmos Lifeboat News: The Blog

How will our relationship to technology evolve in the future? Will we regard it as something apart from ourselves, part of ourselves, or as a new area of evolution? In this new video from the Galactic Public Archives, Futurist Gray Scott explains that we are a part of a technological cosmos. Do you agree with Scott that technology is built into the universe, waiting to be discovered?

Follow us on social media:
Twitter / Facebook / Instagram

Follow Gray Scott:

Twitter / Facebook / Instagram


Civil rights lawyer accuses AT&T of discriminating against low-income communities The Hill: Technology Policy

Civil rights attorney Daryl Parks filed a formal complaint with the Federal Communications Commission (FCC) Thursday on behalf of three black women who say that their Cleveland neighborhoods dont have access to the same broadband services as the...


Eclipse 2017: Report from an Extinct Volcano Hackaday

Location, location, location whats critical to real estate is also critical to eclipse watching, and without sounding too boastful, those of us atop South Menan Butte, an extinct volcano in southeast Idaho, absolutely nailed it. Not only did we have perfect weather, we had an excellent camping experience, great food, a magnificent natural setting, and a perch 800 feet above a vast plain stretching endlessly to the east and west. Everything was set up for a perfect eclipse experience, and we were not disappointed.

Happy Campers

The eclipse itself was merely the climax of a weekend that just kept giving, and that really started back in January when I started planning this trip. That was when I first wrote about the eclipse and announced that Id selected Menan Butte outside of Rexburg, Idaho, as my ideal location. It turns out that while North Menan Butte is public land, South Menan Butte is private property partly owned by one Mr. Brent Gunderson. He actually read my Hackaday post and used it to gauge interest in opening up his land to eclipse watchers.

Thankfully, he decided it was worth it, and he and his neighbor pulled out all the stops. I spoke to Brent briefly at the Saturday night meet and greet picnic dinner he threw on the lawn of his house; he was clearly a busy man but still managed to work the food line and serve up some of the best fried chicken Ive ever had. He clearly enjoyed meeting all the people he had corresponded with for months as they arrived at the campground he had set up in an alfalfa field nestled between his home and the Snake River.

I cant say enough about Brents hospitality where someone might have been tempted to take advantage of desperate eclipse watchers to extort as much money as possible and provide as little as possible in return, Brent and his family just kept giving. The food, the guidance on local services, the accommodation for the disabled and those unable to climb to the best viewing locations, even the merchandise like T-shirts and eclipse glasses everything was available either for free or at extremely reasonable rates that I suspect barely covered his expenses. Everyone who camped at Brents owes him a debt of gratitude for everything he and his family did for us.

Click to view slideshow.

On the Rim

Of course the crown jewel of the experience was the location itself. The Menan Buttes are volcanic cones that were formed about 10,000 years ago, rising 800 feet about the Snake River Plain. I climbed South Menan Butte on Sunday to watch the sun rise and to scout locations for viewing; it...


Diamond Sky: Remembering The Cosmic Connection Centauri Dreams

Looking at recent headlines about diamond rain on Neptune provoked a few thoughts about headline writers, though the image is certainly striking, but then I recalled that Carl Sagan used to enjoy pulling out the stops with language as much as anyone. Listen, for example, to the beginning of his 1973 title The Cosmic Connection:

There is a place with four suns in the sky red, white, blue and yellow; two of them are so close together that they touch, and star-stuff flows between them.

I know of a world with a million moons.

I know of a sun the size of the Earth and made of diamond.

There are atomic nuclei a mile across that rotate thirty times a second.

There are tiny grains between the stars, with the size and atomic composition of bacteria.

There are stars leaving the Milky Way. There are immense gas clouds falling into the Milky Way.

There are turbulent plasmas writhing with X- and gamma rays and mighty stellar explosions.

There are, perhaps, places outside our universe.

And so on. The Cosmic Connection was long on language and imagination, and in its day, ideal for bringing the findings of astrophysics to the attention of the general public. Back in 1973, when I wasnt poring over medieval texts, I kept the book nearby and re-read various chapters, enjoying Sagans effusive enthusiasm. I can see him adding a line or two about the latest findings on the interior of ice giants like Neptune and Uranus, with his own poetic twist.

And diamonds raining down from a high-pressure sky deep in Neptunes atmosphere to the dark core beneath certainly create a striking image. Theyre suggested by a new paper looking at the chemical processes going on inside such worlds, which has demonstrated a way of creating what the researchers call nano-diamonds, carbon atoms compacted into useful objects we may...


Mosquitoes Fatally Attracted to Deadly, Sweet-Smelling Potion SoylentNews

Arthur T Knackerbracket has found the following story:

Mosquitoes aren't just blood thirsty. They also have a sweet tooth, relying on plant nectar to get the sugar they need to survive. Exploiting this weakness, scientists have developed an environmentally friendly eradication method. The new, inexpensive technique tricks these annoying pests into gorging themselves on insecticides laced with a concoction that mimics the sweet-smelling scents and aromas that they find irresistible. It could bolster efforts to suppress malaria, Zika and other mosquito-borne diseases worldwide.

The researchers are presenting their work today at the 254th National Meeting & Exposition of the American Chemical Society (ACS).

"The blend of chemicals that we use to attract mosquitoes is so powerful that they will ignore natural plant odors and attractants in order to get to our formulation," says Agenor Mafra-Neto, Ph.D. "From a mosquito's point of view, it's like having an irresistible chocolate shop on every corner. The product is so seductive that they will feed on it almost exclusively, even when it contains lethal doses of insecticide."

Conventional chemical insecticides used to control mosquitoes are used as cover sprays, frequently dispersed over wide areas. But this blanket spray approach exposes people and animals to potentially harmful compounds and can kill bees and other beneficial insects. In addition, residues of these sprays can contaminate soils and streams, as well as promote increased pesticide resistance. To overcome these issues, Mafra-Neto of ISCA Technologies and colleagues at several universities sought to create a more targeted approach using an insecticide potion spiked with a blend of semiochemicals, or chemical signals, that mosquitoes can't resist.

-- submitted from IRC

Original Submission

Read more of this story at SoylentNews.


Beware of Windows/MacOS/Linux Virus Spreading Through Facebook Messenger The Hacker News

If you came across any Facebook message with a video link sent by anyone, even your friend just dont click on it. Security researchers at Kaspersky Lab have spotted an ongoing cross-platform campaign on Facebook Messenger, where users receive a video link that redirects them to a fake website, luring them to install malicious software. Although it is still unclear how the malware spreads


Hack Telegram, WhatsApp and Signal app; get $500,000 HackRead

By Waqas

If you are a hacker or a security researcher, it

This is a post from Read the original post: Hack Telegram, WhatsApp and Signal app; get $500,000


Verizon reports spike in government requests for cell 'tower dumps' The Hill: Technology Policy

Government requests for the mass disclosure of every caller who connected to a particular cellphone tower have spiked during the first half of 2017, according to Verizons latest transparency report. Law enforcement seek so-called tower dumps to try...


Understanding OPNFV Starts Here

Understanding OPNFV Starts Here


Taking over siphashc for Python Michal iha's Weblog

Since some time we're using siphash algorithm to speed up looking up strings in Weblate. Even though it is used by Python internally, it's not exposed in the standard library so several third party modules appeared in the PyPI. Out of all these siphashc or rather it's Python 3 fork siphashc3 seemed to perform best, so I've started to use that.

After trying to get fix into siphashc3 without much of success, I've spoken to original author of siphashc and he has agreed to hand over maintainership to me. So it's new home is at and new release is already available on PyPI.

Note: Originally we were using MD5 in Weblate, but siphash has shown to be faster and fits into 64-bits, what makes it easier to store and index in SQL databases as LONGINT.

Filed under: Debian English SUSE Weblate


WikiLeaks CIA used ExpressLane to covertly collect data from liaison intel services Security Affairs

WikiLeaks CIA used ExpressLane to covertly collect data from liaison intel services, including FBI, DHS and the NSA, to gather data from their systems.

WikiLeaks has published another batch of documents from Vault 7 leak, that details how the CIA spies on other intelligence agencies, including FBI, DHS and the NSA, to gather data from their systems.

The CIA allows partner agencies to voluntary share biometric data using biometric collection system it provides. CIA leverages a predefined hardware, operating system, and software and allows the sharing of collected biometric data on their systems with each other.

The biometric software system provided by the CIA to its partners is based on a product from Cross Match, a US company specialized in biometric software for law enforcement and the intelligence agencies.
The company made the headlines when its software was used to identify Osama bin Laden during the assassination operation in Pakistan.

The bad news for CIA partners is that the CIA Office of Technical Services (OTS) developed a tool to secretly exfiltrate data collections from their systems.

ExpressLane is the codename for the CIA project of the spying software for its biometric system.

The CIA agents manually install the spying system as part of a routine upgrade to the Biometric system.

The OTS (Office of Technical Services), a branch within the CIA, has a biometric collection system that is provided to liaison services around the world with the expectation for sharing of the biometric takes collected on the systems. But this voluntary sharing obviously does not work or is considered insufficient by the CIA, because ExpressLane is a covert information collection tool that is used by the CIA to secretly exfiltrate data collections from such systems provided to liaison services. states Wikileaks.

The OTS officers, who maintain biometric collection systems installed at partner services, visit their premises and secretly install the ExpressLane Trojan while displaying an upgrade Installation screen with a progress bar that appears to be upgrading the biometric software.

If the biometric system has already b...


Floating Ants and Drops of Liquid with an Acoustic Levitator Hackaday

Amuse your friends, amaze your enemies, and perplex ants and other insects, insofar as they are capable of perplexment. Accomplish all this and more with this handy dandy homebrew acoustic levitator.

Before anyone gets to thinking about using this technique to build a hoverboard that actually hovers, its best that you scale your expectations way, way down. Still, being able to float drops of liquid and small life forms is no mean feat, and looks like a ton of fun to boot. [Asier Marzo]s Instructables post fulfills a promise he made when he first published results for what the popular press then breathlessly dubbed a tractor beam, which we covered back in January. This levitator clearly has roots in the earlier work, what with 3D-printed hemispherical sections bristling with ultrasonic transducers all wired in phase. A second section was added to create standing acoustic waves in the middle of the space, and as the video below shows, just about anything light enough and as least as cooperative as an ant can be manipulated in the Z-axis.

Theres plenty of room to expand on [Asier]s design, and probably more practical applications than annoying bugs. Surface-mount devices are pretty tiny perhaps an acoustic pick and place is possible?

Filed under: hardware, Tech Hacks


How Fast do Elevated Temperatures Reach the Cell Interior? IEEE Spectrum Recent Content full text

Numerical simulation is used to investigate stacking of lithium-ion cells during the fabrication of high-end battery systems.

The following is an excerpt from COMSOL News 2017 .

By Jennifer Hand

The performance and durability of lithium-ion (Li-ion) batteries are heavily influenced by their operating temperature. Their performance decreases at low temperatures while the battery degrades quickly at high temperatures. This means that overall reliability is compromised, creating a potential safety issue.

Industry research has led to standards regulating the ability of a battery to withstand fluctuations in temperature when it is in operation. In contrast there has been much less focus on the temperatures that batteries are exposed to during the manufacturing process, which includes plasma pretreatment, UV curing, laser welding, ultrasonic joining, hot stacking, and hot gluing. A Li-ion battery may contain thousands of individual cells, which have to be stacked together. This is typically done through an assembling procedure that may involve various heat treatments, some of which can be extremely intense and expose the casing or other parts to high temperatures for short times.

Gerd Liebig of NEXT ENERGY EWE Research Centre for Energy Technology at the University of Oldenburg, Germany, explained, "It is already well known that certain processes such as welding greatly increase the temperature within a battery. What is not known is the extent to which such elevated temperatures could propagate within and compromise a cell."

Pamina Bohn from the University of Oldenburg and scientists from NEXT ENERGY set out in close collaboration to investigate whether it was possible for the manufacturing process to cause irreversible damage that would affect stability and capacity due to the onset of an electrochemical degradation process. As experiments can be lengthy and expensive with many safety precautions, the strategy was to validate their mathematical model. The research team used numerical simulation to investigate different operating scenarios and place probes to inspect results at any point in the model, which is impractical if not impossible during experiments.

Designing a Thermal Stress Experiment

The first step was to set up a physical experiment to measure temperatures reached inside a prismatic lithium dummy cell when it was subjected to short term thermal stress. The goal was to collect data that could be used to validate the mathematical model and investigate the effect of v...


Dip update 66/n wherestheflux

[Orig: Aug 24, 2017]
Hi everyone,
Below is the current light curve. Notes on data taken over the past week that I previously mentioned needed "review" when I was back from eclipse travels: 
OGG: I have removed the nightly average from 19 Aug, since it was only based on 4 data points.
TFN: removed a couple images that had a plane crossing over a few of the comparison stars.           
More later,


Africa Leads the World on Drone Delivery: Flights to Begin in Tanzania in 2018 IEEE Spectrum Recent Content full text

Drone delivery startup Zipline proved itself in Rwanda and is now expanding in a big way Image: Zipline

Drone delivery is finally getting off the ground. And the action is happening in East Africa.

Zipline, a pioneering drone startup that began delivering blood packs to Rwandas remote hospitals in October 2016, today announced a major expansion into Tanzania. In early 2018 the company will begin flying its delivery drones to more than 1000 health care facilities around Tanzania, bringing urgently needed medicines and supplies to big hospitals and tiny rural clinics alike.

Keller Rinaudo, founder and CEO of Zipline, says that the richest companies in the world are still trying to figure out how to make instant drone delivery work as a commercial service (as IEEE Spectrum has noted in its coverage of Googles Project Wing and Amazons Prime Air). Meanwhile, the worlds first on-demand delivery service is already up and running in Rwanda.

People expect that advanced robotics and AI are going to start in the United States and be built by rich white people, Rinaudo says bluntly. Ziplines East Africa projects defy that expectation, he says, and create a model of tech deployment that the United States and other nations can follow. Rwanda and Tanzania are showing the world how to use robotic technology to save lives, he says.

A man and woman stand next to a stack of red boxes emblazoned with the word "Zipline" and a picture of a drop of blood Photo: Zipline In Rwanda, the local operations team sends out blood packs to remote hospitals. In Tanzania, teams will deliver a wider range of medical products.

In Tanzania, the company is establishing four distribution centers with up to 30 fixed-wing drones each. Each distribution center will handle up to 500 delivery flights per day. The Tanzanian operation will expand on Ziplines prior offering by delivering not only blood packs, but also vaccines, HIV medications, anti-malaria drugs, and critical medical supplies like sutures and IV tubes.

To place an order, a health c...


GNOME Control Center Switches To Its New Settings Layout Phoronix

Georges Stavracas has announced that for GNOME 3.25.91 they have finished up work on their new GNOME Settings user-interface, a.k.a. the redesign to the GNOME Control Center...


Cloudy with a chance of honour Noise to Signal

(A Klingon warrior delivers the weather forecast) Winds were light today with moderate humidity: a good day to die. Expect showers tomorrow, heavy at times. All in all, a good day to die. Clearing overnight and sunny the next day. A good day to die.

Behold, Klingon weather proverbs, from the recently uncovered meteorological writings of Kahless the Unforgettable:

The wise warrior does not heed the long-range forecast, but shapes it.

Red skies at night, Klingons delight. We paint them with the blood of our enemies.



Pirates Leak Copy of Kim Dotcom Documentary Online TorrentFreak

In recent years, we have writen dozens of articles on Kim Dotcom, Megauploads shutdown, and all the intrigue surrounding the case.

Its a story worth documenting and not just in writing. This is what the people behind the documentary Kim Dotcom: Caught in the Web realized as well.

With cooperation from the mastermind behind the defunct file-sharing site, they made a thrilling documentary that captures the essence of the story, which is far from over.

This week the film was released to the wider public, made available for sale on various online platforms including iTunes and Amazon Prime. Thus far things are going well, with the movie making its way into various top charts, including a first place in the iTunes documentary category.

However, if we believe entertainment industry rhetoric, this meteoric rise will soon be all over.

Earlier today the first pirated copies of Caught in The Web started to appear online. It is widely available on The Pirate Bay, for example, and shows up on various other pirate download and streaming sites as well.

Copy of the leaked documentary on TBP, not the original

Leaks happen every day, and this ones not any different. That being said, people who followed the Dotcom saga may appreciate the irony, since Megaupload was a popular destination for pirates as well. So, a chunk of the sites former users probably prefers to grab a free version. To sample, of course.

This is especially true for those who hit several roadblocks in trying to access the film from official outlets. Over the past few days, some people complained that Caught in the Web isnt legally available through their preferred legal channel due to geographical restrictions.

Dotcom, still accused by the US Government of depriving copyright holders of $500 million in one of the countrys largest copyright infringement cases, responded appropriately when a Twitter follower pointed this out.

Not available

They are wondering why people are...


Big Customers Demand 100 Percent Renewablesand Utilities Look Set to Deliver IEEE Spectrum Recent Content full text

Academics argue about its feasibility, but governments and corporations set their sights on a completely renewable future Photo: Hawaiian Electric

Photo: Hawaiian Electric Renewables in Paradise: The electric grid on the Hawaiian island of Molokai is expected to run completely on renewable energy in 2020.

In June, energy experts were clashingin both tweets and peer-reviewed journals over the feasibility of the United States achieving a 100-percent-renewable power grid in 2050. Many governments, utilities, and big consumers, however, appear unwilling to wait for the engineers all clear: An increasing number of jurisdictions and institutions are setting deadlines for a jump to a 100-percent-renewable electricity grid or even beyond, to fossil-fuel-free heating and roadways as well.

The impetus for this all-renewables movement is the increasingly clear danger posed by climate change. Scientists and policy experts warn that global greenhouse gas emissionscurrently plateaued at 41 metric gigatons of carbon dioxide per yearmust start dropping within just a few years. If they do not, the global warming limit settled upon in the Paris Agreement in 2015 will become almost unattainable, according to recent commentary in the journal Nature .

With no time to wait, all countries should adopt plans for achieving 100 percent renewable electricity production, urges the opinion piece, signed by Christiana Figueres, the diplomat who led the Paris talks, and five directors of leading climate research groups.

Officially, many government and utility decarbonization plans also allow nonrenewable options such as nuclear power and coal-fired power plants, which capture and bury their carbon dioxide, a process known as sequestration. But both nuclear energy and carbon sequestration are unpopular in many countries and have recently shown to be risky bets. Blown budgets for new reactors in Georgia and South Carolina pushed Westinghouse Electric Co. into bankruptcy in March, and a decade of work on a carbon-capture coal plant in Mississippi has saddled Atlanta-based utility Southern Co. with a potential US $3.4 billion loss. Southern announced...


Linux kernel: fixed bug in net/core/flow_dissector.c Open Source Security

Posted by Alexander Popov on Aug 24


I was asked to investigate a suspicious kernel crash on some Linux
server. It is at least a remote DoS (and maybe RCE): Linux is crashed by
receiving a single special MPLS packet.

I bisected and found out that the bug was introduced in
commit b3baa0fbd02a1a9d493d8cb92ae4a4491b9e9d13
Author: Tom Herbert <tom () herbertland com>
Date: Thu Jun 4 09:16:46 2015 -0700

And was later fixed it in


Mozilla Plans to Collect User Data, Opt-Out Not Opt-In [Updated] SoylentNews

Neowin has a brief warning that Mozilla plans to collect anonymized user data. The given reason is to better understand how people use Firefox. Perhaps the most alarming aspect of this plan is that it is opt-out rather than opt-in. This is very far from the early days of Firefox when it had previously touted privacy as one of its main advantages.

As stated in the Google Groups announcement thread, they intend to use RAPPOR:

RAPPOR is a novel privacy technology that allows inferring statistics about populations while preserving the privacy of individual users.

This repository contains simulation and analysis code in Python and R.

[...] Publications


[Update @ 20170824_152224 UTC: fixed bad link to Google Groups thread.]

Original Submission

Read more of this story at SoylentNews.


SUSE Remains Committed To The Btrfs File-System Phoronix

While Red Hat is backing away from Btrfs support in favor of their next-gen Stratis project and mature Linux file-systems like EXT4 and XFS, SUSE is reaffirming their support for Btrfs...


Crowdsourced Solar Eclipse Films Lifeboat News: The Blog

One would have to have been literally living under a rock to miss the recent solar eclipse, but for those who either didnt have a great view or were far outside the path of totality, Googles Eclipse Megamovie 2017 is a solid alternative. The video, available on YouTube, sources images of the eclipse shot by volunteers to create a timelapse of the total eclipse as it passed across the continental United States.


Security updates for Thursday

Security updates have been issued by Arch Linux (salt and thunderbird), Debian (aodh), Fedora (kernel and nginx), Mageia (apache, graphicsmagick, kernel-tmb, and openjpeg2), Red Hat (bind and thunderbird), Scientific Linux (thunderbird), and Ubuntu (python-pysaml2).


Ask Hackaday: Saving The World With Wacky Waving Inflatable Arm Flailing Tube Men Hackaday

This is a solution to global warming. This solution will also produce electricity, produce rain in desertified areas, and transform the Sahara into arable land capable of capturing CO2. How is this possible? Its simple: all we need to do is build a five-kilometer tall, twenty-meter wide chimney. Hot air, warmed by the Earths surface, will enter the base of the chimney and flow through turbines, generating electricity. From there, air will rise through the chimney, gradually cooling and transferring energy from the atmosphere at Earths surface to five kilometers altitude. This is the idea behind the Super Chimney, Its an engineering concept comparable to building a dam across the Strait of Gibraltar, a system of gigantic mirrors in Earths orbit, or anything built under an Atoms for Peace project. In short, this is fringe engineering.

This is also, saving the world with wacky waving inflatable arm flailing tube men.

The idea of building tens of thousands of fabric chimneys, placing them all around the globe, and cooling the Earth while sequestering carbon dioxide is fantastic. Ideas are simple, implementation is something else entirely. There are also obvious problems with the physics presented in the Super Chimney presentation, but these problems dont actually make a Super Chimney impossible. We need more eyes on this, so were opening this one up as an Ask Hackaday. What do you think of this audacious scheme, and is it even possible?

Actually Building the Tube Man



Splitting and Re-Assembling Files in Linux

Splitting and Re-Assembling Files in Linux


Active Levitation Championed by rLoop in this Weekend's Hyperloop Competition IEEE Spectrum Recent Content full text

The firm's pods levitate under their own power, a flexible but energy-hungry strategy Photo: rLoop

Most teams at Sundays Hyperloop competition will use passive magnetic fields to levitate their pods inside the mile-long test track outside SpaceX headquarters in Hawthorne, Calif. The forward movement of the pod induces the necessary electromagnetic field.

But rLoop, a virtual network of engineers from around the world, is following an active strategy: Its pods will levitate under their own power. Project manager Brent Lessard admits that its an energy-hungry solution, but he contends that it alone can lead to commercialization of a futuristicsome would say far outconcept for mass transportation. The idea is to send passenger-carrying pods hurtling at near-sonic speeds through a tube held under a partial vacuum.

We are not in this necessarily to win the competition but to develop Hyperloop technology, he says. You will see pods there that are just built for speedrailguns, essentially. We focus on a scalable pod, and one that would be capable of carrying a passenger or cargo.

By making the pod self-sufficient, the design allows the tube to do nothing much beyond hold a partial vacuum, one roughly the same as an airliner experiences at high altitudes. Even that requirement slows the competition, though, because every time a pod has to be removed and another put in its place the tube must be repressurized, then depressurized.

The costs of having an active, energy-gobbling pod should be offset by the cost savings of infrastructure thats relatively easy to build and maintain. And those costs may matter a lot if the plan involves tunneling deep underground, as SpaceX founder and Hyperloop impresario Elon Musk plans to do.

In the previous round of Hyperloop competition, in January, rLoop didnt even get a chance to make a trial run because there wasnt enough time and space to accommodate all the entries, Lessard says. The winner was a student-led team from the Massachusetts Institute of Technology. Still, rLoop did win a pod innovation awarda tip of the hat to rLoops focus on practicality. If indeed its competing th...


My latest column: Community building with a Q&A vs. online forum - Linux - News

Working on building an online community? Here's how to choose the platform that's right for you.


If you've ever built an online community, you know that the sheer number of options available can be daunting. Should you set up a forum, a Q&A site, or both? Would users prefer Slack, IRC, or perhaps a mailing list? Where does Telegram fit in? Maybe you should you just set up one of every available solution...

I'll discuss this topic at length during the upcoming Open Source Summit North America. But in the meantime, let's focus on one aspect to better understand the overall decision-making process.
Forum vs. Q&A

Before you decide on a platform, make sure you understand the strengths and weaknesses, design goals, and workflow of each.
Visit for the rest of the article. I hope to see you in Los Angeles at the Open Source Summit to further discuss how other platforms fit into this discussion and how to decide which ones are best for you. Aren't able to attend? Feel free to comment here.



Trend Micro Hosted Email Security (HES) - Email Interception and Direct Object Reference Bugtraq

Posted by Patrick Webster on Aug 24


Trend Micro Hosted Email Security (HES)

Versions affected:
Hosted Email Security before January 2012.


Two vulnerabilities were discovered.

The first allowed any HES user to intercept in-transit emails through
the Trend Micro Hosted Email Security cloud environment. The platform
allowed anyone to register an account online instantly and test the
solution. Users were required to 'activate'...


Russian Defense Ministry develops electromagnetic gun to counter drones Lifeboat News: The Blog

According to a center spokesman, the gun emits separate electromagnetic pulses to suppress channels used to operate a drone. As a result, the drone loses contact with its operator, while its uncontrolled flight ends in a crash. The spokesman added that the Stupor gun had a range of two kilometers, covering a 20 degree sector.

Support documentation explains that the device is capable of suppressing navigation and transmission channels used by unmanned aerial vehicles, as well as their photo and video cameras within the electro-optical range of frequencies.

The gun can be charged from the grid, as well as from a car battery.


SUSE reaffirms support for Btrfs

SUSE has let it be known that it plans to continue developing and supporting the Btrfs filesystem, regardless of what other distributors do. "If one of the rather small contributors to the btrfs filesystem announced to not support btrfs for production systems: should you wonder, whether SUSE, strongest contributor to btrfs today, would stop investing into btrfs? You probably shouldnt. SUSE is committed to btrfs as the default filesystem for SUSE Linux Enterprise, and beyond."


[security bulletin] HPESBHF03769 rev.1 - HPE Integrated Lights-out 4 (iLO 4) Multiple Remote Vulnerabilities Bugtraq

Posted by security-alert on Aug 24


Document ID: hpesbhf03769en_us
Version: 1

HPESBHF03769 rev.1 - HPE Integrated Lights-out 4 (iLO 4) Multiple Remote

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-08-23...

Thursday, 24 August


[SECURITY] [DSA 3953-1] aodh security update Bugtraq

Posted by Luciano Bello on Aug 24

Debian Security Advisory DSA-3953-1 security () debian org Luciano Bello
August 23, 2017

Package : aodh
CVE ID : CVE-2017-12440
Debian Bug :...


'Interactive Robogami' Lets you Design and 3-D-print Origami-Inspired Robots From 2-D Designs SoylentNews

What if you could interactively design a robot, print it, and then fold it into shape in a matter of a few hours? Interactive Robogami is just the thing:

Researchers from MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) [...] present a system called "Interactive Robogami" that lets you design a robot in minutes, and then 3D-print and assemble it in as little as four hours.

One of the key features of the system is that it allows designers to determine both the robot's movement ("gait") and shape ("geometry"), a capability that's often separated in design systems.

"Designing robots usually requires expertise that only mechanical engineers and roboticists have," says PhD student and co-lead author Adriana Schulz. "What's exciting here is that we've created a tool that allows a casual user to design their own robot by giving them this expert knowledge."

[...] Importantly, the system is able to guarantee that a design is actually possible, analyzing factors such as speed and stability to make suggestions and ensure that, for example, the user doesn't create a robot so top-heavy that it can't move without tipping over.

Once designed, the robot is then fabricated. The team's origami-inspired "3-D print and fold" technique involves printing the design as flat faces connected at joints, and then folding the design into the final shape, combining the most effective parts of 2D and 3D printing.

[...] The team found that their 3D print-and-fold method reduced printing time by 73 percent and the amount of material used by 70 percent. The robots also demonstrated a wide range of movement, like using single legs to walk, using different step sequences, and using legs and wheels simultaneously.

Designing a robot that can walk is one thing, but the researchers are hoping to develop a system to design robots that can fly.

Original Submission

Read more of this story at SoylentNews.


Anonymous messaging app Sarahah makes it to trending list Hacker News Bulletin | Find the Latest Hackers News

In the current era where social trend of reaching out anonymous people and chatting with them is becoming increasingly popular, it is also raising questions over how such apps become a fuel for cyberbullying. In recent past, applications like Whisper, Yik Yak, Secret, and many more became a top trending amongst youngsters. Similarly, the

The post Anonymous messaging app Sarahah makes it to trending list appeared first on Hacker News Bulletin | Find the Latest Hackers News.


qBitcoin: A Way of Making Bitcoin Quantum-Computer Proof? IEEE Spectrum Recent Content full text

Like many other encryption-dependent things, Bitcoin could be vulnerable to hacks by future quantum computers. qBitcoin would use quantum cryptography to keep it safe Illustration: Erik Vrielink

A new quantum cryptography-based Bitcoin standard has been proposed that could harden the popular cryptocurrency against the advent of full-fledged quantum computers. Bitcoin as it now exists involves traditional public key cryptography and thus could conceivably be hacked by a future quantum computer strong enough to break it. However, quantum cryptography, which is based not on difficult math problems but the fundamental laws of physics, is expected to be strong enough to withstand even quantum computer-powered attacks.

The proposal, dubbed qBitcoin, posits transmission of quantum cryptographic keys between a remitter and a receiver of the eponomous named cryptocurrency, qBitcoin. The system would use provably secure protocols such as the  BB84  quantum key distribution scheme.

To exchange qBitcoin, then, requires that there be a transmission network in place that can send and receive bits of quantum information, qubits. And that is no mean feat, considering it typically involves preserving the polarization states of individual photons across thousands of kilometers. To date, there are five known quantum key distribution networks in the United States, Switzerland, Austria, and Japan. China is working on their own massive 2000-km link, as well. And a number of satellite-to-satellite and satellite-to-ground quantum key distribution networks are also being developed and prototyped.

The thing that threatens Bitcoin may in fact also be the thing that comes to its rescue: The...

A GNU/Linux Smartphone Running GNOME & HTML5 Web Apps? Priced At $599, Ships In 2019 If The Stars Align Phoronix

After two successful crowdfunding campaigns for producing security-focused Linux laptops while aiming to be as open-source as possible and now shipping with Coreboot, Purism is aiming for their most ambitious project yet... the smartphone. Can Purism succeed where Ubuntu Mobile, Firefox OS, OpenMoko, and others have not lasted? They think so, but it will take crowdfunding again and the finished device likely won't surface until at least 2019.


Mesa DRM 2.4.83 Library Released Phoronix

Mesa's DRM library, libdrm, that sits between the Linux kernel DRM and Mesa among other possible user-space components, is out with a new release today...


Gravity, 'Mechanical Loading' Are Key to Cartilage Development SoylentNews

Arthur T Knackerbracket has found the following story:

Mechanical loading, or forces that stimulate cellular growth for development, is required for creating cartilage that is then turned to bone; however, little is known about cartilage development in the absence of gravity or mechanical loads. Now, in a study led by the University of Missouri, bioengineers have determined that microgravity may inhibit cartilage formation. Findings reveal that fracture healing for astronauts in space, as well as patients on bed rest here on Earth, could be compromised in the absence of mechanical loading.

"Cartilage tissue engineering is a growing field because cartilage does not regenerate," said Elizabeth Loboa, dean of the MU College of Engineering and a professor of bioengineering. "Because these tissues cannot renew themselves, bioreactors, or devices that support tissue and cell development, are used in many cartilage tissue engineering applications. Some studies suggest that microgravity bioreactors are ideal for the process to take place, while others show that bioreactors that mimic the hydrostatic pressure needed to produce cartilage might be more ideal. Our first-of-its-kind study was designed to test both theories."

Chondrogenic differentiation is the process by which cartilage is developed and cartilage is the basis for bone formation in the body. Additionally, cartilage does not renew itself once it breaks down or fails in the body, making it a target for bioengineers who wish to help patients regenerate cartilage from other cells.

Journal Reference: Liliana F. Mellor, Andrew J. Steward, Rachel C. Nordberg, Michael A. Taylor, Elizabeth G. Loboa. Comparison of Simulated Microgravity and Hydrostatic Pressure for Chondrogenesis of hASC. Aerospace Medicine and Human Performance, 2017; 88 (4): 377 DOI: 10.3357/AMHP.4743.2017

-- submitted from IRC

Original Submission

Read more of this story at SoylentNews.


Japan Unveils a Buddhist Funeral Robot Lifeboat News: The Blog

Its pretty cheerful-looking for a robot that gives funeral services.


Introducing Kubic: A Community-Driven Container-as-a-Service Platform

MicroOS is SUSE's modern and slightly different take on cluster computing for containers and microservices. This is what you ought to know about it.


3D Printed Robotic Arms for Sign Language Hackaday

A team of students in Antwerp, Belgium are responsible for Project Aslan, which is exploring the feasibility of using 3D printed robotic arms for assisting with and translating sign language. The idea came from the fact that sign language translators are few and far between, and its a task that robots may be able to help with. In addition to translation, robots may be able to assist with teaching sign language as well.

The project set out to use 3D printing and other technology to explore whether low-cost robotic signing could be of any use. So far the team has an arm that can convert text into finger spelling and counting. Its an interesting use for a robotic arm; signing is an application for which range of motion is important, but there is no real need to carry or move any payloads whatsoever.



Here's How CIA Spies On Its Intelligence Liaison Partners Around the World The Hacker News

WikiLeaks has just published another Vault 7 leak, revealing how the CIA spies on their intelligence partners around the world, including FBI, DHS and the NSA, to covertly collect data from their systems. The CIA offers a biometric collection systemwith predefined hardware, operating system, and softwareto its intelligence liaison partners around the world that helps them voluntary share


Moby Summit at OSS North America

In case you missed it, the next Moby Project Summit will take place on September 14, 2017 in Los Angeles, as part of the Open Source Summit North America. Following the success of the previous editions, well keep the same format which consists of short technical talks / demos in the morning and Birds-of-a-Feather sessions in the afternoon.


Why Open Source Should Be the First Choice for Cloud-Native Environments

Let's take a trip back in time to the 1990s, when proprietary software reigned, but open source was starting to come into its own. What caused this switch, and more importantly, what can we learn from it today as we shift into cloud-native environments?


Linux Installation Types: Server Vs. Desktop

I have previously covered obtaining and installing Ubuntu Linux, and this time I will touch on desktop and server installations. Both types of installation address certain needs. The different installs are downloaded separately from Ubuntu. You can choose which one you need from

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog