IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Saturday, 17 February


Dell EMC plugs critical bugs in VMAX enterprise storage offerings Help Net Security

Dell EMC has patched two critical flaws in vApp Manager, the management interface for its VMAX enterprise storage systems, and is urging all customers to implement fixes as soon as possible. About the VMAX enterprise storage vulnerabilities The flaws were discovered and reported by Tenables director of reverse engineering Carlos Perez. The graver of the two is CVE-2018-1216, which marks the existence of a hard-coded password vulnerability. The vApp Manager contains an undocumented default account More


Scanned IDs of 119,000 FedEx customers exposed online Help Net Security

An unsecured Amazon Web Services bucket holding personal information and scans of IDs of some 119,000 US and international citizens has been found sitting online by Kromtech security researchers earlier this month. The stored data had been stockpiled by Bongo International, a company that specialized in helping North American retailers and brands sell online to consumers in other countries. Bongo was acquired by FedEx in 2014, relaunched as FedEx Cross-Border International, and ultimately shuttered in More


GDPR quick guide: Why non-compliance could cost you big Help Net Security

If you conduct business in the EU, offer goods or services to, or monitor the online behavior of EU citizens, then the clock is ticking. You only have a few more months until May to make sure your organization complies with GDPR data privacy regulations. Failure to abide by GDPR means you could get hit with huge fines. Finding and investigating data breaches: Why its always too little, too late Personal data protection More


New infosec products of the week: February 16, 2018 Help Net Security

ScramFS: Encryption system for safeguarding cloud data Scram Software has announced that ScramFS an internationally peer-reviewed encryption system for safeguarding cloud data is now available globally to SMEs, government and not-for-profit organizations, enabling encryption of sensitive data to reduce breaches and assist in ensuring legal, HIPPA and GDPR compliance. Dtex Systems updates its Advanced User Behavior Intelligence Platform Dtex Systems announced innovations to its Advanced User Behavior Intelligence Platform, designed to meet the More


Khronos Adds Draco Geometry Compression To glTF 2.0 Phoronix

Khronos' glTF transmission format for 3D scenes and models continues getting better. This 3D format has seen adoption by countless applications and engines and even usage within Microsoft products. Khronos' latest advancement to glTF 2.0 is a compression extension...


Intel offers to pay for Spectre-like side channel vulnerabilities Help Net Security

Intel is expanding the bug bounty program it started last March, and is raising considerably the awards it plans to give out for helpful vulnerability information. Where information about critical vulnerabilities in Intel software, firmware and hardware could have previously been rewarded with up to $7,500, $10,000 and $30,000, respectively, now the bounties in those same categories go up to $10,000, $30,000 and $100,000. A new bug bounty program for side channel vulnerabilities The company More


Cyber Intrusion Creates More Havoc for Washington States New Marijuana Tracking System IEEE Spectrum Recent Content full text

Other states seed-to-sale tracking systems have troubles of their own Photo: iStock Photo

Licensed marijuana product growers and retailers have been very unhappy with Washington States new seed-to-sale marijuana tracking system that went live on 1 February.

Buggy software has kept many suppliers from shipping their products because of manifest errors and, equally, retailers from accepting their orders. While Washingtons Liquor and Cannabis Board officials have insisted that the myriad software problems are being fixed or work arounds exist for most of them, it also has disclosed that the tracking system experienced a cyber intrusion.

In a letter to licensees, the Liquor and Cannabis Board stated that on 1 February someone downloaded a copy of the traceability database, which in turn affected key operations of the tracking system in a way the Board refused to disclose. The intruder was able to access information for four days of marijuana deliveries, including delivery-vehicle information together with type, license-plate number and VIN numbers. The Liquor and Cannabis Board said that since the latter information was publicly available and no personal information was accessed, there was no need for anyone to be concerned. Retailers and growers, however, were not exactly comforted by the Boards reassurances.

Like most other states that have legalized marijuana in some form, Washington State requires that marijuana products be tracked from seed, or when its planted, to sale to a customer, so the state will have insights into the state of the market and movements of the products. The state, which allowed the retail sale of marijuana in 2014, initially used the software provided by BioTrackTHC. However, the company decided against bidding fo...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Friday, 16 February


Peter Thiel Migrating From Silicon Valley to Los Angeles SoylentNews

Netflix's CEO offered to resign from Facebook's board in 2016, citing his fellow board member Peter Thiel's support of Donald Trump:

Netflix CEO Reed Hastings who called his fellow board member Thiel's support of Trump "catastrophically bad judgment" in an email leaked to the Times also offered to resign over his disagreement with Thiel, according to a Wall Street Journal report published Thursday. Sources told WSJ that Facebook CEO Zuckerberg declined Hastings' offer to resign. Facebook declined to comment on the matter to Business Insider.

Now, Thiel may resign from Facebook's board instead in the midst of packing up and leaving the Bay area:

The founder of PayPal and a prominent investor in Silicon Valley, Thiel is reportedly moving his investment firms Thiel Capital and Thiel Foundation out of the Bay Area and into Los Angeles this year, according to WSJ.

In L.A., Thiel is also reportedly planning to build "a right-leaning media outlet to foster discussion and community around conservative topics." Thiel bankrolled the lawsuits that eventually forced Gawker Media into bankruptcy, and has been trying to buy Gawker's now-defunct flagship site.

Although Thiel has called Silicon Valley a "one-party state", in the 2016 Presidential election, Hillary Clinton beat President Trump 72 percent to 22 percent in Los Angeles County.

The Guardian also has an article about Thiel's involvement in New Zealand.

Also at Ars Technica, The Mercury News, LA Times, and Vanity Fair.

Related: Peter Thiel Acquires NZ Citizenship and Large Property
Everything Wrong with Peter Thiel's Doomsday Survival Plan


Still relying solely on CVE and NVD for vulnerability tracking? Bad idea Help Net Security

2017 broke the previous all-time record for the highest number of reported vulnerabilities. The 20,832 vulnerabilities cataloged during 2017 by Risk Based Security (VulnDB) eclipsed the total covered by MITREs Common Vulnerability Enumeration (CVE) and the National Vulnerability Database (NVD) by more than 7,900. Incredibly, we see too many companies still relying on CVE and NVD for vulnerability tracking, despite the US government funded organization falling short year after year. While some argue that the More


Meet Fevrier 2018 HZV / Hackerzvoice / The Hackademy

Comme tous les premiers samedis du mois, c'est meeting HZV ! 

RDV ce samedi 3 Mars 2018 l'Electrolab 52, Rue Paul Lescop Nanterre  16H !


Pas de talk programm pour le moment, si vous voulez en proposer un, crivez-nous sur meet [at] hackerzvoice [dot] net !


Piqre de rappel : le CFP de la #ndh16 est toujours ouvert, vous avez jusqu'au 5 avril prochain pour faire vos propositions :


Security Affairs

OpenSSL 1.1.1 is currently in alpha. OpenSSL 1.1.1 pre release 1 has now been made available. states the OpenSSLs announcement

This OpenSSL pre-release has been provided for testing ONLY. It should NOT be used for security critical purposes. The alpha release is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under

The first Internet-Draft dates back to April 2014, in January it was presented the 23 and will expire on July 9, 2018.

One of the most debated problems when dealing with TLS is the role of so-called middleboxes, many companies need to inspect the traffic for security purposes and TLS 1.3 makes it very hard.

The reductive answer to why TLS 1.3 hasnt been deployed yet is middleboxes: network appliances designed to monitor and sometimes intercept HTTPS traffic inside corporate environments and mobile networks. Some of these middleboxes implemented TLS 1.2 incorrectly and now thats blocking browsers from releasing TLS 1.3. However, simply blaming network appliance vendors would be disingenuous. reads a blog post published by Cloudflare in December that explained the difficulties of mass deploying for the TLS 1.3.

According to the tests conducted by the IETF working group in December 2017, there was around a 3.25 percent failure rate of TLS 1.3 client connections.

OpenSSL TLS 1.3

TLS 1.3 will deprecate old cryptographic algorithms entirely, this is the...


Slow Down That Hot Rod Camera Dolly Hackaday

[Eric Strebel]  uses a small homemade vehicle with his camera mounted on it to get great tracking shots for the intros to his videos. If the movement is slow enough then the effect is quite professional looking. But he wanted it eight times slower. We not only like the simple way he did it, along with how he machined parts for it, but the result makes it look like a hot rod, hence his name for it, the dolly hot rod. He also has an elegant mechanism for disengaging the motor while he repositions the dolly.

Machining Bondo body filler cylinderMachining Bondo body filler cylinder

The are many ways to slow down a rotation. Were assuming he was already at the minimum speed for the vehicles 8 RPM motor transmission and electronic speed controller. Gears or pulleys would probably be the next options. But [Eric] went even simpler, switching from roller blade wheels to larger diameter scooter wheels.

As simple as that sounds though, it led to that age-old conundrum, how to attach the wheels to the vehicle. The axle is made up of PVC tubes. So he...


Impact of Data Breaches on Corporations' Stock Values... None That Matters? SoylentNews

Picked this on Bruce Schneier's CRYPTO-GRAM latest issue, under the very terse description of

Interesting research: "Long-term market implications of data breaches, not," by Russell Lange and Eric W. Burger. The market isn't going to fix this. If we want better security, we need to regulate the market.

The "Long term implications..." link is paywalled, but there are two other recent(ish) academic papers linked.

The first one, "Market Implications of Data Breaches" by Russell Lange and Eric W. Burger (21 PDF pages, title page, ToC and references included). The "executive summary/key findings":

  • While the difference in stock price between the sampled breached companies and their peers was negative (-1.13%) in the first three days following announcement of a breach, by the 14th day the return difference had rebounded to +0.05%, and on average remained positive through the period assessed.
  • For the differences in the breached companies' betas and the beta of their peer sets, the differences in the means of 8 months pre-breach versus post-breach was not meaningful at 90, 180, and 360-day post-breach periods.
  • For the differences in the breached companies' beta correlations against the peer indices pre- and post-breach, the difference in the means of the rolling 60-day correlation 8 months pre-breach versus post-breach was not meaningful at 90, 180, and 360-day post-breach periods.
  • In regression analysis, use of the number of accessed records, date, data sensitivity, and malicious versus accidental leak as variables failed to yield an R2 greater than 16.15% for response variables of 3, 14, 60, and 90-day return differential, excess beta differential, and rolling beta correlation differential, indicating
    that the financial impact on breached companies was highly idiosyncratic.
  • Based on returns, the most impacted industries at the 3-day post-breach date were U.S Financial Services, Transportation, and Global Telecom.
    At the 90-day post-breach date, the 3 most impacted industries were U.S. Financial Services, U.S. Healthcare, and Global Telecom.

Read more of this story at SoylentNews.


Intel Open-Sources LLVM Graphics Compiler, Compute Runtime With OpenCL 2.1+ Phoronix

Now it's clear why Intel hasn't been working on the Beignet code-base in months as they have been quietly working on a new and better OpenCL stack and run-time! On open-source Intel OpenCL you can now have OpenCL 2.1 while OpenCL 2.2 support is on the way...


Solus 4 To Offer Experimental GNOME Wayland Session, MATE UI Refresh Phoronix

The Solus Linux distribution has offered up some new details this week on their upcoming Solus 4 release...


DRI3 v1.1 Updated by Collabora For Modifiers & Multi-Plane Support Phoronix

As a sign that DRI3 v1.1 is hopefully ready to go, Louis-Francis Ratt-Boulianne of Collabora on Friday sent out his latest set of patches adding modifiers and multi-plane support to the Direct Rendering Infrastructure...


PCI Council and X9 Committee to Combine PIN Security Standards SoylentNews

The PCI Security Standards Council (PCI SSC) and financial services standards outfit the Accredited Standards Committee X9 have decided to combine forces on personal-identification-number-handling-rules.

Today, both have their own standards, which is a pain for organisations like banks that follow rules set by both organisations. The overlapping standards also make life hard for assessors who may consider an organisation's PCI compliance is not in order if they adhere to the X9 rules.

The Register imagines a few readers don't enjoy having to figure out how to get the two standards running alongside each other.

Hence the decision to consolidate the PCI PIN Security Standard and the X9 TR39 PIN Standard.

Source: The Register

Original Submission

Read more of this story at SoylentNews.


Patent Trolls Are Thwarted by Judges, But Patent Lawyers View Them as a Business Opportunity Techrights

Law firms in various states hope that the demise of the Eastern District of Texas will mean more lawsuits where they are

USA map

Summary: Patent lawyers are salivating over the idea that trolls may be coming to their state/s; owing to courts and the Patent Trial and Appeal Board (PTAB) other trolls software patents get invalidated

AS NOTED in the last post, patents granted by the USPTO are often passed to trolls sooner or later. The trolls would like to think of themselves as monetisers, but all they really do is tax the economy. That does not help innovation or creativity; it merely crushes both. TC Heartland, a Supreme Court decision from about 9 months ago, continues to worry firms that profit from patent trolls and aggressors. One of them, writing in lawyers media, expressed a common lawyers concern that patent litigation is declining (true story), then expressing optimism about trolls coming home to Georgia:

Is patent litigation coming home to Georgia? Last year the U.S. Supreme Court holding in TC Heartland v. Kraft Foods Grp. Brands significantly affected the law of venue jurisdiction under 28 U.S.C. 1400(b) for patent infringement cases. One result was to shift new patent complaint filings away from federal district courts that had been perceived to be plaintiff-friendly, such as the Eastern District of Texas, as I recently wrote in the Daily Report. TC Heartland only clarified one of the tests for patent venue in 1400(b), holding that the provision where the defendant resides is limited to only the district where the defendant is incorporated.


The year 2018 will likely bring resolution to some of these issues and more patent litigation to Georgia. I believe we can expect at least one, but perhaps two precedential Federal Circuit decisions further clarifying where a defendant committed an act of infringement, with one or both relating to software method and pharmaceutic...


Forever Young: The Documentary BBC News Lifeboat News: The Blog

Is ageing a disease? One that can be cured? BBCs Gabriela Torres meets the self-experimenters and scientists who are trying to dramatically extend our lives.

Please subscribe HERE

World In Pictures
Big Hitters
Just Good News


Theres Now A New MIDI Spec, And Drones Hackaday

MIDI, the Musical Instrument Digital Interface, was released in 1983 in a truly bizarre association between musical instrument manufacturers. At no other time, before or since, has there been such cooperation between different manufacturers to define a standard. Since then, the MIDI spec has been expanded with SysEx messages, the ability to dump samples via MIDI, redefining the tuning of instruments via MIDI to support non-Western music, and somewhere deep in the spec, karaoke machines.

Now theres a new update to the MIDI spec (Gearnews link, heres the official announcement but their website requires registration and is a hot garbage fire). At this years NAMM, the place where MIDI was first demonstrated decades ago,  the MIDI Manufacturers Association announced an update to MIDI that makes instruments and controllers smarter, and almost self-learning.

There are three new bits to the new update to the MIDI spec. The first is Profile Configuration, a way to auto-configure complex controller mappings, described as, MIDI Learn on steroids. The second update is Property Exchange, and allows MIDI devices to set device properties like, product name, configuration settings, controller names, and patch data. This is effectively setting metadata in controllers and devices. The third new bit is Protocol Negotiation, a way to automatically push future, next-gen protocols over a DIN-5 connector.

What does this all mean? Drones. No, Im serious. The MIDI association is tinkering around with some Tiny Whoops and Phantoms, and posted a video of drones being controlled by a MIDI controller. Play a glissando up, and the drone goes up. You can check out a video of that below.


Microsofts Patent Moves: Dominion Harbor, Intellectual Ventures, Intellectual Discovery, NEC and Uber Techrights

Trolls' harbour

Summary: A look at some of the latest moves and twists, as patents change hands and there are still signs of Microsofts hidden hand

THE theme of patent trolls entities that do nothing but lawsuits and threats of lawsuits is still a thing. Yes, the USPTO is aware of the problem and even the US Supreme Court uses the term trolls. Here in Europe the press rarely mentions the problem, which is being exacerbated by the EPO. Patent trolls are on the rise in Germany and London too has become a hot destination for trolls. Most vulnerable to these are SMEs, which are less capable of affording justice (legal process) and have less money to shell out for protection.

Patent trolls are on the rise in Germany and London too has become a hot destination for trolls.Thankfully, some of the trolling sector is drifting eastwards to China. Its not a good thing for China, but it seems to be a side effect of a misguided patent policy which attracted low-quality patents in large numbers. When one has low-quality patents in large numbers one can simply use the sheer amount of them irrespective of underlying quality to threaten ruinous litigation and thus extort money for settlements. This seems to be the business model of Dominion Harbor, which is a malicious patent troll that strongly dislikes me, worships other trolls, and associates with rather unpleasant people. IAM wrote the other day that [a]fter purchase of 4,000 former Kodak patents from IV last year, Dominion is building quite a portfolio.

IV is Intellectual Ventures, the worlds largest patent troll, which came from Microsoft. Proud to announce our latest acquisition, the troll said. Dominion Harbor Acquires Leading NEC LCD Portfolio with more than 1,200 assets

Patent aggregators such as these are of no worth unless they become trolls or pass their so-called assets to trolls. Thats how Intellectual Ve...


A new text bomb threatens Apple devices, a single character can crash any apple iPhone, iPad Or Mac Security Affairs

Researchers discovered a new dangerous text bomb that crashes Apple devices, only a single character of the Indian Telugu language could create the chaos.

A new text bomb threatens Apple devices, just a single character of the Indian alphabet (precisely the
Telugu language, a Dravidian language spoken in India by about 70 million people) can crash your device and block access to the Messaging app in iOS, including WhatsApp, Facebook Messenger, Outlook for iOS, Gmail, Safari and Messages for the macOS versions.

The issue seems not affect the beta versions of iOS 11.3 and Telegram and Skype applications.

First spotted by Italian Blog Mobile World, the text bomb affects a wide range of Apple devices, including iPads, Macs and even Watch OS devices running the latest versions of OS.

apple text bomb

The news of the bug was first reported on the Italian Blog Mobile World, the issue can be it can be easily exploited by anyone just by sending a message containing the Telugu character to the recipient.

Once the recipient receives the message or typed the Telugu symbol into the text editor, its Apple device will crash.

To fix the issue on the device that is crashing after received the text bomb is possible to send a message to the app that is crashing.

According to the bug report published on OpenRadar:

When iOS, MacOS, watchOS try to render Indian symbol all of it has crashed Steps to Re...


Court Orders Spanish ISPs to Block Pirate Sites For Hollywood TorrentFreak

Determined to reduce levels of piracy globally, Hollywood has become one of the main proponents of site-blocking on the planet. To date there have been multiple lawsuits in far-flung jurisdictions, with Europe one of the primary targets.

Following complaints from Disney, 20th Century Fox, Paramount, Sony, Universal and Warner, Spain has become one of the latest targets. According to the studios a pair of sites and infringe their copyrights on a grand scale and need to be slowed down by preventing users from accessing them.

HDFull is a platform that provides movies and TV shows in both Spanish and English. Almost 60% its traffic comes from Spain and after a huge surge in visitors last July, its now the 337th most popular site in the country according to Alexa. Visitors from Mexico, Argentina, United States and Chile make up the rest of its audience. is a similar streaming portal specializing in movies, mainly in Spanish. A third of the sites visitors hail from Mexico with the remainder coming from Argentina, Columbia, Spain and Chile. In common with HDFull, Repelis has been building its visitor numbers quickly since 2017.

The studios demanding more blocks

With a ruling in hand from the European Court of Justice which determined that sites can be blocked on copyright infringement grounds, the studios asked the courts to issue an injunction against several local ISPs including Telefnica, Vodafone, Orange and Xfera. In an order handed down this week, Barcelona Commercial Court No. 6 sided with the studios and ordered the ISPs to begin blocking the sites.

They damage the legitimate rights of those who own the films and series, which these pages illegally display and with which they profit illegally through the advertising revenues they generate, a statement from the Spanish Federation of Cinematographic Distributors (FEDECINE) reads.

FEDECINE General director Estela Artacho said that changes in local law have helped to provide the studios with a new way to protect audiovisual content released in Spain.

Thanks to the latest reform of the Civil Procedure Law, we have in this jurisdiction a new way to exercise different possibilities to protect our commercial film offering, Artacho said.

Those of us who are part of this industry work to make culture accessible and offer the best cinematographic experience in the best possible conditions, guaranteeing the continuity of the sector.

The development w...


MeltdownPrime and SpectrePrime Attacks Likely Mitigated by Existing Patches SoylentNews

New exploits related to Meltdown and Spectre have been found, using two CPU cores against each other in cache-based side-channel attacks. The attacks are likely stopped by existing software patches for Meltdown and Spectre, but not necessarily the hardware changes that Intel and others are working on:

When details of the Meltdown and Spectre CPU security vulnerabilities emerged last month, the researchers involved hinted that further exploits may be developed beyond the early proof-of-concept examples. It didn't take long. In a research paper "MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks Exploiting Invalidation-Based Coherence Protocols" out this month, bit boffins from Princeton University and chip designer Nvidia describe variants of Meltdown and Spectre exploit code that can be used to conduct side-channel timing attacks.

In short, the team have discovered new ways for malware to extract sensitive information, such as passwords and other secrets, from a vulnerable computer's memory by exploiting the Meltdown and Spectre design blunders in modern processors. The software mitigations being developed and rolled out to thwart Meltdown and Spectre attacks, which may bring with them performance hits, will likely stop these new exploits.

Crucially, however, changes to the underlying hardware probably will not: that is to say, whatever Intel and its rivals are working on right now to rid their CPU blueprints of these vulnerabilities may not be enough. These fresh exploits attack flaws deeply embedded within modern chip architecture that will be difficult to engineer out. Before you panic: don't. No exploit code has been released.

Intel is now offering $250,000 for side-channel attacks.

Original Submission

Read more of this story at SoylentNews.


[slackware-security] irssi (SSA:2018-046-01) Bugtraq

Posted by Slackware Security Team on Feb 16

[slackware-security] irssi (SSA:2018-046-01)

New irssi packages are available for Slackware 14.0, 14.1, 14.2, and -current
to fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:
patches/packages/irssi-1.0.7-i586-1_slack14.2.txz: Upgraded.
This update fixes bugs and security issues.
For more information, see:


Hunting for the ancient lost farms of North America Terra Forming Terra

 What leaps out at you is that domestication was a well understood art practiced everywhere just as plant breeding is today.

As i have posted, our future is organic and in conjunction with robot supported high density populations.  Domestication and plant breeding will be practiced everywhere across the globe.  Our archeological record will easily promote a number of obvious candidates.

Certainly the global demand is there,..

Hunting for the ancient lost farms of North America

2,000 years ago, people domesticated these plants. Now theyre wild weeds. What happened?


LPPFusion Report Terra Forming Terra

This report is heavily formatted but seems to make it through blogger.

As expected the process of development is long and tortuous.  Yet i do think this is the most promising of the available tech.

At least they are getting funding and are moving forward..




Scandal, Corruption, Lawbreaking And So What? Terra Forming Terra

I am sorry folks, but this article is not from the alt right but from the well established National Review and certainly cannot be ignored.  After months of steady disclosure against a wall of Dem protest and denial we have here all the ugly.

It is all as bad as might be imagined.  Yet it is still all about the behavior of political actors and politicized actors surrounding the Obama Administration and their failed 2016 campaign to essentially override the inconvenience of the Constitution. 

The reason it is not 'so what' is that Trump won.  Better he came weaponized himself with excellent Intel and critical support from the Legions and in particular the Praetorian Guard.

He has allowed all who are stupid to hang themselves over the past year while every conversation was listened to.  Now they will all be renditioned to GITMO as enemy combatants out of the reach of their lawyers to share their knowledge.

Astonishingly, the civilian aspects of the enforcement powers of the Republic, politicized and integrated with the Global pedophile natural conspiracy for personal profit.  This included leadership of the CIA, the DOJ and the FBI.  The scope of the treason is impossible to grasp.

The take down was massively planned and organized and is ongoing today.  I do think that it can no longer be turned back.  We are certain that the Navy, the Marines and most aspects of military Intel is fully involved at the highest levels. This will include the Space Fleet as well as protector.  Other units are likely out of the information loop but can be keyed up as needed.


Scandal, Corruption, Lawbreaking And So What? 



Lawrence Livermore unlocks 3D printing to smaller than 150 nanometer features Terra Forming Terra

I do not know if we are at the real limits, but this is certainly close enough for just about anything we want to try out that takes additional advantage of quantum effects as well.

This will also hugely expand the wow factor.   The other limitation not mentioned is our imaginations.  Recall that gem in Star Wars that carried all the data?

Perhaps the future of memory sticks.

Lawrence Livermore unlocks 3D printing to smaller than 150 nanometer features

brian wang | January 10, 2018

Lawrence Livermore National Laboratory (LLNL) researchers have discovered novel ways to extend the capabilities of two-photon lithography (TPL), a high-resolution 3D printing technique capable of producing nanoscale features smaller than one-hundredth the width of a human hair.
The findings unleashes the potential for X-ray computed tomography (CT) to analyze stress or defects noninvasively in embedded 3D-printed medical devices or implants.

Two-photon lithography typically requires a thin glass slide, a lens and an immersion oil to help the laser light focus to a fine point where curing and printing occurs. It differs from other 3D-printing methods in resolution, because it can produce features smaller than the laser light spot, a scale no other printing process can match. The technique bypasses the usual diffraction limit of other methods because the photoresist material that cures and hardens to create structures previously a trade secret simultaneously absorbs two photons instead of one.


8tracks - 7,990,619 breached accounts Have I been pwned? latest breaches

In June 2017, the online playlists service known as 8Tracks suffered a data breach which impacted 18 million accounts. In their disclosure, 8Tracks advised that "the vector for the attack was an employees GitHub account, which was not secured using two-factor authentication". Salted SHA-1 password hashes for users who didn't sign up with either Google or Facebook authentication were also included. The data was provided to HIBP by whitehat security researcher and data analyst Adam Davies and contained almost 8 million unique email addresses.


DELL EMC addressed two critical flaws in VMAX enterprise storage systems Security Affairs

Dell EMC addressed two critical vulnerabilities that affect the management interfaces for its VMAX enterprise storage systems.

The Dell EMCs VMAX Virtual Appliance (vApp) Manager is an essential component of a wide range of the enterprise storage systems.

The first flaw tracked as CVE-2018-1215 is an arbitrary file upload vulnerability that could be exploited by a remote authenticated attacker to potentially upload arbitrary maliciously crafted files in any location on the web server. The flaw received a Common Vulnerability Scoring System (CVSS) base score of 8.8.

Arbitrary file upload vulnerability A remote authenticated malicious user may potentially upload arbitrary maliciously crafted files in any location on the web server. By chaining this vulnerability with CVE-2018-1216, the attacker may use the default account to exploit this vulnerability. reads the security advisory.

VMAX enterprise storage systems

The second flaw tracked as CVE-2018-1216 is an undocumented default account in the vApp Manager with a hard-coded password. The flaw received a Common Vulnerability Scoring System (CVSS) base score of 9.8.

Hard-coded password vulnerability The vApp Manager contains an undocumented default account (smc) with a hard-coded password that may be used with certain web servlets. A remote attacker with the knowledge of the hard-coded password and the message format may use vulnerable servlets to gain unauthorized access to the system. Note: This account cannot be used to log in via the web user interface. continues the advisory. 

The CVE-2018-1215 could be chained with a second flaw tracked as CVE-2018-1216 to use a hard-coded password to a default account to exploit this vulnerability.

The vApp Manager which is embedded in Dell EMC Unisphere for VMAX, Dell EMC Solutions Enabler, Dell EMC VASA Virtual Appliances, and Dell EMC VMAX Embedded Management (eManagement) contains multiple security vulnerabilities that may potentially be exploited by malicious users to compromise the affected system. sta...


A Single-Character Message Can Crash Any Apple iPhone, iPad Or Mac The Hacker News

Only a single character can crash your iPhone and block access to the Messaging app in iOS as well as popular apps like WhatsApp, Facebook Messenger, Outlook for iOS, and Gmail. First spotted by Italian Blog Mobile World, a potentially new severe bug affects not only iPhones but also a wide range of Apple devices, including iPads, Macs and even Watch OS devices running the latest versions of


Milky Way Ties with Neighbor in Galactic Arms Race SoylentNews

Astronomers have discovered that our nearest large neighbour, the Andromeda galaxy, is roughly the same size as the Milky Way. It had been thought that Andromeda was two to three times the size of the Milky Way, and that our own galaxy would ultimately be engulfed by our supposedly bigger neighbour. But the latest research, published today, evens the score between the two galaxies.

The study found the weight of the Andromeda is 800 billion times heavier than the sun, on par with the Milky Way. Astrophysicist Dr Prajwal Kafle, from the University of Western Australia node of the International Centre for Radio Astronomy Research, said the study used a new technique to measure the speed required to escape a galaxy. "When a rocket is launched into space, it is thrown out with a speed of 11 km/s to overcome the Earth's gravitational pull," he said. "Our home galaxy, the Milky Way, is over a trillion times heavier than our tiny planet Earth so to escape its gravitational pull we have to launch with a speed of 550 km/s. We used this technique to tie down the mass of Andromeda."

Milky Way ties with neighbor in galactic arms race

-- submitted from IRC

Original Submission

Read more of this story at SoylentNews.


Pulling Music Out Of Thin Air with a Raspberry Pi Hackaday

Inspired by the concept of a laser harp, [2fishy] followed the same principle but chose a simpler and safer alternative by using LEDs instead. For each playable tone, a LED is mounted opposite a light dependent resistor, creating an array of switches that is then connected to the Raspberry Pis GPIO pins. A Python script is handling the rest, polling the GPIO states and with a little help from pygame, triggering MIDI playback whenever the light stream is interrupted.

There are enough LED/LDR pairs to play one full octave and have some additional control inputs for menu and octave shifting. This concept will naturally require some adjustments to your playing you can get an idea of it in the demonstration video after the break. And if this design is still not the right size for you, or if you prefer to play in total darkness, this similar MIDI instrument using ultrasonic distance sensors could be of interest.


Austria: The "Ashtray of Europe"? SoylentNews

Austria has one of the highest rates of smoking and youth smoking among high income countries, and that might not be changing anytime soon:

Many Western countries have banned smoking in bars and restaurants, but Austria is bucking that trend. Under a law passed in 2015, Austria was due to bring in a total ban this May, but now its new government of the conservatives and the far-right Freedom Party have scrapped the plans.

The move was spearheaded by the leader of the Freedom Party, Austria's Vice Chancellor Heinz-Christian Strache, himself a smoker, who told parliament last month that it was about freedom of choice. He said restaurants should be free to decide if they want to have smoking sections, where "a citizen has the possibility to decide perhaps to enjoy a cigarette or a pipe or a cigar with their coffee".

The move has horrified Austria's medical establishment. Dr Manfred Neuberger, professor emeritus at the Medical University of Vienna, says it is "a public health disaster".

"The decision is irresponsible. It was a victory for the tobacco industry. The new government made Austria into the ashtray of Europe."

Meanwhile, the country is considering buying more jet fighters, recruiting more police, defunding its public broadcaster, and examining its past.

Original Submission

Read more of this story at SoylentNews.


Intel just put a quantum computer on a silicon chip Lifeboat News: The Blog

A Dutch company called QuTech, working with Intel, just pulled off a silicon chip-based quantum computer. The futures looking good for spooky action.


Graphene film makes dirty water drinkable in a single step Lifeboat News: The Blog

Every year, millions of people around the world die from drinking unclean water. Now, researchers have developed a process that can purify water, no matter how dirty it is, in a single step. Scientists from Australian research organization CSIRO have created a filtration technique using a graphene film with microscopic nano-channels that lets water pass through, but stops pollutants. The process, called Graphair, is so effective that water samples from Sydney Harbor were safe to drink after being treated.

And while the film hails from graphene, Graphair is comparatively cheaper, faster and more environmentally-friendly to make, as its primary component is renewable soybean oil, which also helps maximise the efficiency of the purifying techniques filter counterpart. Over time, oil-based pollutants can impede water filters, so contaminants have to be removed before filtering can even begin, but using Graphair removes these pollutants faster than any other method.

Water purification usually involves a complex process of several steps, so this breakthrough could have a significant impact on the some 2.1 billion people who dont have clean, safe drinking water. All thats needed is heat, our graphene, a membrane filter and a small water pump. Were hoping to commence field trials in a developing world community next year, said lead author Dr Dong Han Seo, who added that the team is looking for industry partners to help scale up the technology, and is also working on other applications for Graphair, such as seawater and industrial effluents.


[SECURITY] [DSA 4115-1] quagga security update Bugtraq

Posted by Salvatore Bonaccorso on Feb 15

Debian Security Advisory DSA-4115-1 security () debian org Salvatore Bonaccorso
February 15, 2018

Package : quagga
CVE ID : CVE-2018-5378 CVE-2018-5379...


Vulnerability Disclosure (Web Apps)-Bravo Tejari Web Portal-Unrestricted File Upload Bugtraq

Posted by Arvind Vishwakarma on Feb 15

Vulnerability Type: Unrestricted File Upload
Vendor of Product: Tejari
Affected Product Code Base: Bravo Solution
Affected Component: Web Interface Management.
Attack Type: Local - Authenticated
Impact: Malicous File Upload

Product description:
Brao Tejari is a strategic procurement platform that enables...


Re: [FD] Defense in depth -- the Microsoft way (part 51): Skype's home-grown updater allows escalation of privilege to SYSTEM Bugtraq

Posted by Stefan Kanthak on Feb 15

"Jeffrey Walton" <noloader () gmail com> wrote:

[ ]

This is of course related: after Zack Whittacker published
some hundred news outlets, bloggers etc. followed up.
Except Zack Whittacker nobody contacted me.
Many copied his article, some others added their own and wrong...


Vulnerability Disclosure (Web Apps)-Bravo Tejari Web Portal-CSRF Bugtraq

Posted by Arvind Vishwakarma on Feb 15

Vulnerability Type: Cross Site Request Forgery (CSRF)
Vendor of Product: Tejari
Affected Product Code Base: Bravo Solution
Affected Component: Web Interface Management.
Attack Type: Local - Authenticated
Impact: Unauthorised Access

Product description:
Bravo Tejari is a strategic procurement platform that enables
organizations to generate more value,...


Italian Anti-Corruption Authority (ANAC) Adopts Onion Services SoylentNews

The Tor Project reports that the Italian Anti-Corruption Authority will now be using Tor as part of its method of collecting tips anonymously.

To comply with these standards, the Italian Anti-Corruption Authority (ANAC), an administrative watchdog, just launched their national online whistleblowing platform using onion services, giving whistleblowers who come forward a secure way to report illegal activity while protecting their identities. Most anti-corruption whistleblowers first speak out anonymously, and only when they know that their concerns are being addressed do they disclose their identities, as reported by Transparency International Italy, an organization advocating uses of Tor in the fight against corruption since 2014.

More details are available in Italian.

Source : Italian Anti-Corruption Authority (ANAC) Adopts Onion Services

Original Submission

Read more of this story at SoylentNews.


Learn About Waveforms Interactively Hackaday

Well be honest: If you are a regular Hackaday reader, you probably wont learn much new information about waveforms from this website. However, the presentation is a great example of using React on a webpage and who knows you might just pick up something interesting. At the very least, itll be a great resource the next time you try to help someone starting out.

The animated waveform is cool enough. It is also interesting that it changes based on where you are in the text. The really interesting part though is that you can press the M key to unmute your audio and hear what the wave sounds like. You can also use adjustments to control the frequency and amplitude of the wave.

The topics center around audio, although they have some applicability to higher frequencies, too. Theres talk about amplitude, frequency, and phase. There are examples of sine waves, square waves, and more. There is also a really good example of how adding a series of sine waves can create a square wave via harmonics.

If you want more details about synthesis, by the way, we covered it earlier. In fact, weve talked about it a few times.


The Case for Making Cities Out of Wood - Facts So Romantic Nautilus

An Alphabet subsidiary is planning to build a futuristic neighborhood, not out of concrete and steel, but woodand wood is looking good.Photograph by Daici Ano / Flickr

Last month, Dan Doctoroff, the C.E.O. of Sidewalk Labs, Googles sibling company under Alphabet, answered a question about what his company actually does during a Reddit Ask Me Anything session, replying, The short answer is: We want to build the first truly 21st-century city. Quayside, a Toronto neighborhood the company is developing in partnership with a Canadian tri-government agency, is the first step toward Doctoroffs goal. It has been in the news recently because it could inspire a Black Mirror plot: It will be built from the Internet up, according to a project document, a merger of physical and digital realms. Fittingly, according to the New York Times, No obvious way to opt out of Quaysides surveillance systems exists, except by staying out of the area.

But Quaysides newsworthy for another, more encouraging reason: The plan is to build the place, not out of concrete and steel, but woodand wood is looking good. A recent advance in wood technology, announced this month, should interest the neighborhoods developers:
Read More




It Takes a Human to Screw Things Up Properly SoylentNews

Submitted via IRC for TheMightyBuzzard

Humans easily outperform machines when it comes to tightening and loosening screw fasteners. The future of manufacturing and recycling may depend on changing that.

In the pantheon of technologies that make our modern society possible, one of the most underappreciated and neglected is the threaded fastener, more commonly known as the screw. This technology emerged at the dawn of the industrial era, when it became possible to make metal gadgets like these on a large scale.

Today, these devices literally hold the world together. Our 21st-century lifestyles would not be possible without them, and they are likely to play an indispensable role for the foreseeable future.

Yet in a world where manufacturing techniques are increasingly automated, there is a problem. The process of screwing and unscrewing is still one in which humans outperform machines. Robotic devices have difficulty locating screws and their sockets and then manipulating screws and screwdrivers effectively.

[...] These researchers are part of a team building robots that can take apart electronic devices, like smartphones, for recycling. The project is called RecyBot, and its goal is to create a high-speed intelligent robotic system for dismantling electronics.

That's a considerable challenge, and one of the biggest headaches is unscrewing. So the team at least have this under their belt. But the same technology could be applied in a wide range of smart factories that have to assemble and disassemble components.


Source: Haptics of Screwing and Unscrewing for its Application in Smart Factories for Disassembly

Original Submission

Read more of this story at SoylentNews.



The Countries Most Likely to Survive Climate Change in One Infographic SoylentNews

TheEcoExperts report

So, which country is the most likely to survive climate change?

The answer is Norway, thanks to its low vulnerability score and high readiness score. The nation's Nordic neighbours also fared well, with Finland (3rd), Sweden (4th), Denmark (6th), and Iceland (8th) landing 5 out of the 10 top spots for survivability. So we should all flee to the countries of northern Europe and the north Atlantic to live out our final days should our planet become uninhabitable.

Even more surprising is China's position in the ranking--59th. Despite arguably being the world's biggest contributor towards climate change--emitting a massive 9,040 metric tons of CO2 into the atmosphere every year--the country is somewhat sensitive to the effects of a warming planet. This is largely due to the nation's growing population which is putting a strain on China's natural resources and public services. Rather ironically, China's vulnerability to climate change therefore means that they may eventually reap what they sow.

...and who are the biggest losers?

At the other end of the scale, it comes as no surprise that the world's poorest and least developed nations have the lowest chance of surviving climate change. Countries in sub-Saharan Africa fill the bottom 10 spaces for survivability, with Somalia being named the country least likely to survive climate change.

Chad, Eritrea, the Central African Republic, and the Democratic Republic of Congo also fared badly, owing to their unstable governance, poor infrastructure, lack of healthcare, and a scarcity of food and water.

These findings serve as a stark reminder of the need for wealthier, more established countries to support the world's most vulnerable nations. This is particularly true given that many of the world's richest economies contribute the most to climate change but are in fact the least likely to be affected by it.

Original Submission

Read more of this story at SoylentNews.


Building an Arduino Smart IC Tester for $25 Hackaday

Theres no question that you can get a lot done with the classic multimeter; its arguably the single most capable tool on your bench. But the farther down the rabbit hole of hacking and reverse engineering you go, the more extravagant your testing and diagnostic gear tends to get. For some of us thats just an annoying reality of the game. For others its an excuse to buy, and maybe even build, some highly specialized equipment. Well give you one guess as to which group we fall into here at Hackaday.

[Akshay Baweja] is clearly a member of the second group. Hes recently published a guide on building a very slick intelligent Integrated Circuit tester with a total cost of under $25 USD. Whether youre trying to identify an unknown chip or verifying your latest parts off the slow-boat from China actually work before installing them in your finished product, this $25 tool could end up saving you a lot of time and aggravation.

[Akshay] walks readers through the components and assembly of his IC tester, which takes the form of a Shield for the Arduino Mega 2560. The custom PCB he designed and had manufactured holds the 20 Pin ZIF Socket as well as the 2.4 inch TFT touch screen. The screen features an integrated micro SD slot which is important as you need the SD card to hold the chip database.

With an IC to test inserted into the ZIF socket,...


HPR2490: What's In My Podcatcher 2 Hacker Public Radio

I listen to many podcasts as my primary form of audio entertainment, and because Hacker Public Radio listeners also tend to be podcast listeners (pretty much by definition) I am sharing my finds with the community. Besides, Ken made me do it. Links:


Links 15/2/2018: GNOME 3.28 Beta, Rust 1.24 Techrights

GNOME bluefish



  • Server

    • Understanding SELinux labels for container runtimes

      SELinux provides great filesystem separation for your container runtimes, but you need to be careful when running multiple container runtimes on the same machine at the same time, and also careful to clean up any content left on a host when you remove a container.

    • Servers? We dont need no stinkin servers!

      OK, so well always need some servers.

      But with the rise of virtual machines (VM)s and container technologies such as Docker, combined with DevOps and cloud orchestration to automatically manage ever-larger numbers of server applications, serverless computing is becoming real.

    • Kubernetes Monitoring with Prometheus

      Kubernetes makes management of complex environments easy, but to ensure availability its crucial to have operational insight into the Kubernetes components and all applications running on the cluster. I believe monitoring is the backbone of a good production environment.

      Applications running in containers and orchestrated by Kubernetes are highly automated and dynamic, and so, when it comes to monitoring applications in these environments, traditional server-based monitoring tools designed for static services are not sufficient.

    • CNCFs Vitess Scales MySQL with the Help of Kubernetes

      A technology developed by YouTube to shard large MySQL databases across multiple servers, Vitess, has become the 16th hosted project of the Cloud Native Computing Foundation.

      Vitess was created for people who love MySQL for its functionality, but have chosen not to use it because it does not scale well, said Sugu Sougoumarane, one of the creators of Vitess who is...


[$] Dynamic function tracing events

For as long as the kernel has included tracepoints, developers have argued over whether those tracepoints are part of the kernel's ABI. Tracepoint changes have had to be reverted in the past because they broke existing user-space programs that had come to depend on them; meanwhile, fears of setting internal code in stone have made it difficult to add tracepoints to a number of kernel subsystems. Now, a new tracing functionality is being proposed as a way to circumvent all of those problems.


Quagga 1.2.3 release with BGP security issue fixes Open Source Security

Posted by Paul Jakma on Feb 15


Quagga 1.2.3 has been released, and it contains fixes for a number of
BGP security issues, 3 of which were not public till today. Please see:

The CERT vulnerability note is at:

Quagga advisories are at the URIs in the release announcement, also
available via either of:


Fedora Might Begin Having A Release Manager Phoronix

Fedora developers are now discussing the possibility of naming a release manager each development cycle as a person in charge of wrangling together each release and seeing that the "Rawhide" development state is kept in better condition. Who knows, this also might actually help Fedora's longtime trouble of delivering releases on time...


FDA Approves Blood Test for Concussions SoylentNews

The U.S. Food and Drug Administration has approved a blood test for detecting/diagnosing concussions:

The U.S. Food and Drug Administration today permitted marketing of the first blood test to evaluate mild traumatic brain injury (mTBI), commonly referred to as concussion, in adults. The FDA reviewed and authorized for marketing the Banyan Brain Trauma Indicator in fewer than 6 months as part of its Breakthrough Devices Program.

Most patients with a suspected head injury are examined using a neurological scale, called the 15-point Glasgow Coma Scale, followed by a computed tomography or CT scan of the head to detect brain tissue damage, or intracranial lesions, that may require treatment; however, a majority of patients evaluated for mTBI/concussion do not have detectable intracranial lesions after having a CT scan. Availability of a blood test for concussion will help health care professionals determine the need for a CT scan in patients suspected of having mTBI and help prevent unnecessary neuroimaging and associated radiation exposure to patients.

Also at STAT News and CNN.

Original Submission

Read more of this story at SoylentNews.


Facebook wants you to install a VPN app accused of spying on users HackRead

By Ryan De Souza

Facebooks Onavo VPN app the essence of situational irony

This is a post from Read the original post: Facebook wants you to install a VPN app accused of spying on users


Uber assisting in Florida shooting investigation The Hill: Technology Policy

Uber is assisting law enforcement in its investigation into Wednesday's deadly shooting at a South Florida high school. Nikolas Cruz, 19, took an Uber a little after 2 p.m. to Marjory Stoneman Douglas High School, where he killed 17 people...


Getting Ahead with Particle Source Simulation IEEE Spectrum Recent Content full text

Dont miss CSTs new eSeminar demonstrating the electromagnetic simulation of four different particles sources in CST STUDIO SUITE 2018.

This eSeminar will illustrate the electromagnetic simulation of four different particles sources in CST STUDIO SUITE 2018: a Pierce-type electron gun, a field emission source, an ion source and a magnetron cathode. It will guide you through the use of different emission models as well as the simulation of the emission in a conformal hexahedral or tetrahedral mesh. In addition, the superposition of external fields will be shown and the setup of an electron source will be demonstrated.




[CVE-2017-15712] Apache Oozie Server vulnerability Open Source Security

Posted by Rohini Palaniswamy on Feb 15

Apache Oozie is a workflow scheduler system to manage Apache Hadoop jobs.

Severity: Severe

The Apache Software Foundation

Versions Affected:
Oozie 3.1.3-incubating to Oozie 4.3.0
Oozie 5.0.0-beta1

Vulnerability allows a user of Oozie to expose private files on the Oozie
server process. The malicious user can construct a workflow XML file
containing XML directives and configuration that reference sensitive files
on the...


Top tech group exec joining White House as Trump adviser The Hill: Technology Policy

An executive at a top technology trade association will be joining the White House as a tech adviser to President Trump.Abigail Slater, the general counsel for the Internet Association (IA), which represents tech giants like Google and Facebook,...


Amazon reaches $1.2 million settlement with EPA over illegal pesticide sales The Hill: Technology Policy

The Environmental Protection Agency (EPA) reached a $1.2 million settlement with Amazon on Thursday over charges that third parties had used the website to sell thousands of illegal pesticides.This agreement will dramatically reduce the online...


Bavarian State Parliament Has Upcoming Debate About Issues Which Can Thwart UPC for Good Techrights

Bavarian State Parliament due to debate motion about the EPO Boards of Appeal

Bavarian State Parliament debate

Summary: An upcoming debate about Battistellis attacks on the EPO Boards of Appeal will open an old can of worms, which serves to show why UPC is a non-starter

A preliminary discussion is scheduled to take place at the next sitting of the EU Affairs Committee of the Bavarian State Parliament at 12:30 on Tuesday 20 February 2018.

It is expected that the motion will then be forwarded for a debate before a plenary session of the Parliament some time within the next couple of weeks.

An image of the motion (in German) is shown above along with an English translation below.

Bavarian State Parliament

17th Parliamentary Term 06.02.2018 Printed matter 17/20577


Dr. Hubert Aiwanger, Florian Streibl, Prof. (Univ. Lima) Dr. Peter Bauer, Dr. Hans Jrgen Fahn, Thorsten Glauber, Eva Gottstein, Joachim Hanisch, Johann Husler, Dr.. Leopold Herz, Nikolaus Kraus, Peter Meyer, Prof. Dr. Michael Piazolo, Bernhard Pohl, Gabi Schmidt, Dr. Karl Vetter, Jutta Widmann, Benno Zierer and parliamentary group (FREIE WHLER)

Safeguard the independence of the Boards of Appeal at the European Patent Office

The State Parliament wishes to adopt the following resolution:

The State Government [of Bavaria] is called upon to advocate at federal and European level the adoption of measures within the European Patent Office to safeguard the independence of the Boards of Appeal and thus to ensure effective legal protection.

Explanatory statement:

A number of documented incidents, as set out below, raise serious doubts about the independence of the Boards of Appeal of the European Patent Office (EPO). The apparent loss of legal certainty requires action as soon as possible.

1. On 6 December 2017, the Administrative Tribunal of the International Labour Organisation (ILOAT) ruled that a judge of the Boards of Appeal who had been unlawfully suspended was to...


High Speed Imaging Of Magnetic Fields SoylentNews

Submitted via IRC for TheMightyBuzzard

Some time before experimenting with MRI machines and building his own CT scanner, [Peter Jansen] wanted to visualize magnetic fields. One of his small side projects is building tricoders pocket sensor suites that image everything and after playing around with the magnetometer function on his Roddenberry-endorsed tool, he decided he had to have a way to visualize magnetic fields. After some work, he has the tools to do it at thousands of frames per second. It's a video camera for magnetic fields, pushing the boundaries of both magnetic imaging technology and the definition of the word 'camera'.


Original Submission

Read more of this story at SoylentNews.


Removing One Enzyme Could Be Key to Curing Alzheimers Lifeboat News: The Blog

An experimental treatment completely reversed Alzheimers disease in mice by reducing the levels of a single enzyme in the animals brains. The results further bolster the theory that amyloid plaques are at the root of this mysterious brain disease, and that addressing these plaques could lead to an eventual cure for Alzheimers. The study, published February 14 in the Journal of Experimental Medicine, found that slowly reducing levels of the enzyme BACE1 in mice as they aged either prevented or reversed the formation of amyloid plaques in the brain, a hallmark sign of Alzheimers disease


New form of light: Newly observed optical state could enable quantum computing with photons Lifeboat News: The Blog

Try a quick experiment: Take two flashlights into a dark room and shine them so that their light beams cross. Notice anything peculiar? The rather anticlimactic answer is, probably not. Thats because the individual photons that make up light do not interact. Instead, they simply pass each other by, like indifferent spirits in the night.

But what if could be made to interact, attracting and repelling each other like atoms in ordinary matter? One tantalizing, albeit sci-fi possibility: sabers beams of light that can pull and push on each other, making for dazzling, epic confrontations. Or, in a more likely scenario, two beams of light could meet and merge into one single, luminous stream.

It may seem like such optical behavior would require bending the rules of physics, but in fact, scientists at MIT, Harvard University, and elsewhere have now demonstrated that photons can indeed be made to interact an accomplishment that could open a path toward using photons in quantum computing, if not in lightsabers.


Student 3D Prints Eyes Hackaday

[Ondej Voclka] is a student at the Brno University of Technology in the Czech Republic.  In addition, the 23-year-old lost his vision in his left eye. While attending a lecture on 3D printing, he wondered if he could 3D print an ophthalmic prosthesis an artificial eye. Turns out, he could. If you dont speak Czech, youll need to call on a translation service like we did.

Unlike conventional glass or plastic eyes, it is trivial to change parameters like color when 3D printing the prosthetic. This is especially important with the iris and the finished product takes about 90 minutes to print. There is additional time required to coat the product with an acrylic layer to mimic the gloss of a natural eye.

To create the artificial eye, he scanned an existing prosthetic and a natural eye. Computer modeling allowed the production of an eye with the right shape, texture, and color.

Of course, the printed eye doesnt see. But there is technology that can help some forms of blindness. Weve talked about the conventional manufacture of eyes before (although the original article is gone) but you can see how it is done in the video below. If you want to know where the IEEE thought artificial body parts were going in 2008, we covered that, too. We imagine 3D printing and recent advances in materials changes a lot of those assumptions.

Photo: Brno University of Technology


Robonaut Has Been Broken for Years, and Now NASA Is Bringing It Home IEEE Spectrum Recent Content full text

A mysterious hardware problem has kept the ISS Robonaut out of action since at least 2015, so it's returning to Earth for a fix Photo: NASA

In February of 2011, NASA launched Robonaut 2 to the International Space Station. It was a huge achievement for the robotics team at NASAs Johnson Space Center in Houston. There had been other robots in space, but Robonaut was the first advanced humanoid to ever go on a mission beyond Earth. On board the ISS, the robot was intended to eventually work side by side with astronauts, performing some of the dull and repetitive tasks that take up a significant amount of time that the humans on the station could instead be spending on science and discovery.

For a while, things went well. The robot was unboxed from its protective foam packaging, and set up in the Destiny laboratory module. It was powered up for the first time in August of 2011, and by 2012 it was flipping practice switches and cleaning practice handrails while being teleoperated from the ground. Once a month or so, astronauts set Robonaut up and it would do research tasks for several hours at a time, working towards making a transition from an experimental project to a useful helper in the caretaking of human spacecraft. Robonaut even got its own Twitter account: Check me out. Im in space!

But in 2014, NASA decided to go forward with a complex and risky upgrade. The Robonaut sent to the ISS was a torso with a pair of arms and head, and now NASA wanted to add a pair of legs. The idea was to give Robonaut more mobility inside the station. The elongated, wiggly legs would work almost as a secondary pair of arms, allowing the robot to move itself around the station by holding on to hand rails, significantly adding to its capability. 

The hardware upgrade, however, didnt go according to plan, and repeated attempts to fix a persistent problem have failed. For the last several years, Robonaut has been almost entirely disabled, and publicly available ISS status reports show that the last time the robot completed a full research task was December of 2013...


Re: clamav: Out of bounds read and segfault in xar parser Open Source Security

Posted by Hanno Bck on Feb 15

0.99.3 is out now and the fix is not included.


The EPO is Being Destroyed and Theres Nothing Left to Replace It Except National Patent Offices Techrights

A bonfire of what was supposed to be promising, lifelong careers (justifying relocation of entire families children included to a foreign country). Wheres ILO when one needs it?

International Labour Organization
Reference: International Labour Organization

Summary: It looks like Battistelli is setting up the European Patent Office (EPO) for mass layoffs; in fact, it looks as though he is so certain that the UPC will materialise that he obsesses over validation for mass litigation worldwide, departing from a model office that used to lead the world in terms of patent quality and workers welfare/conditions

THE goal of EPO management seems to be the destruction of the EPO and driving away its most valuable assets: the examiners. National Patent Offices (NPOs) are the only fallback (except USPTO and other IP5 offices), for the UPC is falling flat on its face and patent applications at the EPO decline in number. In fact, applications impending examination too are running out (maybe will have run out by this years end).

EPO workers are very smart people. They know whats going on. The impending mass layoffs (possibly the new job of the ex-banker, Campinos) arent hard to envision.

EPO wants in a soon future to be able to get rid of staff as it see fit, Anonymous said this afternoon, linking to a new article about a letter which we published yesterday. SUEPO too has cited this article (some time around the afternoon). To quote bits from it:

According to a letter from the EPOs Central Staff Co...


FOSS Project Spotlight: LinuxBoot (Linux Journal)

Linux Journal takes a look at the newly announced LinuxBoot project. LWN covered a related talk back in November. "Modern firmware generally consists of two main parts: hardware initialization (early stages) and OS loading (late stages). These parts may be divided further depending on the implementation, but the overall flow is similar across boot firmware. The late stages have gained many capabilities over the years and often have an environment with drivers, utilities, a shell, a graphical menu (sometimes with 3D animations) and much more. Runtime components may remain resident and active after firmware exits. Firmware, which used to fit in an 8 KiB ROM, now contains an OS used to boot another OS and doesn't always stop running after the OS boots. LinuxBoot replaces the late stages with a Linux kernel and initramfs, which are used to load and execute the next stage, whatever it may be and wherever it may come from. The Linux kernel included in LinuxBoot is called the 'boot kernel' to distinguish it from the 'target kernel' that is to be booted and may be something other than Linux."


AMD May Have Accidentally Outed Vulkan 1.1 Phoronix

AMD on Wednesday released the Radeon Pro Software Enterprise Edition 18.Q1 for Linux driver. It really isn't noticeable for its official changes, but does claim to advertise Vulkan 1.1 support...


These Perfectly Imperfect Diamonds Are Built for Quantum Physics Lifeboat News: The Blog

De Beers diamond company has a whole division to synthesize quantum-grade diamonds.


Laser scanning reveals lost ancient Mexican city had as many buildings as Manhattan Lifeboat News: The Blog

Groundbreaking lidar scanning reveals the true scale of Angamuco, built by the Purpecha from about 900AD.


UK government officially blames Russia for NotPetya attack Help Net Security

The UK government has officially attributed the June 2017 NotPetya cyber attack to the Russian government. The statement is backed by an assessment of the UKs National Cyber Security Centre, which has found that the Russian military was almost certainly responsible for it. The NotPetya attack The NotPetya attack saw a malicious data encryption tool inserted into a legitimate a piece of software used by most of Ukraines financial and government institutions, the NCSC noted. More


Google's Crackdown on "Annoying" and "Disruptive" Ads Begins SoylentNews

Critics wary as Google's Chrome begins an ad crackdown

On Thursday, Google will begin using its Chrome browser to eradicate ads it deems annoying or otherwise detrimental to users. It just so happens that many of Google's own most lucrative ads will sail through its new filters. The move, which Google first floated back in June, is ostensibly aimed at making online advertising more tolerable by flagging sites that run annoying ads such as ones that auto-play video with sound. And it's using a big hammer: Chrome will start blocking all ads including Google's own on offending sites if they don't reform themselves.

There's some irony here, given that Google's aim is partly to convince people to turn off their own ad-blocking software. These popular browser add-ons deprive publishers (and Google) of revenue by preventing ads from displaying.

Google vice president Rahul Roy-Chowdhury wrote in a blog post that the company aims to keep the web healthy by "filtering out disruptive ad experiences."

But the company's motives and methods are both under attack. Along with Facebook, Google dominates the online-advertising market; together they accounted for over 63 percent of the $83 billion spent on U.S. digital ads last year, according to eMarketer. Google is also virtually synonymous with online search, and Chrome is the most popular browser on the web, with a roughly 60 percent market share. So to critics, Google's move looks less like a neighborhood cleanup than an assertion of dominance.

Is this Google's antitrust moment? (Is this a recycled comment?)

Previously: Google Preparing to Filter "Unacceptable Ads" in 2018
Google Chrome to Begin Blocking "Non-Compliant Ads" on Feb. 15

Original Submission

Read more of this story at SoylentNews.


KDE Amarok Music Player Receives Revived Port To Qt5 / KF5 Phoronix

While Amarok was once KDE's dominant music player, it hasn't seen a new release now in about five years and has yet to see a release based on Qt5 and KDE Frameworks 5. But there's hope that might still happen...


IBM is Getting Desperate and Now Suing Microsoft Over Lost Staff, Not Just Suing Everyone Using Patents Techrights

Recent: Famed Journalist Dan Gillmor Calls IBM the Inventor of Patent Trolling

Ginni Rometty

Summary: IBMs policy when it comes to patents, not to mention its alignment with patent extremists, gives room for thought if not deep concern; the company rapidly becomes more and more like a troll

THE DAYS of IBM as a friend of developers are long gone. About a decade ago we were supportive of IBM for all sorts of reasons, including OpenDocument Format (ODF). But nowadays IBM is a patent bully which lobbies for software patents, just like Microsoft. Simply because IBM is not Microsoft (the same goes for Apple) does not imply that its benign or even desirable.

nowadays IBM is a patent bully which lobbies for software patents, just like Microsoft.Our previous post was about Microsoft's patent bullying. Its something it has in common with IBM and its battles over software patents (albeit on the defensive side) are being brought up this week (quotes from Enfish, LLC v Microsoft, a decision which was used a lot last year as an argument for software patents).

From one lobbyist of software patents (and patent thug) to another jumps Ms McIntyre. According to this report from this week: In a motion filed today, McIntyre says IBM has no evidence she has or will misappropriate any IBM information and that the company is covered by an ongoing NDA. She also says she informed IBM of the Microsoft job offer in January, which was when she was terminated.

Hes linking to Watchtroll, as usual, and when he speaks of improving the US patent system he means facilitating patent blackmail by the likes of IBM.IBM just shows how desperate it has become. How long before IBM has more lawyers than actual engineers?

What has IBM been reduced to? Watch this tweet...


New Venture Consultant Katherine B. Lewis joins our Business Board. Lifeboat News

New Venture Consultant Katherine B. Lewis joins our Business Board.


Printed Motorcycle Choke Lever Goes the Distance Hackaday

We all dread the day that our favorite piece of hardware becomes so old that spare parts are no longer available for it, something about facing that mechanical mortality sends a little shiver up the hackers spine. But on the other hand, the day you cant get replacement hardware is also the same day you have a valid excuse to make your own parts.

3D rendering above the 2D scan

Thats the situation [Jonathan] found himself in when the choke lever for his Suzuki motorcycle broke. New parts arent made for his bike anymore, which gave him the opportunity to fire up Fusion 360 and see if he couldnt design a replacement using a 2D scan of what was left of the original part.

[Jonathan] put the original part on his flatbed scanner as well one of his credit cards to use for a reference point to scale the image when he imported it into Fusion 360. Using a 2D scanner to get a jump-start on your 3D model is a neat trick when working on replacement parts, and one we dont see as much as you might think. A proper 3D scanner is cool and all, but certainly not required when replicating hardware...


Pirates Crack Microsofts UWP Protection, Five Layers of DRM Defeated TorrentFreak

As the image on the right shows, Microsofts Universal Windows Platform (UWP) is a system that enables software developers to create applications that can run across many devices.

The Universal Windows Platform (UWP) is the app platform for Windows 10. You can develop apps for UWP with just one API set, one app package, and one store to reach all Windows 10 devices PC, tablet, phone, Xbox, HoloLens, Surface Hub and more, Microsoft explains.

While the benefits of such a system are immediately apparent, critics say that UWP gives Microsoft an awful lot of control, not least since UWP software must be distributed via the Windows Store with Microsoft taking a cut.

Or that was the plan, at least.

Last evening it became clear that the UWP system, previously believed to be uncrackable, had fallen to pirates. After being released on October 31, 2017, the somewhat underwhelming Zoo Tycoon Ultimate Animal Collection became the first victim at the hands of popular scene group, CODEX.

CODEX release notes

CODEX says its important that the game isnt allowed to communicate with the Internet so the group advises users to block the games executable in their firewall.

While thats not a particularly unusual instruction, CODEX did reveal that various layers of protection had to be bypassed to make the game work. Theyre listed by the group as MSStore, UWP, EAppX, XBLive, and Arxan, the latter being an anti-tamper system.

Its the equivalent of Denuvo (without the DRM License part), cracker Voksi previously explained. Its still bloats the executable with useless virtual machines that only slow down your game.

Arxan features

Arxans marketing comes off as extremely confi...


Rust 1.24 Released With "rustfmt" Preview & Incremental Compilation By Default Phoronix

A fairly notable update to the Rust programming language compiler and its components is available today...


UK Foreign Office Minister blames Russia for NotPetya massive ransomware attack Security Affairs

The United Kingdons Foreign and Commonwealth Office formally accuses the Russian cyber army of launching the massive NotPetya ransomware attack.

The UK Government formally accuses the Russian cyber army of launching the massive NotPetya ransomware attack.

The United Kingdons Foreign and Commonwealth Office attributed the NotPetya cyber-attack to the Russian Government.

According to the UK, NotPetya was used to disrupt Ukrainian financial, energy and government sector targets, but it went out of control causing severe damages to companies worldwide.


The shipping giant Maersk chair Jim Hagemann Snabe revealed its company reinstalled 45,000 PCs and 4,000 Servers after NotPetya the attack.

In August 2017 the company announced that it would incur hundreds of millions in U.S. dollar losses due to the ransomware massive attack.

The UK considers the attack an intolerable act and will not accept future similar offensives.

Foreign Office Minister Lord Ahmad has today attributed the NotPetya cyber-attack to the Russian Government. The decision to publicly attribute this incident underlines the fact that the UK and its allies will not tolerate malicious cyber activity. reads the official statement issued by the UK Government.

The attack masqueraded as a criminal enterprise but its purpose was principally to disrupt. Primary targets were Ukrainian financial, energy and government sectors. Its indiscriminate design caused it to spread further, affecting other European and Russian business.

Below the declaration of the Foreign Office Minister for C...


Irssi 1.1.1&1.0.7: CVE-2018-7054, CVE-2018-7053, CVE-2018-7050, CVE-2018-7052, CVE-2018-7051 Open Source Security

Posted by Ailin Nemui on Feb 15

IRSSI-SA-2018-02 Irssi Security Advisory [1]
CVE-2018-7054, CVE-2018-7053, CVE-2018-7050, CVE-2018-7052, CVE-2018-


Multiple vulnerabilities have been located in Irssi.

(a) Use after free when server is disconnected during netsplits. Found
by Joseph Bisch. (CWE-416, CWE-825)

CVE-2018-7054 [2] was assigned to this issue.

(b) Use after free when SASL messages are...


Major cryptocurrency market charging users duplicative fees The Hill: Technology Policy

The dominant cryptocurrency marketplace charged users duplicative fees for previous purchases on Thursday, emptying and over-drafting users' bank accounts.Users of Coinbase, a digital exchange and wallet that allows people to buy, sell and...


In Microsofts Lawsuit Against Corel the Only Winner is the Lawyers Techrights

Also in the news today: The Last Of The MPEG-2 Patents Have Expired

MPEG MP3 Player

Summary: The outcome of the old Microsoft v Corel lawsuit reaffirms a trend; companies with deep pockets harass their competitors, knowing that the legal bills are more cumbersome to the defendants; theres a similar example today in Cisco v Arista Networks

THE Microsoft/Corel affairs have been covered here for over a decade. We have an entire category dedicated to that (mostly history, antitrust, and patent litigation).

Microsoft being the patent thug that it is bullied Corel, possibly hoping to bury this former ally once and for all.Several days ago, in connection to Microsofts lawsuit, we saw a couple of updates, one from Law 360 and another from Watchtroll (theres probably a lot more out there by now). Its about software patents from the USPTO. Microsoft being the patent thug that it is bullied Corel, possibly hoping to bury this former ally once and for all.

As Law 360 put it:

A California federal jury declined Microsofts request for more than $1 million and awarded it just $278,000 Tuesday in a suit over Corel Corp.s infringement of patents related to its Office software, finding Corel had willfully infringed nine patents but hadnt learned of the infringement until Microsoft sued.

Watchtroll said:

Microsoft argued that Corel willfully infringed the 828, 036, 237, 140, 532, and 865 patents. The asserted Microsoft patents are directed to graphic user interfaces used in Microsoft products, such as Microsoft Office. Microsoft asserted that it has given its interfaces, including menus and toolbars, a distinctive look and feel, which Corel copied into the accused products, including WordPerfect X7. WordPerfect X7 even includes an option to use the product in the Microsoft Word mode.

Its hardly a win for Microsoft. But its even...


Ksenia Konchakovskaya, Founder of Planet Home, joins our Sustainability Board. Lifeboat News

Ksenia Konchakovskaya, Founder of Planet Home, joins our Sustainability Board.


Lawmakers eye new programs to boost tech workforce The Hill: Technology Policy

Lawmakers at a hearing Thursday turned their attention to new programs to help boost the number of science and technology workers in the U.S.Fulfilling our STEM research needs ... is essential for economic competitiveness," said House Science,...


FBI was 'unable to identify' YouTube user named Nikolas Cruz who made threat last year The Hill: Technology Policy

The FBI on Thursday confirmed at the scene of a deadly school shooting that it received information about a YouTube comment last year that threatened similar violence, but the bureau was unable to identify the person who made it. FBI...


California "Green Lab" Volunteers Smoke Cannabis in Front of the Police SoylentNews

Volunteers get high to help California police spot pot users

Even though recreational marijuana is legal in California, most people probably wouldn't be comfortable smoking around police officers. But that's exactly what Edson Villegas volunteered to do, CBS Los Angeles reports.

Villegas took part in a "green lab" to help officers, prosecutors and toxicologists identify signs of impairment as drugged driving becomes a growing problem on roads.

"Approximately 75 percent of the DUI arrests that I make nowadays are drug impaired -- more specifically to cannabis than alcohol," said Glendale Police Officer Bryan Duncan.

The volunteer users took field sobriety tests at the beginning of the evening, then went into a tent and smoked marijuana. When they went back and took the same field sobriety tests, officers could see if there were any changes in their mental or physical abilities.

See also: Girl Scout sells more than 300 boxes of cookies at San Diego marijuana dispensary

Original Submission

Read more of this story at SoylentNews.


The uA723 As A Switch Mode Regulator Hackaday

If you are an electronic engineer or received an education in electronics that went beyond the very basics, there is a good chance that you will be familiar with the Fairchild A723. This chip designed by the legendary Bob Widlar and released in 1967 is a kit-of-parts for building all sorts of voltage regulators. Aside from being a very useful device, it may owe some of its long life to appearing as a teaching example in Paul Horowitz and Winfield Hills seminal text, The Art Of Electronics. Its a favourite chip of mine, and I have written about it extensively both on these pages and elsewhere.

The Fairchild switching regulator circuit. From the A723 data sheet in their 1973 linear IC databook, page 194 onwards.The...


AI2-THOR Interactive Simulation Teaches AI About Real World IEEE Spectrum Recent Content full text

AI2-THOR, an interactive simulation based on home environments, can prepare AI for real-world challenges Image: Roozbeh Mottaghi, Eric Kolve / Allen Institute for Artificial Intelligence

Training a robot butler to make the perfect omlette could require breaking a lot of eggs and throwing out many imperfect attempts in a real-life kitchen.

Thats why researchers have been rolling out virtual training grounds as a more efficient alternative to putting AI agents through costly and time-consuming experiments in the real world.

Virtual environments could prove especially useful in training the most popular AI based on machine learning algorithms that often require thousands of trial-and-error runs to learn new skills. Companies such as Waymo have already built their own internal simulators with virtual roads and traffic intersections to train their AI to safely take the wheel of self-driving cars. But a new, open-source virtual training ground called AI2-THOR enables AI agents to learn how to interact with objects in familiar home settings such as kitchens and bedrooms.

These trials in the real world might damage the objects that the robots interact with or even the robot itself, says  Roozbeh Mottaghi, a research scientist in the computer vision team at the Allen Institute for Artificial Intelligence in Seattle. So it is much safer and cost-effective to first train the models in the virtual environment.

Interactivity may prove especially crucial for training the coming generations of AI that will be expected to chauffeur humans around in self-driving cars or perform chores in hotels and households. Most commercial machine learning algorithms and the  more specialized deep neural networks  have gained visual intelligence through  training  on fairly passive datasets such as images and videos. But AI that can train through interactions with virtual simulations could potentially improve their visual intelligence by leaps and bounds.



Undoing Aging Conference Berlin 2018 Lifeboat News: The Blog

The Undoing Aging 2018 Conference is coming to Berlin to discuss the science of rejuvenation biotech!

The SENS Research Foundation and the Forever Healthy Foundation have joined forces to host an exciting conference about rejuvenation biotechnology on March 1517, 2018 at the Umspannwerk Alexanderplatz in Berlin, Germany.

A conference for everyone

The conference is open to the wider community interested in this field and anyone can attend. We believe that this is a fantastic move, as it allows more people to engage with the science and to learn firsthand from the researchers working on the front line. We very much support the idea that we are all in this together and thus are delighted to see that the event is open to the entire community.


How a Bitcoin phishing gang made $50 million with the help of Google AdWords Graham Cluley

A cybercrime gang based in Ukraine is estimated to have made as much as $50 million after tricking Bitcoin investors into handing over the login credentials for their online wallets.

Read more in my article on the Tripwire State of Security blog.


New EU Privacy Law May Weaken Security Krebs on Security

Companies around the globe are scrambling to comply with new European privacy regulations that take effect a little more than three months from now. But many security experts are worried that the changes being ushered in by the rush to adhere to the law may make it more difficult to track down cybercriminals and less likely that organizations will be willing to share data about new online threats.

On May 25, 2018, the General Data Protection Regulation (GDPR) takes effect. The law, enacted by the European Parliament, requires technology companies to get affirmative consent for any information they collect on people within the European Union. Organizations that violate the GDPR could face fines of up to four percent of global annual revenues.

In response, the Internet Corporation for Assigned Names and Numbers (ICANN) the nonprofit entity that manages the global domain name system is poised to propose changes to the rules governing how much personal information Web site name registrars can collect and who should have access to the data.

Specifically, ICANN has been seeking feedback on a range of proposals to redact information provided in WHOIS, the system for querying databases that store the registered users of domain names and blocks of Internet address ranges (IP addresses).

Under current ICANN rules, domain name registrars should collect and display a variety of data points when someone performs a WHOIS lookup on a given domain, such as the registrants name, address, email address and phone number. (Most registrars offer a privacy protection service that shields this information from public WHOIS lookups; some registrars charge a nominal fee for this service, while others offer it for free).

In a bid to help domain registrars comply with the GDPR regulations, ICANN has floated several proposals, all of which would redact some of the registrant data from WHOIS records. Its mildest proposal would remove the registrants name, email, and phone number, while allowing self-certified 3rd parties to request access to said data at the approval of a higher authority such as the registrar used to register the domain name.

The most restrictive proposal would remove all registrant data from public WHOIS records, and would require legal due process (such as a subpoena or court order) to reveal any information supplied by the domain registrant.


Hackers use Google Ads to steal $50 million of Bitcoin HackRead

By Waqas

Another day, another Bitcoin scam This time it abuses Google

This is a post from Read the original post: Hackers use Google Ads to steal $50 million of Bitcoin


GPU Cryptomining Hurting SETI and Other Astronomy Projects SoylentNews

Crypto-currency craze 'hinders search for alien life'

Scientists listening out for broadcasts by extra-terrestrials are struggling to get the computer hardware they need, thanks to the crypto-currency mining craze, a radio-astronomer has said.

Seti (Search for Extraterrestrial Intelligence) researchers want to expand operations at two observatories. However, they have found that key computer chips are in short supply. "We'd like to use the latest GPUs [graphics processing units]... and we can't get 'em," said Dan Werthimer.

Demand for GPUs has soared recently thanks to crypto-currency mining. "That's limiting our search for extra-terrestrials, to try to answer the question, 'Are we alone? Is there anybody out there?'," Dr Werthimer told the BBC.

[...] Other radio-astronomers have been affected. A group looking for evidence of the earliest stars in the universe was recently shocked to see that the cost of the GPUs it wanted had doubled.

[...] Prof [Aaron] Parsons' radio telescope, the Hydrogen Epoch of Reionisation Array (Hera), is an American, British and South African project located in South Africa's western plains. [...] Three months ago, the Hera team had budgeted for a set of GPUs that cost around $500 (360) - the price has since doubled to $1,000.

"We'll be able to weather it but it is coming out of our contingency budget." added Prof Parsons. "We're buying a lot of these things, it's going to end up costing about $32,000 extra."

When the inevitable flood of cheap GPUs onto the market happens, will it be a boon to science?

Original Submission

Read more of this story at SoylentNews.


Laser Galvo Control via Microcontrollers DAC Hackaday

Mirror galvanometers (galvos for short) are the worky bits in a laser projector; they are capable of twisting a mirror extremely quickly and accurately. With two of them, a laser beam may be steered in X and Y to form patterns. [bdring] had purchased some laser galvos and decided to roll his own control system with the goal of driving the galvos with the DAC (digital to analog) output of a microcontroller. After that, all that was needed to make it draw some shapes was a laser and a 3D printed fixture to hold everything in the right alignment.

The galvos came with drivers to take care of the low-level interfacing, and [bdring]s job was to make an interface to translate the 0 V 5 V output range of his microcontrollers DAC into the 10 V differential range the driver expects. He succeeded, and a brief video of some test patterns is embedded below.

Instagram Photo

We have seen drawing shapes with lasers go in some really creative and interesting directions. For example, this amazing mechanical laser projector draws shapes using only 3D printed cams and gears, and this one draws on a glow-in-the-dark surface with a UV laser for a ghostly take on things.


Friday Free Software Directory IRC meetup: February 16th starting at 12:00 p.m. EST/17:00 UTC FSF blogs

Help improve the Free Software Directory by adding new entries and updating existing ones. Every Friday we meet on IRC in the #fsf channel on

When a user comes to the Directory, they know that everything in it is free software, has only free dependencies, and runs on a free OS. With over 16,000 entries, it is a massive repository of information about free software.

While the Directory has been and continues to be a great resource to the world for many years now, it has the potential to be a resource of even greater value. But it needs your help! And since it's a MediaWiki instance, it's easy for anyone to edit and contribute to the Directory.

We are back with another classic week of adding new entries to the Directory. We'll also be discussing the work of various team projects, including the cryptocurrency donation tag and the import project.

If you are eager to help, and you can't wait or are simply unable to make it onto IRC on Friday, our participation guide will provide you with all the information you need to get started on helping the Directory today! There are also weekly Directory Meeting pages that everyone is welcome to contribute to before, during, and after each meeting.


NVIDIA Preparing Upstream Linux Kernel Support For The Tegra Xavier SoC Phoronix

NVIDIA has begun work on sending out patches for upstreaming Tegra194 "Xavier" SoC support within the Linux kernel...


Top 10 Photo Editor Apps For Android in 2018 TechWorm

10 Best Photo Editor Apps For Android 2018 Edition

Over the years, not only have the smartphones evolved but also their in-built cameras. Thanks to the advancement in technology, several high-end smartphones these days have higher resolution cameras which in turn has reduced ones need to possess a digicam or a digital camera. Several smartphone owners look to spend a little more on these devices, which are not only convenient to carry around but also lets one take pictures instantly on the go, or during outings or occasions.

In spite of having smartphones with higher image sensors and good optical image stabilization (OIS), there are times when you are looking to click that perfect picture from your phone but it still doesnt turn out right even after a dozen attempts? Thats when photo-editing apps come to your rescue.

While there are hundreds, maybe even thousands, of photo editor apps available, in this article we bring to you the best photo editing apps for Android that can be downloaded free of cost and be used to enhance the beauty of your favorite pictures.

Note: Even though the below mentioned photo-editor apps for Android are free, there is no guarantee that these may not cost you down the line via in-app purchases.

  1. Adobe Photoshop Express

Adobe Photoshop Express is an image editing and collage making mobile application from Adobe Systems Pvt. Ltd. You can avail some of the basic image editing functions, adjust aspects such as contrast, exposure and white balance in one-touch, removes dirt, spots, dirt and dust, allows to add text, borders, frames, has over 60+ professional looks and advance corrections and various other adjustments. You can also select from a range of dynamic effects such as Nature, Black and White, and Portrait.

To download the free app, click here.

  1. Photo Editor By Aviary

This app offers some of the standard features of a photo editor that includes rotating, cropping, correcting, which can be achieved by one tap auto enhancing feature. It also contains a large collection of easy-to-use editing tools such as custom photo filters, frames, graphics, and overlays. The app also has a cosmetic tool to remove flaws and blemishes from any photograph. The image correction feature can help you to fix the photographs that has been burnt by over flash or even those that were clicked with a dusty camera lens.

The app allows you to share their photos across all the popular social media platforms. There is special focus feature wherein you can use the Tilt shift effect. Other in-app purchases are available for additional effects such as frames and stickers, otherwise this is a free app.

To download the free app, click...



IoT botnet bypasses firewalls to get to ZyXEL modems Help Net Security

NewSky Securitys honeypots have detected a new IoT botnet in the making. The botnet was named DoubleDoor, as it leverages two distinct backdoors to get to the target: ZyXEL PK5001Z modems. The DoubleDoor attacks Whats interesting about this particular botnet is that its ready to pass an extra layer of security to get to the modem: Juniper Networks NetScreen hardware firewall devices. To pull off the attack, it employs exploits for two vulnerabilities: CVE-20157755, which More


Security updates for Thursday

Security updates have been issued by Debian (jackson-databind, leptonlib, libvorbis, python-crypto, and xen), Fedora (apache-commons-email, ca-certificates, libreoffice, libxml2, mujs, p7zip, python-django, sox, and torbrowser-launcher), openSUSE (libreoffice), SUSE (libreoffice), and Ubuntu (advancecomp, erlang, and freetype).


FCC inspector general investigating chairman over Sinclair The Hill: Technology Policy

The Republican chairman of the Federal Communications Commission is being investigated by the agency's inspector general.The inspector general wants to know whether Ajit Pai improperly pushed through rules in an effort to benefit the Sinclair...


7 steps security leaders can take to deal with Spectre and Meltdown Help Net Security

Security and risk management leaders must take a pragmatic and risk-based approach to the ongoing threats posed by an entirely new class of vulnerabilities, according to Gartner. Spectre and Meltdown are the code names given to different strains of a new class of attacks that target an underlying exploitable design implementation inside the majority of computer chips manufactured over the last 20 years. Security researchers revealed three major variants of attacks in January 2018. The More


DNS and DHCP with Dnsmasq

DNS and DHCP with Dnsmasq


SAP Security Notes February 2018 addresses tens of flaws including High Risk issues Security Affairs

SAP Security Notes February 2018: SAP Security Notes February 2018 addressed several vulnerabilities including High-Risk flaws.

SAP has released February 2018 Patches that addressed some high-risk vulnerabilities in its software, a total of 26 Security Notes (5 high-, 19 medium- and 2 low-risk). Once again, the missing authorization check is the most common vulnerability type this month.

The Security Notes SAP addresses three cross-site scripting (XSS) vulnerabilities, two directory traversal flaws, two information disclosure bugs, two missing authorization checks, one unrestricted file upload, and other issues.

Affected products are the Internet Graphics Server (IGS), NetWeaver System Landscape Directory, HANA Extended Application Services, ABAP File Interface, SAP CRM, ERP Financials Information System, Netweaver Portal, Netweaver Java Web Application, CRM WebClient UI, BI Launchpad, and SAP HANA.

On 13th of February 2018, SAP Security Patch Day saw the release of 11 Security Notes. Additionally, there were 3 updates to previously released security notes. reads the advisory published by SAP.

SAP Security Notes Feb 2018

SAP also addressed previous Security Notes that includes an incorrect authorization check in ERP Logistics, a cross-site request forgery (CSRF) vulnerability in SAP Sybase, and a flaw that ties the way the SAP Note Assistant handles digitally signed notes.

Three critical vulnerabilities were reported by Mathieu Geli, Vahagn Vardanyan, and Vladimir Egorov, researchers at ERPScan security firm.

The details of the issues fixed thanks to the support of the researchers are:

  • A Missing Authentication check vulnerability in SAP NetWeaver System Landscape Directory (CVSS Base Score: 8.3 CVE-2018-2368). Update is available in SAP Security Note 2565622. An atta...


Richard Spencer Threatens to Sue Kent State SoylentNews


CINCINNATI (AP) -- Kent State University, facing the threat of a lawsuit, reiterated on Friday that it cannot accommodate a request to allow white nationalist Richard Spencer to speak in early May as part of his campus tour.

The university, which is based in Kent but has regional campuses elsewhere in the state, said it had responded to attorney Kyle Bristow reaffirming its earlier response that no suitable space is available for Spencer to speak between April 30 and May 12.

Bristow had told Kent State it had until the end of business Friday to agree to rent space at an "acceptable date and time" or face a lawsuit. Several other schools, including Ohio State University and the University of Cincinnati, are in litigation over Spencer.

Tour organizer Cameron Padgett wanted Spencer to speak at Kent State on the May 4 anniversary of Ohio National Guard shootings that killed four students during anti-war protests in 1970. The university said early May is too busy with activities around the end of the academic year.

Bristow said last year that Spencer planned to speak March 14 on the University of Cincinnati campus, but the university said there was no contract in place, and the two sides are now in a legal standoff over the university's demand for a security fee of nearly $11,000.

Original Submission

Read more of this story at SoylentNews.


Smashing Security #065: Cryptominomania, Poppy, and your Amazon Alexa Graham Cluley

Cryptomining goes nuclear, YouTube for Kids gets scary, and TV ads have been given the green light to mess with your Amazon Alexa.

All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special guest Maria Varmazis.


Create a Discord Webhook with Python for Your Bot Hackaday

Discord is an IRC-like chat platform that all the young cool kids are hanging out on. Originally intended as a way to communicate during online games, Discord has grown to the point that there are servers out there for nearly any topic imaginable. One of the reasons for this phenomenal growth is how easy it is to create and moderate your own Discord server: just hit the + icon on the website or in the mobile application, and away you go.

As a long-time IRC guy, I was initially unimpressed with Discord. It seemed like the same kind of stuff weve had for decades, but with an admittedly slick UI. After having used it for a few months now and joining servers dedicated to everything from gaming to rocket science, I cant say that my initial impression of Discord is inaccurate: its definitely just a modern IRC. But Ive also come to the realization that Im OK with that.

But this isnt a review of Discord or an invitation to join the server Ive setup for my Battlefield platoon. In this article were going to look at how easy it is to create a simple bot that you can plug into a Discord server and do useful work with. Since anyone can create a persistent Discord server for free, its an interesting platform to use for IoT monitoring and logging by simply sending messages into the server.

A Practical Example



Billionaire Trump backer Thiel leaving Silicon Valley over politics: report The Hill: Technology Policy

Billionaire venture capitalist and Trump supporter Peter Thiel is reducing his involvement in the tech industry and relocating his home and business firms from Silicon Valley to Los Angeles, according to a new report.Thiel, one of the few vocal...


Exposing the Power Vampires in Self-Driving Cars IEEE Spectrum Recent Content full text

Autonomous driving systems give cars eco-driving skills. But their computers and sensors could consume enough electricity to negate this green dividend. Photo: Waymo Drag from the big rack atop this Waymo autonomous vehicle makes it an energy hog

By driving smarter, autonomous cars have the potential to move people around and between cities with far greater efficiency. Estimates of their energy dividends, however, have largely ignored autonomous drivings energy inputs, such as the electricity consumed by brawny on-board computers.

First-of-a-kind modeling published today by University of Michigan and Ford Motor researchers shows that autonomy's energy pricetag is substantial high enough to turn some autonomous cars into net energy losers.

"We knew there was going to be a tradeoff in terms of the energy and greenhouse gas emissions associated with the equipment and the benefits gained from operational efficiency. I was surprised that it was so significant, says to Greg Keoleian, senior author on the paper published today in the journal Environmental Science & Technology and director of the University of Michigan Center for Sustainable Systems

Keoleians team modeled both conventional and battery-electric versions of Ford's Focus sedan carrying sensing and computing packages that enable them to operate without human oversight under select conditions. Three subsystems were studied: small and medium-sized equipment packages akin to those carried by Tesla's Model S and Ford's autonomous vehicle test platform, respectively, and the far larger package on Waymo's Pacifica minivan test bed [photo above]. 

Sources of added energy consumption from Ford Fusion's autonomy system Image: University of Michigan Sources of added energy consumption from Ford Fusion's autonomy system.

For the small and medium-sized equipment packages, going autonomous required 2.8 to 4.0 percent more onboard power. This went primarily to power the computers and sensors, and secondarily to the extra 17-22 kilograms of mass the equipment contributed.

However, autonomys energy bill ate up only part of the overall energy reduction expected from the autonom...


Mesa 17.3.4 Released With 90+ Changes Phoronix

While Mesa 18.0 should be released in the days ahead as the latest feature release to Mesa 3D, backporting of fixes/improvements to Mesa 17.3 isn't letting up. For those using this stable series from last quarter, Mesa 17.3.4 is out today with nearly 100 changes...


Android Security Bulletin Google fixed several Critical Code Execution vulnerabilities Security Affairs

Android Security Bulletin for February 2018 Google has fixed tens of vulnerabilities for Android OS, including several critical remote code execution (RCE) flaws.

The Android Security Bulletin for February 2018 addresses 26 vulnerabilities in the mobile operating system, most of which are elevation of privilege flaws.

The 2018-02-01 security patch level fixed 7 vulnerabilities, 6 in Media Framework and one issue affecting the System component.

The tech giant has fixed two critical RCE vulnerabilities in Media Framework. The first issue is the CVE-2017-13228 that affects Android 6.0 and newer, the second one, tracked as CVE-2017-13230, impacts Android 5.1.1 and later.

Android Security Bulletin

Google also fixed other vulnerabilities in Media Framework, including an information disclosure vulnerability, an elevation of privilege bug, and several denial-of-service flaws.

The most severe of these issues is a critical security vulnerability in Media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. states the advisory.

The most severe of these vulnerabilities is tracked as CVE-2017-13236, it is a System issue that could be exploited by an attacker to achieve remote code execution in the context of a privileged process. The attacker can trigger the flaw via email, web browsing, and MMS when processing media files.

The 2018-02-05 security patch level includes fixes for 19 vulnerabilities in HTC, Kernel, NVIDIA, Qualcomm, and Qualcomm closed-source components.

The most severe flaws included in the 2018-02-05 security patch level are two remote code execution vulnerabilities in Qualcomm components tracked as CVE-2017-15817 and CVE-2017-17760.

Google also released the Pixel / Nexus Security Bulletin that addresses 29 vulnerabilities in Google devices.

The Pixel / Nexus Security Bulletin contains details of security vu...


Pressure Mounts On FCC To Provide Answers About Fake Net Neutrality Comments SoylentNews

"We write to request information that will help both us and the public better understand how the Federal Communications Commission managed the record in its recent net neutrality proceeding," begins a letter sent today by all the Democratic representatives on the House Energy and Commerce committee.

The missive notes that the comment period was "notoriously replete with fake comments" and argues that as a result it "raises novel questions about how an agency can properly handle and interpret the public's feedback to make sound policy decisions."

The seven-page memo [PDF] contains no less than 16 pointed questions over how the FCC handled abuse of its comment system, while noting that its subsequent decision to approve the controversial repeal of the nation's net neutrality rules provided "scant detail" on that aspect.

The letter also makes it plain that the lawmakers believe that the legitimacy of the FCC's decision is in doubt. "While we may not support the outcome of this proceeding, we hope you agree with us that transparency in the process is crucial," it reads. "In order to restore public confidence in the integrity of the process and give the American people a better understanding of how the FCC analyzed the comments filed in this proceeding, we request that you provide us information on how the agency reviewed the public comments."

[...] While the letter is unlikely to provide a smoking gun, it does keep up political pressure on the FCC over how it handled the public comment process.

[...] So far, the FCC has demonstrated no intention of investigating what went wrong or how it can be mitigated in future. In fact, in an increasingly partisan atmosphere, even mentioning that the comment process was entirely undermined has become a political statement.

Original Submission

Read more of this story at SoylentNews.


Why do we need a risk-based approach to authentication? Help Net Security

20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the time-tested method of the trusted perimeter. Firewalls were relied on to keep out external threats, and anything within the network was considered secure and safe. Today, however, the number of variables has skyrocketed. The move to the cloud, BYOD, and increased use of outside contractors means a legitimate More


A five-year analysis of reported Windows vulnerabilities Help Net Security

Based on analysis of all disclosed Microsoft vulnerabilities in 2017, a new Avecto report shows a significant rise in the number of reported vulnerabilities. Last year, 685 vulnerabilities were found versus 325 vulnerabilities that were found in 2013. The removal of admin rights could mitigate 80% of all critical Microsoft vulnerabilities reported in 2017. Nearly all (95%) of critical vulnerabilities in Microsoft browsers could be mitigated by the removal of admin rights. The rise of More

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Thursday, 15 February


GLXVND Support Lands In Git For X.Org Server 1.20 Phoronix

There's been a lot of activity in xorg-server Git the past few days, making it look like the developers may be trying to wrap up the very long X.Org Server 1.20 cycle. The latest major feature work landing is GLXVND...


Cryptomining malware continues to drain enterprise CPU power Help Net Security

Cryptomining malware continues to impact organizations globally as 23% were affected by the Coinhive variant during January 2018, according to Check Points latest Global Threat Impact Index. Researchers discovered three different variants of cryptomining malware in its Top 10 most prevalent ranking, with Coinhive ranking first, impacting more than one-in-five organizations. Coinhive performs online mining of Monero cryptocurrency when a user visits a web page without the users approval. The implanted JavaScript then uses the More


U.S. Intelligence Agency Heads Warn Against Using Huawei and ZTE Products SoylentNews

Intelligence agency heads have warned against using Huawei and ZTE products and services:

The heads of six major US intelligence agencies have warned that American citizens shouldn't use products and services made by Chinese tech giants Huawei and ZTE. According to a report from CNBC, the intelligence chiefs made the recommendation during a Senate Intelligence Committee hearing on Tuesday. The group included the heads of the FBI, the CIA, the NSA, and the director of national intelligence.

During his testimony, FBI Director Chris Wray said the the government was "deeply concerned about the risks of allowing any company or entity that is beholden to foreign governments that don't share our values to gain positions of power inside our telecommunications networks." He added that this would provide "the capacity to maliciously modify or steal information. And it provides the capacity to conduct undetected espionage."

These warnings are nothing new. The US intelligence community has long been wary of Huawei, which was founded by a former engineer in China's People's Liberation Army and has been described by US politicians as "effectively an arm of the Chinese government." This caution led to a ban on Huawei bidding for US government contracts in 2014, and it's now causing problems for the company's push into consumer electronics.

Verizon and AT&T recently cancelled plans to sell Huawei's Mate 10 Pro smartphone.

Don't use a Huawei phone because it's too Chinese. Don't use an Apple phone because strong encryption is not "responsible encryption". Which phone is just right for the FBI?

Previously: U.S. Lawmakers Urge AT&T to Cut Ties With Huawei

Related: FBI Director Christopher Wray Keeps War on Encryption Alive
U.S. Government Reportedly Wants to Build a 5G Network to Thwart Chinese Spying

Original Submission



GPUs on Googles Kubernetes Engine Are Now Available in Open Beta

The Google Kubernetes Engine (previously known as the Google Container Engine and GKE) now allows all developers to attach Nvidia GPUs to their containers.


High Speed Imaging Of Magnetic Fields Hackaday

Some time before experimenting with MRI machines and building his own CT scanner, [Peter Jansen] wanted to visualize magnetic fields. One of his small side projects is building tricoders  pocket sensor suites that image everything and after playing around with the magnetometer function on his Roddenberry-endorsed tool, he decided he had to have a way to visualize magnetic fields. After some work, he has the tools to do it at thousands of frames per second. Its a video camera for magnetic fields, pushing the boundaries of both magnetic imaging technology and the definition of the word camera.

When we last looked at [Peter]s Hall effect camera, the device worked, but it wasnt necessarily complete. The original design used I2C I/O multiplexers for addressing each individual pixel of the Hall effect array, limiting the framerate of the camera to somewhere around 30 Hz. While this would work for visualizing static magnetic fields, the more interesting magnetic fields around us are oscillating think motors and transformers and such. A much faster magnetic camera was needed, and thats what [Peter] set out to build.

Instead of an I/O expander, [Peter] re-engineered his design to use analog multiplexers and a binary counter to cycle through each pixel, one at a time. Basically, the new circuit uses two analog muxes for the columns and rows of the Hall effect array, a binary counter to cycle through each pixel at Megahertz speed, and a fast ADC to read each value. It is, bizarrely, the 1970s way of doing things; these are simple chips, and the controller (a Chipkit Max32) only needs to read a single analog value and clock the binary counter really fast.

With the new design, [Peter] is able to get extremely fast frame rates of about 2,000 Hz. Thats fast enough for some beautiful visualizations of spinning motors and transformers, seen in the video below. Further improvements may include three-axis magnetometers, which should allow for some spectacular visualizations similar to [Ted Yapo]s 3D magnetic field scanner.


Florida High School Shooting

Update: On the Day of the Shooting, Teachers Were Told There Would Soon Be a Code Red or Lockdown Drill Via: Miami Herald: When the fire alarm rang near the end of the school day on Wednesday at Marjory Stoneman Douglas High School in Parkland, teacher Ernest Rospierski assumed it was a code red drill. []


The Latest Lies About Unitary Patent (UPC) and the EPO Techrights

CIPA meeting with Stephen Jones

Summary: Lobbying defies facts; we are once again seeing some easily-debunked talking points from those who stand to benefit from the UPC and mass litigation

TEAM BATTISTELLI will be watching the UK today. The EPOs management doesnt care about the EPO. It just wants the UPC. Theres a discussion among some patent attorneys right now about whether the EPO tries to make the UPC more attractive than the EPO/EPC. What would that say about Battistelli? Some EPO insiders believe, based on internal rumours, that he wishes to continue his reign of terror under the umbrella of UPC (or whatever they try to call it next).

Last night at around midnight (yes, midnight!) the anonymous Kluwer Patent Blogger (probably just Bristows LLP hiding its identity while it publicly lies or distorts facts about UPC) posted some more fake news about the UPCs fake job advertisements, which in our view arent just unethical but should be dealt with as serious offenses (people invited to job interviews for jobs that will never exist). Bristows folks, i.e. the firm and also its staff, continue to show what a disgrace they are. They also spread some other fake news earlier this week. They just cant help themselves.

Bristows is pretty radical even by Team UPC standards (however low these standards may already be). UPCtracker has just recalled: From Boris Johnsons Valentines Day speech : And as the PM has said repeatedly, we must take back control of our laws. It would obviously be absurd, as Theresa May said in her Lancaster House and Florence speeches [...] (1/2) (theres more there)

Thorsten Bausch continued: such as the UPCA?

Yes, obviously.

Even Alexander Esslinger, whose blog we mentioned yesterday, said: I do not expect t...


The CNCF Takes Steps Toward Serverless Computing

Even though the idea of serverless has been around since 2006, it is a relatively new concept. Its the next step in the ongoing revolution of IT infrastructure that goes back to the days when one server used to run one application.


Spectre & KPTI Get More Fixes In Linux 4.16, Offsets Some KVM Performance Losses Phoronix

While we are past the Linux 4.16 merge window, more Spectre and Meltdown related improvements and changes are still being allowed into the kernel, similar to all the KPTI/Retpoline work that landed late in Linux 4.15. On Wednesday was another big batch of KPTI and Spectre work that has already been merged...


Facebook to release its own smart home speakers in July 2018 TechWorm

Facebook to launch smart home speakers with 15-inch display in July

Facebook is looking to take upon Amazons Echo and Echo Dot, a brand of smart speakers developed by alongside Google Home and Google Home Max, by bringing its own set of smart speakers in the market.

According to a report in Taipai-based website...


Marek Updates OpenGL 3.1 ARB_compatibility Support For Mesa Phoronix

Last October well known open-source AMD driver developer Marek Olk began work on OpenGL compatibility profile support for Mesa. This work is about OpenGL 3.1 with ARB_compatibility support, something generally relevant for workstation OpenGL users and one of the few remaining advantages of AMD's current proprietary OpenGL driver...


Bank Accounts of World Chess Body Closed SoylentNews

Dr. Adrian Siegel, the treasurer of the World Chess Federation (known by the French acronym FIDE) has submitted a letter to the body's executive board and other executives informing it that their bank, UBS, is closing the Federation's bank account. Since 2015 the President of FIDE, Kirsan Ilymzhinov, has been listed on the Office of Foreign Accounts Control sanctions list of the U.S. Treasury for financial support of Syria. According to Dr. Siegel, "...after more than two years of Kirsan Ilyumzhinow's [sic] presence on the sanction list... UBS has announced that they will immediately close our accounts."

Over the past two years there were reports of Mr. Ilymzhinov resigning from the presidency in favor of his vice-president, only to attempt to regain executive control, and dissension on the Executive Board of FIDE over the matter. Allegations of corruption have plagued Mr. Ilymzhinov for some years, but he has been re-elected twice over chess Grandmasters Garry Kasparov and Anatoly Karpov in separate elections. In 2010 he proposed building a chess center at the World Trade Center attack site.

The BBC reports that representatives of Mr. Ilymzhinov have denied the allegations as outrageous and false.

Story at by Macauley Peterson.

Checkmate, baby?

Original Submission

Read more of this story at SoylentNews.


Transcending Politics Preview Lifeboat News: The Blog

Theres no escape: the journey to a healthier society inevitably involves politics.

Starting with these words, David Wood, Executive Director of Transpolitica and Chair of London Futurists, introduces his book Transcending Politics: A Technoprogressive Roadmap to a Comprehensively Better Future.

For more details about this book, see

The music in this video has been generated by AI from Jukedeck create your own at


Speech Deficit and No Freedom of Association at the EPO Techrights

Some nutrition facts

Summary: True information cannot be disseminated at the EPO and justice too is beyond elusive; this poses a threat to the EPOs future, not only to its already-damaged reputation

THE inability to reform the European Patent Office (after it got derailed by Battistelli) would be costly to Europe. We try hard to expose facts and foster dialogue about the underlying facts, assuming that truth will set us free.

You can discuss general patent information matters with EPO and other IP experts, the EPO wrote yesterday. Follow the link. Its pathetic. Most of these threads have not been updated in a year if not years and have no replies. Ghost town. Its like nobody really views the EPO as a credible environment for discussion, having perhaps heard about how the EPO gags SUEPO (not just its forums, which were shut down years ago) and even its own staff committee, as we showed yesterday.

The EPOs attacks on staff too are noteworthy. Those are some among many more scandals.

At Kluwer Patent Blog at the moment there are two strands of posts; theres fake UPC news from Bristows talking heads and then there are discussions among patent attorneys, i.e. EPO stakeholders. In the latter we see some interesting comments which we believe to have come from EPO insiders. To quote one:

For your readers with the view to restore Mr Pruniers damaged reputation since you mention him (after the shameful character assassination he suffered from Mr Battistelli) here is what IAM IP Blog published back then :

After this post Battistelli will not comment any more. Guess why

My thoughts are going to Laurent and also Els, Ion and Malika who all were...


Observability: The New Wave or Buzzword?

Monitoring tells you whether the system works. Observability lets you ask why its not working.

Baron Schwartz (@xaprb) October 19, 2017


FOSS Project Spotlight: LinuxBoot

Linux as firmware.

The more things change, the more they stay the same. That may sound clich, but it's still as true for the firmware that boots your operating system as it was in 2001 when Linux Journal first published Eric Biederman's "About LinuxBIOS". LinuxBoot is the latest incarnation of an idea that has persisted for around two decades now: use Linux as your bootstrap.


Bill and Melinda Gates: This is why we give our billions away Lifeboat News: The Blog

There are two reasons to do something like this, the letter says, referring to the $4 billion a year the foundation spends in developing countries trying to end child mortality, distribute vaccinations and improve access to education, plus another $500 million it shells out in the United States.

The billionaire philanthropists are committed to doing the best they can for the world with what they have.


Fluid HPC: How Extreme-Scale Computing Should Respond to Meltdown and Spectre

The Meltdown and Spectre vulnerabilities are proving difficult to fix, and initial experiments suggest security patches will cause significant performance penalties to HPC applications. Even as these patches are rolled out to current HPC platforms, it might be helpful to explore how future HPC systems could be better insulated from CPU or operating system security flaws that could cause massive disruptions.


Arduino Keyboard is Gorgeous Inside and Out Hackaday

While the vast majority of us are content to plod along with the squishy chiclet keyboards on our laptops, or the cheapest USB membrane keyboard we could find on Amazon, theres a special breed out there who demand something more. To them, nothing beats a good old-fashioned mechanical keyboard, where each key-press sounds like a footfall of Zeus himself. They are truly the Chad of the input device world.

But what if even the most high end of mechanical keyboards doesnt quench your thirst for spring-loaded perfection? In that case, the only thing left to do is design and build your own. [Matthew Cordier] recently unveiled the custom mechanical keyboard hes been working on, and to say its an elegant piece of engineering is something of an understatement. It may even better inside than it does on the outside.

The keyboard, which he is calling z.48, is based around the Arduino Pro Micro running a firmware generated on, and features some absolutely fantastic hand-wiring. No PCBs here, just a rainbow assortment of wire and the patience of a Buddhist monk. The particularly attentive reader may notice that [Matthew] used his soldering iron to melt away the insulation on his wires where they meet up with the key...


Microsoft Working to Scale Blockchain for Grand Distributed ID Scheme SoylentNews

Microsoft's wanted a really good federated identity scheme ever since the early 2000s, when it gave the world Project Hailstorm, aka ".Net My Services", to let a web of online services know a little about you and the information you are happy to share with others.

Hailstorm passed, swept back years later as Geneva Server and now seems to have found its way into a blockchain-powered conceptual heir that Microsoft's now named "Decentralized Digital Identities".

Alex Simons, director of program management in Microsoft's Identity Division has revealed that "Over the last 12 months we've invested in incubating a set of ideas for using Blockchain (and other distributed ledger technologies) to create new types of digital identities, identities designed from the ground up to enhance personal privacy, security and control."

Microsoft's identity ambitions, he wrote, now centre on user-controlled-and-owned Decentralized ID schemes so that a single data breach can't give crooks the keys to your kingdom.

Original Submission

Read more of this story at SoylentNews.


Wayland Protocols 1.13 Introduces New Input Timestamp Protocol Phoronix

Jonas dahl on Wednesday announced Wayland-Protocols 1.13, the collection of stable and unstable protocols to Wayland...


Court Dismisses Playboys Copyright Claims Against Boing Boing TorrentFreak

Early 2016, Boing Boing co-editor Xeni Jardin published an article in which she linked to an archive of every Playboy centerfold image till then.

Kind of amazing to see how our standards of hotness, and the art of commercial erotic photography, have changed over time, Jardin commented.

While the linked material undoubtedly appealed to many readers, Playboy itself took offense to the fact that infringing copies of their work were being shared in public. While Boing Boing didnt upload or store the images in question, the publisher filed a lawsuit late last year.

The blogs parent company Happy Mutants was accused of various counts of copyright infringement, with Playboy claiming that it exploited their playmates images for commercial purposes.

Boing Boing saw things differently. With help from the Electronic Frontier Foundation (EFF) it filed a motion to dismiss, arguing that hyperlinking is not copyright infringement. If Playboy wouldve had their way, millions of other Internet users could be sued for linking too.

This case merely has to survive a motion to dismiss to launch a thousand more expensive lawsuits, chilling a broad variety of lawful expression and reporting that merely adopts the common practice of linking to the material that is the subject of the report, they wrote.

The article in question

Yesterday US District Court Judge Fernando Olguin ruled on the matter. In a brief order, he concluded that an oral argument is not needed and that based on the arguments from both sides, the case should be dismissed with leave.

This effectively means that Playboys complaint has been thrown out. However, the company is offered a lifeline and is allowed to submit a new one if they can properly back up their copyright infringement allegations.

The court will grant defendants Motion and dismiss plaintiffs First Amended Complaint with leave to amend. In preparing the Second Amended Complaint, plaintiff shall carefully evaluate the contentions set forth in defendants Motion.

For example, the court is skeptical that plaintiff has sufficiently alleged facts to support either its inducement or material contribution theories of copyright infringement, Judge Olguin adds.

According to the order, it is not sufficient to argue that Boing Boing merely provided the means to carry out copyrigh...


Priscila Chaves Martnez, Cofounder and Director of Innova10x, joins our Futurists Board Lifeboat News

Priscila Chaves Martinez, Cofounder and Director of Innova10x, joins our Futurists Board.


China announces worlds first lung regenerative therapy Lifeboat News: The Blog

Tongji University has announced what it says is a major breakthrough in the treatment of lung disease by repairing tissue through stem cell transplantation.


The Scandinavians hitchhiked their way to the boons of empire Terra Forming Terra

Plantation Hgensborg on St Croix in the former Danish West Indies (1833). <em>Courtesy Wikipedia</em>

Of course they did.  today we have all of Latin America jumping on the Western economic band wagon and the Islamic world jumping on the european bandwagon.

What is not understood is that the Scandinavians actively colonized North America itself in the six centuries before English ascendancy in the seventeenth century.  Thus a continuing transfer of peoples was inevitable but never disclosed in the English record.  Serious issues of first rights obviously existed but needed a navy to enfo...


Life in hollow Earth Terra Forming Terra

As i have posted, Cloud Cosmology permits hollow earths and a whole cosmology of hollow stars and planets.  The mind conditioned to traditional physics must naturally dismiss this and i am as guilty as anyone.  Problem is that i do know a lot about geology as well and i should be able to make this proven wrong.

Except no, we have a perfect unique location for the original North pole in Hudson Bay.  The South pole location is as equally prospective.  The pole was also deliberately shifted 15 degrees some 12900 BP through a targeted comet impact into the Northern Ice Cap.  We now have real cultural confirmation as well.

At the same time this Cloud cosmology turns what we assume about gravity on its head.  A Galaxy produces Dark Matter which carries most of the gravity and forms an incompressible fluid.  We have contimuing production of Dark Matter from the stars and planets.  Yet just how far does all this push out?  Each Galaxy must be a speroid of Dark Matter and the regions in between must be different.

It is not unreasonable to label all Galaxies as individual universes.  The fact the we can percieve them is interesting

Life in hollow Earth 

Is Earth inside the Universe, or vice versa? Since we can grasp only a model of reality, how do we know whats real?

Going down... Photo by Carl De Keyzer/Magnum Photos

Joel Frohlich

is a PhD student at the University of California, Los Angeles, where he is examining biomarkers of autism spectrum disorders. He is also senior editor at Knowing Neurons.

In 1869, the Baptist fundamentalist Cyrus Reed Teed reported his divi...


Did America Get Fat by Listening to Government Experts? Terra Forming Terra

Look, the meta stats say exactly one thing.  Sugar is not your friend in any way shape or form.  And since about the only way to replace lost taste in processed foods is to add sugar, we need to avoid processed food...

Everything else turns out to be suspect in terms of the advice given.  You can even survive trans-fats if you do not eat sugar , though it is better to avoid.
Of course the whole processed food industry cannot afford this news as they will lose most of their products.

Did America Get Fat by Listening to Government Experts?

How much disease has been caused by the Food Pyramid?

by Richard Morrison

Wednesday, January 17, 2018

A panel of government experts gets together and decides what is healthy to eat and what isnt. What could possibly go wrong?

That path has actually made diet-related chronic health issues even worse.

Freethink Medias new video on the history of the Food Pyramid will make for surprising viewing for anyone who assumes official health and nutrition advice should be taken at face value.

Starting in the late 1980s, the office of the U.S. Surgeon General took the lead in waging the federal governments war on dietary fat. This led to years of recommendations and public information campaigns that, among other things, demonized animal protein sources (that often come along with a significant amount of fat) and steered Americans towards consumption of lots of low-fat carbohydrates insteadthe base of the pyramid. M...


Q anon End Game and Red Pill Terra Forming Terra

This is an extremely important post for those who need to come up to speed with what has been happening and to anticipate what will be shocking us soon. The first item here is recent and tells us that the end game is due to unfold. There is a lot there in the balance of the material and if you are new to this, take your time.

Do observe that a lot of high profile folks have gone silent during the past two months and may well have disappeared as well. As of today both Hilary and Obama may well have joined this body of folks. We have also heard that GITMO is at capacity. Design there is around several hundred and claims of been in disrepair are nonsense. Your new guests can help make all that space habitable as normally happens. Thus we can plausibly anticipate a capture approaching say 600 which nicely represents about five percent of the reported sealed indictments of 13,600.

These numbers work as we will be focusing on nodes in the spider web rather than personal networks who can be rounded up at one's leisure. As already reported, military Intel has been surely been able to put together a complete road map of everyone involved thanks to NSA surveillance in particular as well as multiple adjunct sources.

Mass arrests should start almost immediately so i am posting this on as of today basis.

The only group not yet been visibly taken down is the MSM and i am now expecting that to happen at the same time. Other groups have so far either been quietly taken or treated to catch and release although that may now be over. MSM shrillness seems to be diminishing.

The first post here ends with the media cleanse and JFK. I presume we will get full disclosure on JFK and this plausibly means a death sentence for George H.W. Bush as he was in position and had the seniority to lead and control the kill teams used. This shock will provide cover for the related mass arrests taking place that are not directly related..

The controlling mind(s) behind globalism happens to be the scions of inherited wealth and power and surely includes even the Jacobites. You get my point here..

The problem with these folks is that they fail to select for intelligence and worse that that it fails to select for pertinent experience. Yet they are like any dysfunctional family inas...


Waiting For the Robot Rembrandt - Issue 57: Communities Nautilus

The cellist Jan Vogler famously claimed that art is what makes us human. But what if machines start making art too?

Heres an example of a piece of art made by an artificial intelligence (AI):

A bit of art: A computer trained with images of graffiti produces its own art by spraying water onto concrete. The exhibit, titled About a Theory of Graffiti, was created by the artist yang02 and shown at the Artificial Intelligence Art and Aesthetics Exhibition in Okinawa this year.Courtesy of the Artificial Intelligence Art and Aesthetics Research Group

On the right side of the picture is a computer running an AI that has been trained with images of graffiti. It controls a plotting head that sprays water onto concrete blocks, on the left. The resulting patterns are a form of computer-generated art.

Is this fine art in the true sense? If it is, we would need to confront the possibility that some part of our humanitythe part that Vogler was referring tohas been captured by machines. The fact is, however, that while the output of the machine may be artistic, it is not making fine art.

When art is made to satisfy the needs of a third
Read More

Why Your Roses Smell Nice - Issue 57: Communities Nautilus

The appeal of many floral scents to humans is a fortunate byproduct: We were not even around when they appeared. And, for all the effort, commercial perfumes rarely smell like flowers. Expensive, fancy bottles labeled jasmine or gardenia may smell wonderful but they are sad substitutes for the real thing.

One reason is that flowers generally produce very large mixtures of different volatile molecules, as many as a thousand. Some of these fall into related chemical groups and although they differ very slightly in chemical structure, they can produce very different smells. In closely related flowers, the volatile molecules can vary both in relative amounts (reflecting differential regulation of the genes and gene products needed) and in their chemical structures (reflecting the activity of genes evolved to produce the enzymes needed for synthesis). Its not easy to figure out which components of a mixture are important for attracting insects or birds or for achieving a perfume attractive to people. It is especially challenging because our own sense of smell depends on a complex set of nerve cells and often differs from one person to another. The manufacture of the odors depends on a plants genes, and the ability of animals,
Read More

How We Make Gods - Issue 57: Communities Nautilus

From the moment he arrived, Egor lived for mayhem. The time was 1982, and the place was the first online game world, called MUD (short for Multi-User Dungeon). Before Egor there had been duels, pranks, and the occasional fire-breathing dragon, all amiably playing out in the MUD world, hosted on the servers of the University of Essex. A rough kind of social contract had held.

Egor was the screen name of a player who set out to test the limits. He learned the shortcuts allowed by the code. He wrote scripts that let his character level up quickly. He discovered a way to fake other players logins. With a borrowed screen name, he would go on sprees of destruction, and watch with amusement as the real player logged on later to face a raging mob. He ganked new playerskilled them before they knew which end of the sword to hold.

Thirty years down the road, an online multiplayer scene would grow geometrically from those few hundred players logging into the Essex server. About 618 million people now participate in online worlds; on a given day, the most popular might boast 2 million people playing at the same time. The
Read More


Facebook Offers A VPN Client Under Protect Option For iOS TechWorm

Is Facebook-owned Onavo Protect app, a spyware?

Facebook who is no stranger to privacy-related controversy has adopted a novel way to collect and track its users data that gives information about their online habits.

Apparently, Facebook is pushing its users to download and install a Facebook-owned VPN client called Onavo Protect on their devices under the pretext of protecting their account. VPN (short for virtual private network) is used to safeguard users online privacy and keep their IP address anonymous particularly when using public Wi-Fi networks by creating a secure connection to another network over the Internet. However, Onavo Protect is just doing exactly the opposite. In fact, the VPN client is tracking users apps, how often they are used and what websites users visit and is sending these information back to Facebook.

However, this VPN client has been added only to the iOS platform of mobile app and not the Android app, according to TechCrunch, who were the first to spot the new Protect option under the Apps section on the Facebook mobile iOS app. On clicking this option, the user will be directed to Apples App Store and pushed to download Onavo Protect VPN.

In a statement to TechCrunch, Facebook has confirmed that it had recently started rolling out the Onavo Protect app access directly from its iOS app. We recently began letting people in the US access Onavo Protect from the Facebook app on their iOS devices. Like other VPNs, it acts as a secure connection to protect people from potentially harmful sites. The app may collect your mobile data traffic to help us recognise tactics that bad actors use. Over time, this helps the tool work better for you and others. We let people know about this activity and other ways that Onavo uses and analyses data before they download it, said Erez Naveh, Product Manager at Onavo in the statement.

It is unclear how Facebook is planning to influence the user data it will collect through the Onavo Protect app. While the app claims to keep your data safe and add an extra layer of protection to your mobile traffic by routing it through their servers, the description of the app throws light on how the service work.

It reads, Onavo uses a VPN to establish a secure connection to direct all of your network communications through Onavos servers. As part of this process, Onavo collects your mobile data traffic. This helps us improve and operate the Onavo service by analyzing your use of websites, apps and data. Because were part of Facebook, we also use this info to improve Facebook products and services, gain insights into the products and services people value, and build better experiences.

While many have called the Onavo Protect app as a...


Unknown Threat Actor Conducts OPSEC Targeting Middle East Security Affairs

Hackers conduct OPSEC Targeting Middle East  Classified Documents That May Pertain To The Jordanian Research House Dar El-Jaleel Are Being Used As Bait In A Campaign Targeting The Middle East.

The researchers Paul Rascagneres with help of Martin Lee, from CISCO TALOS, described a campaign of targeted attacks against the middle east with key elements present: Geopolitical interest at stake, once documents pertaining Research House Dar EL-Jaleel, that research on Israeli-Palestinian conflict and Sunni-Shia conflict with Iran, are being used.

Second, the extensive use of scripting languages (VBScript, PowerShell, VBA) as part of the attack vector, once they are used to be dynamically loaded and execute VBScript functions stored in a Command & Control server.

Third, the attacker had deployed a series of sophisticated countermeasures to hide his identification using Operation Security (OPSEC), utilization of reconnaissance scripts to validate the victim machine according to his criteria, utilization of CloudFlare system to hide the IP and infrastructure and finally using filters on connections based on User-Agent strings to use the infrastructure for short periods of time before vanishing going offline.

Regarding the analysis in the report, the script campaign is divided into a series of steps to further advance the widespread of the infection. The VBS campaign is composed of 4 steps with additional payloads and 3 distinct functions that are: Reconnaissance, Persistence, and Pivoting.

middle east opsec attack

According to the report the first stage starts with a VBScript named   .vbs (From inside Irans secret war in Syria.vbs) that is aimed to create in the second stage a PowerShell script that will generate a Microsoft Office document named Report.doc and to open it. On the third stage, the opened document contains a macro that creates a WSF (Windows Script File) file to be executed. On the fourth stage the script contains configuration information such as: The hostname of the command and control server, the port used 2095 and the User-Agent.

As the report notice, the User-Agent strings are being used to the identification of targets, while the command and control server filter these strings to only allow conn...


Qingsong (Dora) Ke, Asia-Pacific Associate Director of IE Business School, joins our Business Board. Lifeboat News

Qingsong (Dora) Ke, Asia-Pacific Associate Director of IE Business School, joins our Business Board.


[SECURITY] [DSA 4114-1] jackson-databind security update Bugtraq

Posted by Sebastien Delafond on Feb 14

Debian Security Advisory DSA-4114-1 security () debian org Sebastien Delafond
February 15, 2018

Package : jackson-databind
CVE ID : CVE-2017-17485...


How Cockroaches Crash Into Walls And Keep Going SoylentNews

Arthur T Knackerbracket has found the following story:

Anyone who's tried to kill a cockroach knows that the ancient pests have some world-class evasive maneuvers. Or at least they appear to.

The agility of cockroaches may owe less to lightning-fast reflexes and fancy footwork than their tough, shock-absorbent bodies. According to a new study, American cockroaches can run full-speed into walls and other obstacles because their exoskeletons allow them to recover quickly with hardly any loss in momentum.

"Their bodies are doing the computing, not their brains or complex sensors," said Kaushik Jayaram, a biologist at Harvard University and lead author of the study, which was published in the Journal of the Royal Society Interface.

The findings -which were further validated by a tiny, cockroach-sized robot - could influence the design of the next generation of robots that run, jump and fly.

Original Submission

Read more of this story at SoylentNews.


[SECURITY] [DSA 4112-1] xen security update Bugtraq

Posted by Moritz Muehlenhoff on Feb 14

Debian Security Advisory DSA-4112-1 security () debian org Moritz Muehlenhoff
February 14, 2018

Package : xen
CVE ID : CVE-2017-17563 CVE-2017-17564...


Re: [FD] Defense in depth -- the Microsoft way (part 51): Skype's home-grown updater allows escalation of privilege to SYSTEM Bugtraq

Posted by Jeffrey Walton on Feb 14

Not sure if this is related, but:

Microsoft today squashed a bug that was found in Skypes updater
process earlier this week. However, it seems the companys method for
stopping the flaw is to kill off the Skype classic experience. If that
is the case, users of Skype on Windows 7 and Windows 8.1 could lose
access to the service.



[SECURITY] [DSA 4113-1] libvorbis security update Bugtraq

Posted by Moritz Muehlenhoff on Feb 14

Debian Security Advisory DSA-4113-1 security () debian org Moritz Muehlenhoff
February 14, 2018

Package : libvorbis
CVE ID : CVE-2017-14632 CVE-2017-14633...


NAT32 Build (22284) Remote Code Execution CVE-2018-6940 (hyp3rlinx / apparition security) Bugtraq

Posted by apparitionsec on Feb 14

[+] Credits: hyp3rlinx
[+] Website:
[+] Source:
[+] ISR: Apparition Security

[-_-] D1rty0tis


NAT32 Build (22284)

NAT32 is a versatile IP Router implemented as a WIN32 application.

Vulnerability Type:
Remote Command Execution

CVE Reference:...


NEW 'Off The Hook' ONLINE 2600 - 2600: The Hacker Quarterly

NEW 'Off The Hook' ONLINE

Posted 15 Feb, 2018 6:24:08 UTC

The new edition of Off The Hook from 14/02/2018 has been archived and is now available online.


Under pressure Noise to Signal

(a couple in a kitchen dripping with sprayed food, which came from inside an Instant Pot) This might be a good time to review the difference between quick and natural pressure release.

If anyone had told me a few years ago that the trendy home gadget was going to be a pressure cooker, Id have nodded sagely, congratulated them on their out-of-the-box thinking, and drifted quietly toward the exit.

But look at me these days, making lentils, buttered chicken, pulled t...


Hackers have exploited a zero-day in Bitmessage client to steal Electrum wallet keys Security Affairs

Bitmessage developers have issued an emergency update for the PyBitmessage client that patches a critical remote code execution vulnerability that has been exploited in attacks.

Bitmessage development team has rolled out an emergency patch to address a zero-day vulnerability in the PyBitmessage client for Bitmessage, which a Peer-to-Peer (P2P) communications protocol used to send encrypted messages to users.

The flaw is critical remote code execution vulnerability that according to the experts was being exploited in the wild to steal Bitcoin wallet keys.

bitmessage app

According to the security advisory published by the development team developers, hackers exploited the flaw in attacks against users running PyBitmessage 0.6.2.

A remote code execution vulnerability has been spotted in use against some users running PyBitmessage v0.6.2. The cause was identified and a fix has been added and released as If you run PyBitmessage via code, we highly recommend that you upgrade to Alternatively you may downgrade to 0.6.1 which is unaffected. reads the advisory.

According to the security advisor, hackers targeted also the Bitmessage core developer Peter urda, his keys were most likely compromised for this reason he has created a new support address.

Bitmessage developer Peter urdas addresses are to be considered compromised. continues the advisory.

Users are recommended to change their passwords and create new bitmessage keys.

urda speculates the attacker exploited the zero-day to create a remote shell and steal bitcoins from Electrum wallets.

The exploit is triggered by a malicious message if youre the recipient (including joined chans),urda...


Laurel Kornfeld joins our Space Settlement Board. She is Staff Writer at SpaceFlight Insider and Correspondent at The Space Reporter. Lifeboat News

Laurel Kornfeld joins our Space Settlement Board. She is Staff Writer at SpaceFlight Insider and Correspondent at The Space Reporter.


Laurel Kornfeld joins our Space Settelment Board. She is Staff Writer at SpaceFlight Insider and Correspondent at The Space Reporter. Lifeboat News

Laurel Kornfeld joins our Space Settelment Board. She is Staff Writer at SpaceFlight Insider and Correspondent at The Space Reporter.


Homebrew Wrist Brace Helps Beat Injury with Style Hackaday

Repetitive motion injuries are no joke, often attended by crippling pain and the possibility of expensive surgery with a lengthy recovery. Early detection and treatment is the key, and for many wrist and hand injuries such as [ktchn_creations] case of Blackberry thumb, that includes immobilization with a rigid brace.

While [ktchn_creations] stipulates that looks were the motivator here, were not unaware that a 3D-printed brace might be more affordable than something dispensed by a doctor. But if you do build your own DIY appliance, whether for bracing your wrist, your knee, or your wayward teeth, youll want to run it past your health care provider, of course.


Using Lego for Modular Microfluidics SoylentNews

Massachusetts Institute of Technology (MIT) scientists are using LEGO bricks to create a modular microfluid system that will work around the world.
When looking for a modular microfluid system, scientists at MIT landed on LEGO bricks. Because of the conformity and consistency of LEGO bricks, they allow systems to be replicated without much room for error.

For those unfamiliar with Microfluidics, it's exactly what it says on the tin: Manipulating fluids in very small quantities and with great precision. It's used in everything from medicine to inkjet printers.

Original Submission

Read more of this story at SoylentNews.


Development Release: Porteus 4.0 RC4 News

Jay Flood has announced the availability of a development build of the upcoming Porteus 4.0, a set of portable Linux distributions based on Slackware Linux, with a good choice of desktop environments. Although labelled as "release candidate 4", this is actually the first public development release of the....


Anitha Vadavatha, Founder of Misu Labs, joins our Futurists Board. Lifeboat News

Anitha Vadavatha, Founder of Misu Labs, joins our Futurists Board.


ICO Advisor Bonnie Normile joins our New Money Systems Board. Lifeboat News

ICO Advisor Bonnie Normile joins our New Money Systems Board.


Trump Administration Budget Proposal Would Cancel WFIRST SoylentNews

A Trump administration budget proposal would cancel NASA's flagship-class Wide-Field Infrared Survey Telescope (WFIRST) as well as several Earth science related telescopes, as it focuses on the Space Launch System, Orion, and sending astronauts to an orbital space station around the Moon:

The Trump administration has released its budget proposal for fiscal year 2019 and put dozens of federal programs on the chopping block, including a brand-new NASA space telescope that scientists say would provide the biggest picture of the universe yet, with the same sparkling clarity as the Hubble Space Telescope. The proposal, released Monday, recommends eliminating the Wide-Field Infrared Survey Telescope (WFIRST), citing "higher priorities" at NASA and the cost of the new telescope.

"Given competing priorities at NASA, and budget constraints, developing another large space telescope immediately after completing the $8.8 billion James Webb Space Telescope is not a priority for the administration," the proposal states. "The budget proposes to terminate WFIRST and redirect existing funds to other priorities of the science community, including completed astrophysics missions and research."

Although the Trump administration wants to end funding of the International Space Station (ISS) by 2025, it envisions private companies picking up the slack:

"The decision to end direct federal support for the ISS in 2025 does not imply that the platform itself will be deorbited at that time it is possible that industry could continue to operate certain elements or capabilities of the ISS as part of a future commercial platform," according to a draft summary of NASA's ISS Transition Report required by Congress in the agency's 2017 Authorization Act.

Read more of this story at SoylentNews.


Show Your Love For Linux Hardware & Benchmarking This Valentine's Day Phoronix

While it was a very busy January testing all the fallout from Spectre and Meltdown, February has become just as busy with monitoring all of the Linux 4.16 changes and beginning those benchmarks, all the testing now around the Raven Ridge APUs, and today's release of Phoronix Test Suite 7.8 among a lot of other Linux hardware tests that are ongoing...


Harvesting Energy from the Earth with Quantum Tunneling Hackaday

More energy hits the earth in sunlight every day than humanity could use in about 16,000 years or so, but that hasnt stopped us from trying to tap into other sources of energy too. One source that shows promise is geothermal, but these methods have been hindered by large startup costs and other engineering challenges. A new way to tap into this energy source has been found however, which relies on capturing the infrared radiation that the Earth continuously gives off rather than digging large holes and using heat exchangers.

This energy is the thermal radiation that virtually everything gives off in some form or another. The challenge in harvesting this energy is that since the energy is in the infrared range, exceptionally tiny antennas are needed which will resonate at that frequency. It isnt just fancy antennas, either; a new type of diode had to be manufactured which uses quantum tunneling to convert the energy into DC electricity.

While the scientists involved in this new concept point out that this is just a prototype at this point, it shows promise and could be a game-changer since it would allow clean energy to be harvested whenever needed, and wouldnt rely on the prevailing weather. While many clean-energy-promising projects often seem like pipe dreams, we cant say its the most unlikely candidate for future widespread adoption weve ever seen.


Facebook Patents Tech to Determine Social Class SoylentNews

We've got great news this week for nation-state employees tasked with using social media to spark a class war in previously stable democracies! Facebook is patenting technology to decide if its users are upper, middle or working class -- without even using the usual marker for social class: an individual's income (the patent considers this a benefit).

Facebook's patent plan for "Socioeconomic Group Classification Based on User Features" uses different data sources and qualifiers to determine whether a user is "working class," "middle class," or "upper class." It uses things like a user's home ownership status, education, number of gadgets owned, and how much they use the internet, among other factors. If you have one gadget and don't use the internet much, in Facebook's eyes you're probably a poor person.

Facebook's application says the algorithm is intended for use by "third parties to increase awareness about products or services to online system users." Examples given include corporations and charities.


Original Submission

Read more of this story at SoylentNews.


Want to Lose Weight? Heres How To Get 10 Servings Of Fruit And Vegetables Daily Lifeboat News: The Blog

Summary: Practical tips on how to consume 10 servings of fruits and vegetables daily to lose weight and improve health. [This article first appeared on the LongevityFacts website. Author: Brady Hartman.]

Fruits and vegetables are rich in phytonutrients and are an integral part of the healthiest diet plans. Here are practical tips on how to incorporate more plant foods into your meals.

Due to a poor diet, about half of all American adults have one or more preventable chronic diseases, including type 2 diabetes, overweight, obesity or cardiovascular disease. A large body of evidence, including newly published research on the health benefits of fruit and vegetables, shows that increased consumption of whole plant foods is linked to reduced risk of death and chronic diseases.


Trial Shows Canakinumab Prevents Cancer and Heart Attacks Lifeboat News: The Blog

Doctors implicate chronic inflammation as a cause of heart disease and cancer with some claiming that reducing persistent, low-grade inflammation will reduce these diseases. In fact, a recent clinical trial discovered that the inflammation-lowering drug Canakinumab reduced heart attack and strokes by nearly a fourth and cancer by about half.

More than ever, physicians believe that reducing chronic inflammation will also reduce heart attacks and strokes. Robert A. Harrington, M.D., a Cardiologist with the Department of Medicine at Stanford University, leans toward the inflammatory hypothesis of heart disease, a belief that chronic inflammation is a significant cause of heart disease. According to Dr. Harrington.

Inflammatory cells and signals drive the healing response to vascular injury, allowing the initiation and growth of atherosclerotic plaque.


Lose Weight With Coffee? Maybe Not, New Research Says Lifeboat News: The Blog

Summary: Lose weight with coffee? Probably not. While coffee is a healthy drink, and research suggests it helps ward off type 2 diabetes in habitual drinkers, new studies suggest that coffee probably wont help in weight loss. [This article first appeared on the website LongevityFacts. Author: Brady Hartman. ]

People love to wake up each morning to the smell of hot coffee brewing. Coffee and the caffeine it contains are a great way to kick-start the day. About half of American adults drink coffee every day, drinking about 3 cups on average.

The beverage is consumed all over the world. Coffee originated in northeast Africa and spread throughout the Middle East in the 15th century from where it went on to Europe.


Heart Healthy Chocolate What You Need to Know Lifeboat News: The Blog

Take Home Message

  • The EPIC Systematic Review showed that chocolate lowered the risk of coronary heart disease by 25% and cardiovascular deaths by 45%.
  • Raw cocoa powder is lower in calories when compared to chocolate.
  • Cocoa has many antioxidants called flavonols, shown to be heart healthy.
  • Research suggests that cocoa reduces atrial fibrillation, improves cholesterol, benefits vascular health and reduces blood pressure.
  • Cocoa is the key ingredient in heart healthy chocolate.
  • Dark chocolate is also heart healthy and is higher in flavonols than cocoa powder. Dark chocolate has more fat.
  • Dark chocolate and cocoa powder both have their advantages.
  • To get the heart health benefits of chocolate without the extra calories, add a pure cocoa powder to foods you normally consume.

Help Us Spread The Word.

Please help us spread the word on the benefits of heart healthy chocolate by sharing this article to your social media page. It takes just a simple click on any social media link on this page.


Four Ways We Can Swallow the Doctor (Nanodocs, the medical nanorobots) Lifeboat News: The Blog

Summary: Nanodocs are medical nanorobots that work from inside like a tiny doctor. The authors of a recent research study say we may be able to swallow the doctor sooner than we think. Once considered science fiction, the ability to swallow the surgeon using medical nanobots to diagnose and treat disease from inside the body is becoming a reality. The study authors highlight recent advances in nanotechnology tools, such as nanodrillers, microgrippers, and microbullets and show how nanodocs have tremendous potential in the areas of precision surgery, detection, detoxification and targeted drug delivery. [Cover photo: The old way to swallow the surgeon. Credit: R. Collin Johnson / Attributed to Stanford University.]

Imagine that you need to repair a defective heart valve, a major surgery. Instead of ripping your chest cut open, a doctor merely injects you with a syringe full of medical nanorobots, called nanodocs for short. You emerge from the surgery unscathed, and your only external wound is the puncture hole from the injection.

According to a recent study published by nanorobotic engineers at the University of California San Diego (UCSD), the concept of swallow the doctor may be closer to reality than we think.


A.I. Algorithm Recognizes Terrorist Propaganda With 99% Accuracy SoylentNews

Submitted via IRC for AndyTheAbsurd

The UK-based company ASI Data Science unveiled a machine learning algorithm Wednesday that can identify terrorist propaganda videos with 99 percent accuracy.

This development marks one of the first instances of a company successfully using A.I. to flag extremist propaganda. The Islamic State group is notorious for its social media recruiting efforts, and this algorithm could help curtail them.

While the researchers at ASI wouldn't discuss any technical specifics of the algorithm, it appears to work like other kinds of A.I. recognition software. The algorithm can examine any video and determine the probability that the video is a piece of extremist propaganda. According to the BBC, the algorithm was trained on thousands of hours of terrorist recruiting videos, and it uses characteristics from these videos to assign probability scores.


Original Submission

Read more of this story at SoylentNews.


Quantum computers one step closer Lifeboat News: The Blog

Quantum computing has taken a step forward with the development of a programmable quantum processor made with silicon.

The team used microwave energy to align two electron particles suspended in silicon, then used them to perform a set of test calculations.

By using silicon, the scientists hope that quantum computers will be more easy to control and manufacture.


New blood test for Alzheimers could improve dementia treatment Lifeboat News: The Blog

New Alzheimers blood test is so precise, it could predict it three decades ahead. The test was accurate in 90% of patients tested.


Anti-Aging Scientists Hope to Reduce Chronic Diseases Lifeboat News: The Blog

Summary: Recent scientific advances in anti-aging science are bringing the dream of the fountain of youth closer to reality. More than just extending our lifespans, the field hopes to significantly reduce the chronic diseases of aging, such as cancer, heart disease, and dementia. [This article first appeared on the website Author: Brady Hartman. ]

A fountain of youth has been the dream of humanity throughout history.

Recent scientific advances are bringing that dream closer to reality.


Secrets of these 200-year-old whales who avoid cancer Lifeboat News: The Blog

Summary: Why the bowhead whale lives 200 years and rarely gets cancer. This article is part 2 of a 3-part series, covering the role of telomere length in cancer and part of a new extensive study. Part 1 on the accuracy of telomere length is here, Part 3 on the role of telomere length in chronic diseases is here. [This article first appeared under the title Top Journal Discovers Key to These 200-Year-Old Whales Who Avoid Cancer on the website Author: Brady Hartman. ]

Related: A brief overview of why whales dont get cancer is in this companion video.

In a comprehensive study published a little more than a week ago in a highly respected journal of the Royal Society of the UK, authors Abraham Aviv and Jerry W. Shay (see author bios here) report on the role of telomere length. In this segment, the authors describe the role of telomere length in protecting us from cancer and explain why whales have low rates of cancer, despite large cell counts, long lives, and relatively short telomeres.


Can the blood of teens rejuvenate our bodies? This new trial aims to find out Lifeboat News: The Blog

Summary: A recently announced parabiosis trial in humans the practice of transfusing young blood to old may have profound implications for treating the chronic diseases of old age, including metabolic changes, frailty, Alzheimers, Parkinsons, and other forms of dementia. However, some geroscientists say that variations of the procedure could cause severe side effects. [This article first appeared on the website Author: Brady Hartman. ]

The idea that youthful blood might rejuvenate our aging bodies has lingered in the popular imagination for centuries, fueled by recent experiments in which these transfusions revitalized aging mice.

Last week, Bill Faloon of the Life Extension Foundation (LEF) in partnership with the Young Blood Institute (YBI), announced a bold new human trial of the rejuvenating effects of the young blood / old blood swap, saying.



Revolutionary Technologies to Beat Aging in Our Lifetimes Lifeboat News: The Blog

Five technologies in development including senolytic drugs, rapamycin, stem cell therapy, NAD supplementation and gene therapy could dramatically slow down aging in the next few years. This report updates the latest developments in these promising and potentially lifespan-extending treatments. [This article first appeared on the website LongevityFacts. Author: Brady Hartman. ]

The longevity science field has made enormous progress in recent years, and human trials of anti-aging compounds have already started, with more to begin soon. The lifespan-extension research field is gaining the attention of mainstream medicine.

The specialists who populate the field, called geroscientists, are developing several technologies that might benefit people who are alive today and aim to bring them to the clinic. These lifespan-extending technologies include stem cell therapy, rapamycin, gene therapy, senolytic drugs, and NAD supplementation.


NSA Shooting: 3 in Custody, Officer Injured After SUV Stopped at Fort Meade Security Gate

Via: Baltimore Sun: FBI officials said they are continuing to investigate an incident at Fort Meade early Wednesday that left three people injured when the driver of an SUV attempted to make an unauthorized entry into the National Security Agencys compound. Dave Fitz, a spokesman at the FBIs Baltimore field office, said late Wednesday investigators []


[$] Weekly Edition for February 15, 2018

The Weekly Edition for February 15, 2018 is available.


Ubuntu 16.04.4 LTS Planned For Release 1 March Phoronix

The delayed Ubuntu 16.04.4 point release is now expected to become available at the start of March...


Overnight Tech: FTC nominees promise focus on data breaches | FCC chair backs SpaceX broadband project | AT&T wants antitrust chief to testify in merger trial The Hill: Technology Policy

FTC NOMINEES PROMISE FOCUS ON DATA BREACHES: President Trump's nominees for the Federal Trade Commission (FTC) are vowing to make data breaches a top priority for the agency if they are confirmed."They're becoming much more significant, much...


This IS Your Grandfathers Radio Hackaday

Tube radios have a certain charm. Waiting for them to warm up, that glow of the filaments in a dark room. Tubes ruled radio for many decades. [Uniservo] posted a video about the history and technology behind the 1920s era Clapp-Eastham C-3 radio. This is a three-tube regenerative receiver and was advanced for its day.

If you are worried he wont open it up, dont despair. Around the ten minute mark, your patience will be rewarded. Inside are three big tubes full of getter and bus bars instead of wires. Add to that the furniture-quality case, and this is a grand old radio.

One interesting thing about this receiver is that it uses a special kind of transformer known as a variocoupler where a coil rotates inside another to adjust the regeneration. It turned out that the tubes were newer than the radio, so [Uniservo] replaced them with more age-appropriate tubes.

Unfortunately, the radio is silent for now because of open audio transformers. We hope hell get it working and make another video of it actually operating.

Regenerative receivers have pretty good amplification performance with a low parts count. Thats because the amplifier operates near oscillation where the gain at the selected frequency is very high. It is pretty easy to build your own using technology a little newer than these tubes. If you want to dive into the theory, weve done that, too.


Hatch pushes for immigration reform focused on high-skilled workers The Hill: Technology Policy

Sen. Orrin Hatch (R-Utah) on Wednesday introduced a series of amendments focused on high-skilled immigration reform.The amendments to the pending Senate immigration legislation aim to both target companies that are overly dependent on H-1B...


Lazarus Group is back, targeting Banks & Bitcoin users with phishing scam HackRead

By Waqas

The IT security researchers at McAfee have discovered that the Lazarus

This is a post from Read the original post: Lazarus Group is back, targeting Banks & Bitcoin users with phishing scam


Canonical Pursuing A Hardware/Software Survey For Ubuntu Installations Phoronix

Will Cooke, Canonical's Director of Ubuntu Desktop, has announced plans to collect more diagnostics data from Ubuntu installations. This would involve collecting system hardware/software details during the installation process and be uploaded to Ubuntu servers, but users could opt-out of said survey...


Optalysys, Back in the (Press Release) News SoylentNews

Optalysys, a company that has long promised "optical coprocessors" enabling up to exascale performance computing in a desktop form factor, has brought on some new science advisers:

Optalysys Ltd., a start-up commercializing light-speed optical coprocessors for AI/deep learning, today announced the formation of its first Scientific Advisory Board (SAB) comprising experts in AI/machine learning, bioinformatics/genomics and optical pattern recognition. The inaugural SAB members include Professor Douglas Kell of The University of Manchester, Professor Timothy Wilkinson of University of Cambridge and ex-senior NASA scientist, Dr. Richard Juday.

"Collectively, these experts have deep knowledge in areas most critical to our long-term success," said Dr. Nick New, founder and director, Optalysys. "We're excited to work closely with them through the process of bringing to market our unique optical approach to super-fast, low-power computing to enable more tech innovators and scientists to create a better world."

Dr. Juday is no stranger to vaporware.

However, Optalysys has apparently found a niche for its machines: genomic analysis:

Optalysys, a U.K company seeking to commercialize optical co-processor technology, today announced completion of its Genetic Search System (GENESYS) project conducted with the prestigious Earlham Institute (EI). Citing a dramatic power saving and performance speedup for computing a traditional genomics alignment problem, Optalysys says the work demonstrates the effectiveness and maturity of its optical processing technology, which the company promotes as a post-Moore's Law alternative.

[...] The benchmark GENESYS project aligned metagenomics reads sequenced from the Human Microbiome Project Mock Community (a well characterized microbial community) against a database consisting of 20 bacterial genomes totaling 64 million base pairs. "The optical system exceeded the original targets delivering a 90 percent energy efficiency saving compared to the same test run on EI's HPC cluster, with an accuracy comparable to the highly sensitive nucleotide form of BLAST, BLASTn (part of a family of Basic Local Alignment Search Tools used to compare query sequences with a library or database of sequences)," reported Optalysys.

Technology from the GENESYS project is launching in February 2018 as a cloud-based...


No, Britain is Not Ratifying Unitary Anything, But Team UPC Insinuates It Will (Desperate Effort to Affect Tomorrows Outcome) Techrights

This to put it quite bluntly is what the mainstream habitually labels fake news

Kluwer fake news

Summary: Contrary to several misleading headlines from Bristows (in its blog and others), the UPC isnt happening and isnt coming to the UK; it all amounts to lobbying (by setting false expectations)

THE EPO will never see the UPC. It would take a miracle and its a sure thing that Battistelli will have failed to see it materialising, except perhaps outside the EPO (some time in the very distant future, maybe under a different name). Do not be misled by Team UPCs hype. Theyre lobbying; theyre attempting to shape perception in order to influence the outcome. They have done this for nearly a decade. We know their tricks and we know who they are.

Theyre lobbying; theyre attempting to shape perception in order to influence the outcome. They have done this for nearly a decade. We know their tricks and we know who they are.Earlier today, in a paid self-promotional piece at IAM, Markus Herzog from Weickmann & Weickmann PartmbB insinuated that EPO scandals caused the demise of UPC (see last paragraph) or at least contributed to that.

To quote some of the closing words (coming from a UPC proponent):

While the EPOs Administrative Council, in an attempt to avoid a diplomatic conference, has endeavoured to strengthen the independence of the Boards of Appeal by amending the implementing regulations, certain aspects may still support Brosss position and strengthen the constitutional complaint.

However, the situation is less clear cut than the case decided by the Federal Administrative Court in 1959. Whether the independence of the Boards of Appeal prompted the Federal Constitutional Court to request that Steinmeier delay the signature of the UPC Agreement remains unclear.

This article (more like advert) is titled Constitutional complaint against UPC Agreement; this, at the moment, is the primary impediment to UPC and it can take years just to decide the merit of the complaint (at the moment they bicker about admissibility and some UPC zealots resort to ad hominem attacks against the complainant).

Tomorrow well likely to see the Brits...


The First Stubs For Direct3D 12 Are Now In Wine Git Phoronix

The first baby steps towards implementing Direct3D 12 in Wine are now present in the Git code-base for this week's Wine 3.2 release but it won't be anything remotely usable for a while...


This Vending Machine Gives Free Food To The Homeless Lifeboat News: The Blog

This free vending machine offers food and supplies to the homeless.


The EPOs Paid Promotion of Software Patents Gets Patent Maximalists All Excited and Emboldened Techrights

This (from earlier today) is part of a new hype wave

Patently German

Summary: The software patents advocacy from Battistelli (and his cohorts) isnt just a spit in the face of European Parliament but also the EPC; but patent scope seems to no longer exist or matter under his watch, as all he cares about is granting as many patents as possible, irrespective of real quality/legitimacy/merit

THE quality of patents at the EPO keeps sliding downwards and its related to scandals that result in brain drain and unreasonable pressures. Examiners complain that theyre unable to do their job properly.

A European Patent (EP) has just been upheld and the company behind it issued a press release to celebrate this. To quote:

Global visual technology market leader RealD Inc. announced today that the European Patent Offices (EPO) Opposition Division has upheld the validity of one of the Companys key patents for light-doubling 3D cinema projection systems.

The Opposition Division too is under pressure; its now dealing with literally thousands of oppositions (several times what it used to be) per year. One can imagine how many bogus ones have been granted since Battistelli entered the Office. Probably tens of thousands

Remember that not all bogus patents are being challenged because the process is tricky and expensive. Some bogus patents can end up in court and some alluded to in threatening legal letters (patent shake-down). IAM has just published this paid puff piece for Carpmaels & Ransford LLP. Its about British or European Patents that arent being renewed (or something similar).

As EPO insiders may have noticed, there has been barely any EPO press coverage so far this year. Earlier today we saw this article about Fourth Industrial Revolution a buzzword that Team Battistelli promotes by paying the media. The EPO by essentially bribing European media to promote software patents (under the Fourth Industrial Revolution banner/buzzword) s...


Guns and Robots - 143,569 breached accounts Have I been pwned? latest breaches

In approximately April 2016, the gaming website Guns and Robots suffered a data breach resulting in the exposure of 143k unique records. The data contained email and IP addresses, usernames and SHA-1 password hashes. The site was previously reported as compromised on the breached database directory.


Worlds Largest Plane Could Give Elon Musk The Space Race Hes Craving Lifeboat News: The Blog

Image: Stratolaunch Billionaires are taking to space the way wistful young men take to the sea in 19th Century novels. Last week, Elon Musk launched his Tesla Roadster at the astroid belt using the worlds most powerful rocket currently in operation. Not to be outdone, Microsofts co-founder Paul Allen also has a big plan (and a big plane) for going to space. In December of last year, the Stratolaunch performed its first taxi at the Mojave Air & Space Port in Mojave, CA. While that doesnt seem terribly exciting, its the first step to getting the Stratolaunch, the worlds largest plane eve


TVs are about to get bigger. Way bigger Lifeboat News: The Blog

Images and screen sizes are increasing in size every year. Heres what that looks like.


US Olympics Luge Team Looks To 3D Printing To Ice The Gold SoylentNews

The USA luge team is using 3D printing in its quest for gold.

It's teaming with Stratasys to 3D print tools that're employed in the making of racing sleds, which means not only the sled's body but also the "tower" at the front of a doubles sled where athletes position their legs.

This sled was built directly from prototypes that Stratasys designed and 3D printed.

Luge is a sport involving one- or two-person sleds that can reach speeds of nearly 90 miles per hour. Athletes race face-up and feet-first down an icy track. They steer the sled by either using their calves to flex the runners or by using their shoulders to shift their weight.

When a sled part is being made, a mold, also called a tool, is created to form the part's shape. Any design change in the sled calls for a new tool, which can normally take several weeks to create. But Stratasys was able to 3D print the tools for a sled in less than a week.

One of the biggest advantages to using 3D printing is customization. Traditionally, athletes would all use one generic sled. Now sleds can be made as long or as wide as an individual athlete, and in a fraction of the time.

"We need precision and we also need the ability to make tweaks, and 3D printing is where it's at for this kind of thing," said Gordy Sheer, marketing director for USA Luge and a 1998 doubles luge silver medalist. "As we learn more about aerodynamics and optimizing our designs, it's nice to be able to have the ability to make those changes quickly."

[...] Printing tooling for sleds is just the beginning. Dahl says they envision the whole sled could be 3D printed in the near future.

"There could be a point where you take a scan of the athlete," he said, "and you're able to print a sled that is custom and tailored to their body shape in the most optimal aerodynamics possible."

It all makes Sheer wish he'd had a sled with 3D printed components back when he was competing.

"These sleds are so much more advanced than when I was racing," he said.

Original Submission

Read more of this story at SoylentNews.


House panel approves FCC reauthorization The Hill: Technology Policy

The House Energy and Commerce Committee on Wednesday approved a bill reauthorizing funding for the Federal Communications Commission.The bill would allocate funds to television and radio broadcasters affected by the FCCs incentive auction, which...


[$] DIY biology

A scientist with a rather unusual name, Meow-Ludo Meow-Meow, gave a talk at 2018 about the current trends in "do it yourself" (DIY) biology or "biohacking". He is perhaps most famous for being prosecuted for implanting an Opal card RFID chip into his hand; the Opal card is used for public transportation fares in Sydney. He gave more details about his implant as well as describing some other biohacking projects in an engaging presentation.


Andrei Iancu Begins His USPTO Career While Former USPTO Director (and Now Paid Lobbyist) Keeps Meddling in Office Affairs Techrights

David Kappos cant keep out of affairs he has no business in (other than his lobbying business)

David Kappos
Source: David Kappos 2013 interview

Kappos PAI

Summary: The USPTO, which is supposed to be a government branch (loosely speaking) is being lobbied by former officials, who are now being paid by private corporations to help influence and shape policies; this damages the image of the Office and harms its independence from corporate influence

THERES one aspect at the US patent system which resembles EPO scandals.

Linking to his official new page, the USPTO has just announced Andrei Iancus arrival. It said: Its official! Andrei Iancu is the Under Secretary of Commerce for Intellectual Property and Director of the USPTO

On February 13, 2018, the USPTO issued 6,825 patents, including 6,152 utility patents Each signed by the new USPTO Director Andrei Iancu (albeit via automated electronic process), Crouch wrote some hours ago, having recently noted as did others that USPTO Budget Holds Steady at $3.4B under Trump Budget. Quoting Crouch:

The Trump proposed budget for FY2019 appears to be essentially flat as compared with FY2018. The proposed budget would permit the USPTO to spend up to $3.459 billion in FY 2019 (year beginning October 1, 2018). We are approaching the 1/2 way mark for FY 2018. In the most recent PPAC meeting, PTO Chief Financial Officer Tony Scardino reported expected FY2018 spending of $3.444 billion.

Watch how the USPTO spends its budget. Today theres this marketing video for Valentines Day, as covered by patent maximalists for the most part, e.g. [1...


Super Sensitive Sensor Sees What You Cant Lifeboat News: The Blog

Engineers at Dartmouth College have developed a computer chip that can detect a single particle of light. Cameras with the chip would have visual abilities even a superhero would envy.


Microsoft boosts Windows Analytics to help squash Meltdown and Spectre bugs Help Net Security

A day after Microsoft announced it will be adding Windows Defender ATP down-level support for older OSes comes the news that its Windows Analytics service is getting new capabilities aimed at helping businesses tackle Meltdown and Spectre vulnerabilities on machines in their fleet. What is Windows Analytics? Windows Analytics is a free telemetry analysis tool for business administrators. It is meant for guiding organizations through upgrading to and staying current on Windows 10 by providing More


CVE-2017-18188: opentmpfiles root privilege escalation via recursive chown Open Source Security

Posted by Michael Orlitzky on Feb 14

Product: opentmpfiles
Versions-affected: 0.1.3 and earlier (all)
Author: Michael Orlitzky

== Summary ==

The opentmpfiles program implements the tmpfiles.d specification for
POSIX systems that do not run systemd. When processing a "Z" type entry,
opentmpfiles calls chown recursively to change ownership of the target
directory and its contents. An attacker can introduce a hard...


AT-ST High Chair Elevates Lucky Jedi Youngling Hackaday

As a new parent, theres lots you have to do. You have to buy a car seat, get the babys room ready, figure out daycare; all the boring but unavoidable minutiae of shepherding a tiny human. But for the more creative types, that list might include warming up the 3D printer or putting a fresh bit in the CNC, as theres no better way to welcome a little one into the world than giving them some custom gear to get started with.

Thats certainly been the plan for [Matthew Regonini], whos been showering his son with DIY playthings. He recently wrote in to tell us about his awesome AT-ST high chair build that manages to turn the drudgery of getting a baby to eat into an epic worthy of a John Williams score.

This isnt the first time [Matthew] has turned dead trees into Imperial hardware. Last year we covered his fantastic AT-AT rocker which utilized the same construction techniques. The parts are cut out of plywood with his CNC, separated, cleaned up on a spindle sander, and finally assembled with wood glue and a few strategic fasteners. The depth and level of detail hes able to achieve when the individual pieces are stacked up is exceptionally impressive. If builds like these dont get...


Links 14/2/2018: Atom 1.24, OSI Joins UNESCO Techrights

GNOME bluefish



  • Desktop

    • Is it an upgrade, or a sidegrade?

      I went to a nearby store, looked at the offers And, in part due to the attitude of the salesguy, I decided not to (installing Linux will void any warranty, WTF In 2018). Came back home, and My Acer works again!

  • Server

    • Big Blue levels up server sextet with POWER9 for IBM i, AIX, HANA, Linux

      IBM is bashing out a set of go-faster POWER9 servers in the face of mounting competition from Xeon SP systems.

    • Your DevOps attempt will fail without these 7 departments buying in

      When DevOps was coined by Andrew Shafer and Patrick Debois, the goal was to bring developers and operators closer to achieve customer value together. DevOps is a culture of continuous learning and improvement. While automation and tools can garner some improvements, having the right culture drives larger impacts. The sharing of knowledge and ideas resulting in cultural growth is the value creator in DevOps.

    • Kubernetes The Smart Way

      Kelsey Hightower, Developer Advocate at Google, kicked off the KubeCon + CloudNativeCon event in Austin with an opening keynote in which he demonstrated Kubernetes ease of use with the help of his smartphone. Apart from commending the audience for making Kubernetes the boring-in-a-good-way framework it is today, Hightower also warned about how Kubernetes should not be considered the end game, but a means to an end.

      In his talk, Hightower first addressed the misconception that Kubernetes is difficult to install. He did so by installing an eight-node Kubernetes cluster in less than two minutes just by giving verbal instructions to the Kubernetes Engine assistant through his smartphone, thus proving t...


Major Browser Vendors to Restrict AppCache to Secure Connections SoylentNews

Submitted via IRC for TheMightyBuzzard

Mozilla on Monday was the first to make an official announcement, but the developers of Chrome, Edge and WebKit (the layout engine used by Apple's Safari) said they plan on doing the same.

AppCache is an HTML5 application caching mechanism that allows website developers to specify which resources should be available offline. This improves speed, reduces server load, and enables users to browse a site even when they are offline.

While application caching has some benefits, it can also introduce serious security risks, which is partly why it has been deprecated and its use is no longer recommended.


Original Submission

Read more of this story at SoylentNews.


Future of Intelligence (Ray Kurzweil) Lifeboat News: The Blog

MIT 6.S099: Artificial General Intelligence class takes an engineering approach to exploring possible research paths toward building human-level intelligence. The lectures introduce our current understanding of computational intelligence and ways in which strong AI could possibly be achieved, with insights from deep learning, reinforcement learning, computational neuroscience, robotics, cognitive modeling, psychology, and more.

Lex Fridman

Ray Kurzweil is one of the worlds leading inventors, thinkers, and futurists, with a thirty-year track record of accurate predictions. Called the restless genius by The Wall Street Journaland the ultimate thinking machine by Forbes magazine, Kurzweil was selected as one of the top entrepreneurs by Inc. magazine, which described him as the rightful heir to Thomas Edison. PBS selected him as one of the sixteen revolutionaries who made America.


Windows Analytics now includes Meltdown and Spectre detector Security Affairs

Good news for administrators of Windows systems, Microsoft has added a Meltdown-and-Spectre detector to its telemetry analysis tool Windows Analytics.

Microsoft has added a Meltdown-and-Spectre detector to its telemetry analysis tool Windows Analytics. The Meltdown-and-Spectre detector was available since Tuesday when Microsoft announced the new capabilities implemented in the free Windows Analytics service

The new capabilities allow admin to monitor:

  • Anti-virus Status: Some anti-virus (AV) software may not be compatible with the required Windows Operating System updates. This status insight indicates if the devices anti-virus software is compatible with the latest Windows security update.
  • Windows Operating System Security Update Status: This Windows Analytics insight will indicate which Windows security update is running on any device and if any of these updates have been disabled. In some cases, IT Administrators may choose to install the security update, but disable the fix. Our complete list of Windows editions and security updates can be found in our Windows customer guidance article.
  • Firmware Status  This insight provides details about the firmware installed on the device. Specifically, this insight reports if the installed firmware indicates that it includes the specific protections required. Initially, this status will be limited to the list of approved and available firmware security updates from Intel4. We will be adding other CPU (chipset) partners data as it becomes available to Microsoft.

The check for the status of the Operating System could allow admins to verify if Meltdown and Spectre patched are correctly working.

The antivirus check allows admins to verify if the running AV is compatible with required Windows Operating System updates.

The check for firmware status currently works only for Intel chips.



Wielaard: dtrace for linux; Oracle does the right thing

Mark Wielaard writes about the recently discovered relicensing of the dtrace dynamic tracing subsystem under the GPL. "Thank you Oracle for making everyones life easier by waving your magic relicensing wand! Now there is lots of hard work to do to actually properly integrate this. And I am sure there are a lot of technical hurdles when trying to get this upstreamed into the mainline kernel. But that is just hard work. Which we can now start collaborating on in earnest."


Intelligence officials warn Americans against buying Huawei and ZTE phones The Hill: Technology Policy

Intelligence agency officials are warning Americans against buying phones from Chinese companies Huawei and ZTE due to concerns they could be used to spy on people.FBI Director Christopher Wray said Tuesday that there is a...


AMD Vega 8 Graphics Performance On Linux With The Ryzen 3 2200G Phoronix

Yesterday I posted the initial Ryzen 5 2400G Vega 11 Linux graphics benchmarks while for your viewing please today -- as well as this morning's 21-way Intel/AMD CPU Linux comparison that featured these new Raven Ridge APUs -- the results now completed are initial OpenGL and Vulkan performance figures for the Vega 8 graphics found on the Ryzen 3 2200G.


Repairs You Can Print: Fixing Pegboard Clips That Break Too Easily Hackaday

Right now, were running the Repairs You Can Print Contest, where one lucky student and one lucky organization will win the fancy-schmancy Prusa i3 MK3, with the neato multi-extrusion upgrade. [Budiul] is a student, so he figured he would repair something with a 3D printer. Lucky for him, the pegboard in his workshop was completely terrible, or at least the pegboard hooks were. These hooks were made out of PVC, and after time, more and more hooks broke. The solution? Print his own, and make them stronger in the process.

Of course, replacing PVC pegboard hooks with ABS hooks really isnt that great of a solution. To fix this problem of plastic pegboard hooks for good, he printed the hooks in halves, with a channel running down the middle. This channel was filled with some steel wire and acetone welded together. The result is a fantastically strong pegboard hook that will hold up to the rigors of holding up some tools.

While printing out pegboard hooks might not seem like the greatest use of time, there are a few things going for this hack. Firstly, these arent the pegboard hooks made out of steel rod we all know and love; this is some sort of weird proprietary system that uses plastic molded hooks. If theyre made out of plastic anyway, you might as well print them. Secondly, being able to print your own pegboard hooks is a severely underrated capability. If youve ever tried to organize a workbench, youll know that youll never be able to find the right hook for the right spot. There is, apparently, a mystical superposition of pegboard hooks somewhere in the universe.

This is a great hack, and a great entry for the Repairs You Can Print contest. You can check out a video of the hack below.


How cybercriminals exploited Telegram flaw to deliver malware Help Net Security

A vulnerability in Telegrams desktop instant messaging client for Windows was exploited for months by Russian cybercriminals to deliver malware to users. Kaspersky Lab researchers discovered in October 2017 that the flaw which is actually more of a loophole, really was being actively exploited. They notified Telegram about the issue, and sometime between then and now the loophole was closed by the developers. We dont have exact information about how long and which More


FinFETs Shimmy to 5Gs Frequencies IEEE Spectrum Recent Content full text

Engineers make the fins of 14-nanometer FinFETs acoustically resonate to forge the building block of 5G oscillators, filters, and processor clocks Image: Purdue University

Engineers at Purdue University and GlobalFoundries have gotten todays most advanced transistors to vibrate at frequencies that could make 5G phones and other gadgets smaller and more energy efficient. The feat could also improve CPU clocks, make wearable radars, and one day form the basis of a new kind of computing. They presented their results today at the IEEE International Solid-States Circuits Conference, in San Francisco.

5G transceivers need two key components: oscillators and filters. Oscillators produce the frequency signal that is then modulated to carry data, while the filters allow the transceiver to tune in to specific channels. Both need components that can resonate at gigahertz frequencies.

Usually, to get such a high and stable frequency, you need a crystal oscillator, a device that resides outside the processor. Its megahertz-scale signal is then multiplied in successive stages by circuits called phase-locked loops to climb into the gigahertz region. The signal is then distributed around the chip. The setup consumes more power than designers would like, and because it has an extra component, it takes up more space than youd want.

Youd get much better performance if you start with a good oscillator at 32 GHz instead of multiplying, says Bichoy Bahr, who worked on the resonator technology while pursuing his PhD in the laboratory of Dana Weinstein. For that, you want a componentideally something tiny that can be integrated on the same silicon as the radio chipthat resonates at the frequency you want.

Taking their cue from tuning forks, engineers have tried integrating resonators using microelectromechanical systems. These have components tuned to physically vibrate at a particular frequency and produce a useable electronic signal. But they have limitations. Most require different processing than the CMOS chip theyre on, so they have been built either atop the finished chip or embedded inside the wiring layers above the silicon.

Weinsteins group instead found a way to make a MEMS resonator using the CMOS transistors themselves. Leading-edge chips today rely on FinFETs, transistors where the current flows through a protruding 3D fin of silicon. Current is controlled through a gate electrode that drapes over the fin but is separated from it by a thin layer of dielectric.



FTC nominees promise a focus on data breaches The Hill: Technology Policy

President Trumps slate of nominees for the Federal Trade Commission (FTC) plans on making data breaches a top priority for the agency if they are confirmed.Theyre becoming much more significant, much more frequent, and I think thats a real...


NIH Contributed to Research Related to Every One of 210 Newly Approved Drugs SoylentNews

An analysis of research papers has found that the National Institutes of Health (NIH) provided funding to the research of 210 new drugs that were approved from 2010 and 2016:

A new study makes a strong case for the importance of government support for basic research: Federally funded studies contributed to the science that underlies every one of the 210 new drugs approved between 2010 and 2016.

Researchers at Bentley University scoured millions of research papers for mentions of those 210 new molecular entities, or NMEs, as well as studies on their molecular targets. Then, they looked to see which of those studies had received any funding from the National Institutes of Health.

The authors say the study, published Monday in Proceedings of the National Academy of Sciences, is the first to capture the full scope of public funding behind FDA-approved drugs, both directly and indirectly. They also say it points to the need for continued federal funding for basic science which the Trump administration has previously suggested slashing.

"Knowing the scale of the investment in the basic science leading to new medicines is critical to ensuring that there is adequate funding for a robust pipeline of new cures in the future," said Dr. Fred Ledley, one of the study's authors and a Bentley University researcher who studies the intersection of science and industry.

Contribution of NIH funding to new drug approvals 20102016 (open, DOI: 10.1073/pnas.1715368115) (DX)

Original Submission

Read more of this story at SoylentNews.


[$] A report from the Enigma conference

The 2018 USENIX Enigma conference was held for the third time in January. Among many interesting talks, three presentations dealing with human security behaviors stood out. This article covers the key messages of these talks, namely the finding that humans are social in their security behaviors: their decision to adopt a good security practice is hardly ever an isolated decision.

Subscribers can read on for the report by guest author Christian Folini.


GNOME 3.28 Beta Released With Many Improvements Phoronix

Following a slight delay, the beta release of GNOME 3.28 is now available ahead of next month's official release...



[$] Authentication and authorization in Samba 4

Volker Lendecke is one of the first contributors to Samba, having submitted his first patches in 1994. In addition to developing other important file-sharing tools, he's heavily involved in development of the winbind service, which is implemented in winbindd. Although the core Active Directory (AD) domain controller (DC) code was written by his colleague Stefan Metzmacher, winbind is a crucial component of Samba's AD functionality. In his information-packed talk at FOSDEM 2018, Lendecke said he aimed to give a high-level overview of what AD and Samba authentication is, and in particular the communication pathways and trust relationships between the parts of Samba that authenticate a Samba user in an AD environment.



Hovercraft of the Future Hackaday

We think of hovercraft as a modern conveyance. After all, any vision of the future usually includes hovercraft or flying cars along with all the other things we imagine in the future. So when do you think the hovercraft first appeared? The 1960s? The 1950s? Maybe it was a World War II development from the 1940s? Turns out, a human-powered hovercraft was dreamed up (but not built) in 1716 by [Emanuel Swedenborg]. You can see a sketch from his notebook below. OK, thats not fair, though. Imagining it and building one are two different things.

[Swedenborg] realized a human couldnt keep up the work to put his craft on an air cushion for any length of time. Throughout the 1800s, though, engineers kept thinking about the problem. Around 1870, [Sir John Thornycroft] built several test models of ships hulls that could trap air to reduce drag an idea called air lubrication, that had been kicked around since 1865. However, with no practical internal combustion engine to power it, [Thornycrofts] patents didnt come to much. In America, around 1876 [John Ward] proposed a lightweight platform using rotary fans for lift but used wheels to get forward motion. Others built on the idea, but they still lacked the engines to make it completely practical.

But even 1940 is way too late for a working hovercraft. [Dagobert Mller] managed that in 1915. With five engines, the craft was like a wing that generated lift in motion. It was a warship with weapons and a top speed of around 32 knots, although it never saw actual combat. Because of its physical limitations it could only operate over water, unlike more modern craft.



Pirate Kodi Addon Devs & Distributors Told to Cease-and-Desist TorrentFreak

Last November, following a year of upheaval for third-party addon creators and distributors, yet more turmoil hit the community in the form of threats from the worlds most powerful anti-piracy coalition the Alliance for Creativity and Entertainment (ACE).

Comprised of 30 companies including the studios of the MPAA, Amazon, Netflix, CBS, HBO, BBC, Sky, Bell Canada, CBS, Hulu, Lionsgate, Foxtel, Village Roadshow, and many more, ACE warned several developers to shut down or else.

The letter: shut down or else

Now it appears that ACE is on the warpath again, this time targeting a broader range of individuals involved in the Kodi addon scene, from developers and distributors to those involved in the production of how-to videos on YouTube.

The first report of action came from TVAddons, who noted that the lead developer at the Noobs and Nerds repository had been targeted with a cease-and-desist notice, adding that people from the site had been visited at their homes.

As seen in the image below, the Noobs and Nerds website is currently down. The sites Twitter account has also been disabled.

Noobs and Nerds gone

While TVAddons couldnt precisely confirm the source of the threat, information gathered from individuals involved in the addon scene all point to the involvement of ACE.

In particular, a man known online as Teverz, who develops his own builds, runs a repo, and creates Kodi-themed YouTube videos, confirmed that ACE had been in touch.

An apparently unconcerned Teverz.

I am not a dev so they really dont scare me lmao, he added.

Teverz claims to be from Canada and it appears that others in the country are also facing cease and desist notices. An individual known as Doggmatic,...



FCC chair backs SpaceX plan to provide broadband by satellite The Hill: Technology Policy

Federal Communications Commission Chairman Ajit Pai is backing a proposal from Elon Musk's SpaceX to provide broadband using satellites.To bridge Americas digital divide, well have to use innovative technologies," Pai said in a statement...


Barnes & Noble's "Bloody Monday" SoylentNews

On Monday, February 12th, Barnes & Noble fired a number of employees.

From CNBC:

Barnes & Noble is trimming its staff, laying off lead cashiers, digital leads and other experienced workers in a company-wide clearing, CNBC has learned from sources familiar with the matter.

The news came abruptly for many workers who showed up Monday morning at various Barnes & Noble locations to be notified that they no longer had a job, the people said. The number of affected workers couldn't immediately be determined. As of April 29 of last year, Barnes & Noble employed about 26,000 people.

"[Barnes & Noble] has been reviewing all aspects of the business, including our labor model," a spokeswoman told CNBC about the layoffs. "Given our sales decline this holiday, we're adjusting staffing so that it meets the needs of our existing business and our customers. As the business improves, we'll adjust accordingly."

From The Digital Reader:

The initial report said B&N had fired "lead cashiers, digital leads, and other experienced workers", but what that report missed - and why this was worth bringing up a day later - was that B&N also fired nearly all of its receiving managers in what current and ex-employees are calling Bloody Monday.

[...] When B&N fires a digital sales lead, it means they'll sell fewer Nooks. This is no big deal given how B&N's digital revenues have fallen since 2013. When B&N fires a head cashier, it means you're in for longer waits at the register.

But when B&N fires its receiving managers, it means that B&N won't have the merchandise to sell you because the person who was responsible for making sure shelves get stocked does not work there any more.

Previously: Barnes & Noble Reports Holiday Revenues Down
Barnes & Noble Pivots to Books

Original Submission

Read more of this story at SoylentNews.


Trumps Science Advisor, Age 31, Has a Political Science Degree Lifeboat News: The Blog

The dumbing down of society starts.

Because Trump has not nominated someone to head the Office of Science and Technology Policy, Michael Kratsios is the de facto leader.


School Principal Gets 9 Years in Prison for Trading Nude Pictures of Students HackRead

By Carolina

An ex-Kentucky high school principal Stephen Kyle Goodlett has been

This is a post from Read the original post: School Principal Gets 9 Years in Prison for Trading Nude Pictures of Students


Several Injured Outside NSA Headquarters in Fort Meade SoylentNews

There has been a "security incident" at the entrance to the NSA's headquarters in Fort Meade, Maryland:

Several people have been injured and a suspect was taken into custody after a car crashed outside the US National Security Agency's headquarters.

Gunfire rang out after the black SUV approached the facility in Fort Meade, Maryland, without authorisation.

An NSA spokesman said it was unclear if the shots had been fired by law enforcement officers or the suspect, adding that the scene was now secure.

Also at Reuters, CBS, The Hill, and Vice.

Original Submission

Read more of this story at SoylentNews.


Accurate Navigation Without GPS IEEE Spectrum Recent Content full text

Circuit keeps up to 5.5-meter accuracy after 3 kilometers Photo: Qingbo Guo

The global positioning system can locate you within 5 to 10 meters anywhere on Earthas long as your receiver is in the line of sight of multiple satellites. Getting location information indoors is tricky. A team at the University of Utah has now put the solution underfoot: A suite of sensors and circuits mounted to a boot can determine position with an accuracy of about 5 meters, indoors or out, without GPS.

The navigation system, installed in a very hefty prototype boot, could help rescue workers navigate inside buildings, and show firefighters where their team members are. It might also be integrated with virtual or augmented reality games. The Utah researchers presented their GPS-free navigation system on Tuesday at the International Solid-State Circuits Conference in San Francisco.

The Utah groups navigation system is built on an inertial measurement unit or IMUa little black box containing a gyroscope, magnetometer, and accelerometer. High-end systems of this kind help airplane pilots navigate. Darrin Young, an electrical engineer at the University of Utah, wanted to make it possible to use an IMU in portable electronics. But readings from cheap versions of these sensors drift over time, and errors can accumulate rapidly. If youre sitting still the reading should be zero, says Young. But after five or ten minutes sitting in a chair, the low-end IMU might think you have moved a few hundred feet away.

Left: Qingbo Guo walking outdoors with the system; Right: Labeled diagram of the boot. Photos: Qingbo Guo

Young asked graduate student Qingbo Guo to figure out a way to keep these sensors calibrated. Guo found the solution in biomechanics. During each step, the heel is anchored to the ground for about 100 milliseconds. Guo figured out how to measure this instant of stillness, and use that to correct for the false motion in drifting data from the IMU. You reset the position calculation with every step, so you do not accumulate error, says Young.

Guo designed a flexible MEMS pressure sensor to place under the insole of a boot with an IMU. He calculated that the system needed about 1000 sensors to get accurate readings (and provide redundancy in case some sensors broke underfoot), and built a custom circuit to combine data from the IMU and the pressure sensors, and designed the necessary algorithms. In the pro...

Friday Hack Chat: Making A Makerspace Hackaday

How do you make a makerspace? Over the last decade, there have been plenty of talks and tutorials handing out pointers. No day of the week will be good for a meeting, so the meetings are always on Tuesdays. The bike shed will be painted orange, no exceptions. Are you going to be a for-profit, or not-for-profit? Are we a makerspace or a hackerspace? Jerry, stop being clever. Pantone 021 U.

For this weeks Hack chat, were going to be talking all about making a makerspace. These are community hubs where people come together and share resources to bring their inventions to life. Its not as simple as it may seem. You need insurance, you need a building, you need a landlord whos cool, and there are a thousand and one things that can go wrong. Who best to steer you through the storm of opening a Hackerspace? Who can you solicit advice from?

Our guests for this weeks Hack Chat are Vaibhav Chhabra, a mech E from Boston University. He spent two years working on an eye diagnostic device, is an instructor at MIT REDX health care innovation lab, and is a founder of the incredible Makers Asylum. Eric Michaud is a Hacker, runner, and author, cu...


Hicky Will Make Sure No One Flakes Out on You, Ever TechWorm

Online dating has become a normative, even fundamental part of the modern dating experience. Last year, the Pew Research Center found that people now say online dating is a good way to meet people.

This makes sense. We use our technology to improve our ability to do almost everything else in our lives, so why not use it to help us find the best partner as well? Tens of millions of people have adopted this ethos, and, as a result, they are logging into popular dating services like, eHarmony, and Tinder each day.

While these platforms are unquestionably popular, they are not perfect. They are ready for a next-generation platform to take the trend that they started in 1995 and to perfect it for the modern audience.

Hicky, a blockchain-based dating service, looks to be that next-generation platform that allows the swarming online dating scene to thrive in a new and better way.

Introducing Hicky

Based on the Ethereum blockchain, Hicky is the first dating service to be hosted on the popular platform. Moreover, its the first blockchain dating app to have a working demo in the app store. Their goal is to improve upon the progress that centralized dating websites have made in the past twenty years.

Using the native Hicky token, Hicky combines essential components of real-world interactions with the tokenized, digital economy to create a compelling platform that revolutionizes the dating scene.

Meet the Team

Hicky is backed by a development team thats experienced in the online dating scene. Collectively, they boast more than a decade of experience in the dating scene. Hickys core developers arent new to the blockchain space either. Although its popularity has surged in the past year, Hickys developers collectively bring nearly a decade of blockchain-oriented experience to their platform.

Hicky Will Make Sure No One Flakes Out on You, Ever

In addition, Hicky has several strategic partnerships that are helping proliferate their platform. Most notably, Hermione Way, a former Tinder executive, sits on their board of directors. Hicky has also...


AMD Ryzen 3 2200G + Ryzen 5 2400G Linux CPU Performance, 21-Way Intel/AMD Comparison Phoronix

Yesterday I posted some initial Linux benchmarks of the Ryzen 5 2400G Raven Ridge APU when looking at the Vega 11 graphics, but for those curious about the CPU performance potential of the Ryzen 5 2400G and its ~$100 Ryzen 3 2200G sibling, here are our first CPU benchmarks of these long-awaited AMD APUs. These two current Raven Ridge desktop APUs are compared to a total of 21 different Intel and AMD processors dating back to older Kaveri APUs and FX CPUs and Ivy Bridge on the Intel side.


Phoronix Test Suite 7.8 Officially Released For Open-Source, Cross-OS Benchmarking Phoronix

Phoronix Test Suite 7.8.0-Folldal is now officially available as the first quarterly update to our open-source benchmarking software of 2018 and the last major release prior to the big Phoronix Test Suite 8.0 milestone slated for this summer...


AT&T wants Trump antitrust chief to testify in merger trial: report The Hill: Technology Policy

AT&T wants to call the Justice Department's top antitrust official as a witness in the trial over its proposed $85 billion merger with Time Warner, according to The New York Times.AT&T is asking for Justice Department antitrust...


Security updates for Wednesday

Security updates have been issued by Arch Linux (exim and mpv), Debian (advancecomp and graphicsmagick), Red Hat (collectd, erlang, httpd24-apr, openstack-aodh, and openstack-nova), SUSE (kernel and xen), and Ubuntu (libvorbis).


Tearing Down a $1000 E-Ink Display Hackaday

Back in 2016, Chinese company Dasung blew past their Indiegogo goal to fund the Paperlike: the worlds first general purpose E-Ink display. Rather than being stuck in a reader from your favorite purveyor of DRM like previous displays, the Paperlike could be used with whatever device you wanted; albeit in black and white and at a relatively low refresh rate. It promised to allow reading and writing on your computer or tablet without needing a backlight. The price was steep at $800 USD for a 13 display, but clearly enough people were interested to make the device a reality.

At least they have a sense of humor about it.

You can count [Kev Zettler] among the Paperlike devotees. Hes such a fan of the technology that hes on the road to building a DIY E-Ink laptop using the latest generation Paperlike Pro. But before he can do that, hes got to take the thing apart and see how it ticks. While a lot of the proprietary magic that makes the display work is still a mystery, he does his best to document the internals for those of us who are a bit to shy to take a screwdriver to a display that costs $1,000.

It looks like the Paperlike...


NASA Scientist Sentenced to 7.5 Years in a Turkish Prison SoylentNews

A Turkish-American NASA scientist who visited his family during the 2016 coup has been sentenced to 7.5 years in prison on terrorism charges:

Serkan Golge, a Turkish-American research scientist at NASA in Houston, Texas, was sentenced to 7.5 years in a Turkish prison Thursday on terrorism charges. The verdict, which has been condemned by the U.S. government, has put his career on hold and left his family and friends reeling. "I feel like this cannot be real," his wife Kubra Golge, who was inside the courtroom when her husband's verdict was read, tells Science.

At a press briefing in Washington, D.C., on Thursday, a spokesperson for the U.S. Department of State said the United States is "deeply concerned" by Golge's conviction, which came "without credible evidence." The spokesperson said the U.S. government would continue to follow his case closely. A spokesperson for Turkey's foreign ministry dismissed the criticism in a statement posted to its website and said the court's decision must be respected.

Golge, a dual citizen who had been studying the effects of radiation on astronauts, was swept up in a crackdown that followed Turkey's 2016 failed military coup. While visiting family in southern Turkey weeks after the putsch attempt, police showed up to his parents' home and arrested him in front of his wife and children. According to Golge's wife, a distant relative who was angered over an inheritance dispute told police Golge was a spy and supporter of Fethullah Glen, the Islamic cleric who Turkey accuses of masterminding the coup.

Original Submission

Read more of this story at SoylentNews.


Endor Protocol democratizes the Prediction Industry using Blockchain and AI TechWorm

The ability to make accurate predictions is one of the most crucial elements differentiating the worlds top successful companies and investors from others who operate with limited clarity about future events.

The ability of the bigger and more established tech-giants in achieving accuracy in the business of prediction lie within some established factors. These factors include; access to scarce and extensive data science PhDs, proper models per prediction, unlimited access to expensive and limited scales among others. Therefore, the exclusivity of these factors entails that the same group who retain access to them continue to enjoy the inherent benefits, while smaller groups remain sidelined, and depend on natural probabilities most of the time for their forecasts.

Disruption using blockchain and AI

All this is about to change as Endor leverages on the possibilities provided by blockchain technology and AI to close the gap between the big and small players within the industry. This new protocol makes it possible for any individual or group to be able to ask questions and get accurate predictions. It is described as the Google for predictive analytics.

This new development by Endor that is powered by blockchain and social physics technology will further democratize predictive science, enabling an ecosystem that provides automated, accurate, affordable predictions for individuals and businesses. This MIT powered Social Physics technology provides up to X10 higher accuracy for trends prediction. While protocols like Argur uses the wisdom of the crowd, the Endor protocol is based strictly on science and data analysis.

A superior team of experts

Endor is Spearheaded by a team of world experts in blockchain, digital banking technologies and predictive analytics from MITs Computer Science and Artificial Intelligence Lab, the MIT Media Lab and MIT Sloan School of Management.

Prof. Pentland (co-founder), a member of the U.S. National Academy of Engineering, is one of the worlds most-cited scientists, and was recently declared by Forbes as the 7 most powerful data scientists in the world. The team has collectively published hundreds of scientific papers, dozens of commercial patents, as well as 8 books dedicated to blockchain, machine intelligence, and data privacy.

Introducing a new era

As the worlds first prediction protocol that enables an ecosystem that provides automated, accurate and affordable predictions for individuals and businesses, Endor uses the power of social physics to break existing paradigm. Instead of building a model per each predi...


Patch now! Microsoft fixes over 50 serious security flaws Graham Cluley

Patch now! Microsoft fixes over 50 serious security flaws

This week saw the second Tuesday of the month, and everyone who is responsible for protecting Windows computers knows what that means: another bundle of security patches have been released by Microsoft.

Read more in my article on the We Live Security blog.


Multiple vulnerabilities in Jenkins Open Source Security

Posted by Daniel Beck on Feb 14

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software. The following
releases contain fixes for security vulnerabilities:

* Jenkins (weekly) 2.107
* Jenkins (LTS) 2.89.4

Summaries of the vulnerabilities are below. More details, severity, and
attribution can be found here:

We provide advance notification for...


Flaw in Telegram Windows App Used for Cryptomining & Backdoor HackRead

By Waqas

Another day, another popular app compromised to drop backdoor and conduct

This is a post from Read the original post: Flaw in Telegram Windows App Used for Cryptomining & Backdoor


Hackers Exploiting 'Bitmessage' Zero-Day to Steal Bitcoin Wallet Keys The Hacker News

Bitmessage developers have warned of a critical 'remotely executable' zero-day vulnerability in the PyBitmessage application that was being exploited in the wild. Bitmessage is a Peer-to-Peer (P2P) communications protocol used to send encrypted messages to users. Since it is decentralized and trustless communications, one need-not inherently trust any entities like root certificate


Mechanisms: Bearings Hackaday

They lie at the heart of every fidget spinner and in every motor that runs our lives, from the steppers in a 3D printer to the hundreds in every car engine. They can be as simple as a lubricated bushing or as complicated as the roller bearing in a car axle. Bearings are at work every day for us, directing forces and reducing friction, and understanding them is important to getting stuff done with rotating mechanisms.

Rolling-Element Bearings

Roller bearing. Source: Machine Design

What first pops to mind when using the term bearing is probably something from the broad category of rolling-element bearings, like roller bearings or ball bearings. Weve all seen them before tough steel balls or cylinders trapped between two grooved tracks. Legend has it that Leonardo da Vinci invented ball bearings in the 1500s, but like many of his drawings, no practical implementation would be attempted for hundreds of years until advancements in material science and engineering caught up with his original vision.

Rolling-element bearings rely on rolling elements constrained bet...


Protecting Code Integrity with PGP Part 1: Basic Concepts and Tools

Protecting Code Integrity with PGP Part 1: Basic Concepts and Tools


The Last Of The MPEG-2 Patents Have Expired Phoronix

Just like with the recent expiry of the MP3 patents and AC3, the last of the MPEG-2 patents have now expired...


A Better Marketing Plan for Your Open Source Software Project

Open source software (OSS) marketing today is unique: its a process of co-creating and co-executing a marketing plan with an entire communitydevelopers, end users and vendors. This makes it distinctly different than most traditional technology marketing efforts, which generally focuses on business decision-makers exclusively.


Airtop2 Inferno Offers i7-7700K + GeForce GTX 1080 While Being Fanless Phoronix

Two years ago we reviewed the CompuLab Airtop as an interesting, industrial-grade, fanless PC that packed in high-end hardware of the time and worked out great initially and continues doing a phenomenal job at passively cooling the PC while running in our benchmark lab. CompuLab has now announced the Airtop2 and Airtop2 Inferno that is an even more impressive cooling feat...


Salon Asks Ad-Blocking Users to Mine Cryptocurrency SoylentNews

The news outlet Salon is allowing Adblock-using visitors to opt-in to using the JavaScript-based Coinhive tool to mine the cryptocurrency Monero:

Other sites have used cryptocurrency mining in lieu of (or in addition to) advertising. Sometimes, it's done surreptitiously without users' consent The Pirate Bay admitted to secretly adding Coinhive integration last year, and hackers have planted mining malware on other sites. In this case, it's an opt-in program; a spokesperson tells FT that testing started on Monday.

Salon has an FAQ explaining this move.

Also at Ars Technica.

Related: Showtime Streaming Service Included JavaScript to Mine Cryptocurrency Using Web Browsers
PolitiFact Hacked to Mine Cryptocurrency Using Visitors' Web Browsers
Wi-Fi at Starbucks Buenos Aires Has Computers Mine Crypto-Currency
Bitcoin Hype Pushes Hackers to Lesser-Known Cryptocurrencies
Thousands of Websites Hijacked by Hidden Crypto-Mining Code After Popular Plugin Pwned

Original Submission

Read more of this story at SoylentNews.


Crypto Cash: The 4 Best Bitcoin Wallets for New Traders Lifeboat News: The Blog

New to the wide world of cryptocurrency? Keep your coins safe and access your private keys the smart way with these Bitcoin wallets.


Microsoft Patch Tuesday for February 2018 addresses 14 critical flaws Security Affairs

Microsoft Patch Tuesday for February 2018 addressed a total of 50 vulnerabilities in affecting Windows operating system, Microsoft Office, web browsers and other products of the tech giant.

Fourteen issues are listed as critical, 34 are rated as important, and only two of them are rated as moderate in severity.

The list of critical vulnerability includes an information disclosure issue in the Edge browser, a remote code execution vulnerability in the Windows StructuredQuery component, a memory corruption in Outlook,  and several memory corruptions flaws that reside into the scripting engines used by both Edge and Internet Explorer.

One of the most severe vulnerabilities addressed by the Microsoft Patch Tuesday for February 2018 is a memory corruption flaw tracked as CVE-2018-0852 that affects Microsoft Outlook. The flaw could be exploited to achieve remote code execution on the targeted machines.

A remote code execution vulnerability exists in Microsoft Outlook when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. reads the security advisory published by Microsoft. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

In order to trigger the flaw, an attacker can trick the victim into opening a specifically crafted message attachment or viewing it in the Outlook Preview Pane yes simply viewing an email in the Preview Pane could allow code execution.



Five Noteworthy Open Source Projects

The open-source movement has gained momentum over the last few years. So much so that The Linux Foundation recently formed the LF Networking Fund (LFN) in an effort to place multiple open source networking projects under a single umbrella. These types of projects allow virtually anyone to make modifications, and potentially improve, software code through a process called upstreaming.


Tickbox Must Remove Pirate Streaming Addons From Sold Devices TorrentFreak

Online streaming piracy is on the rise and many people now use dedicated media players to watch content through their regular TVs.

This is a thorn in the side of various movie companies, who have launched a broad range of initiatives to curb this trend.

One of these initiatives is the Alliance for Creativity and Entertainment (ACE), an anti-piracy partnership between Hollywood studios, Netflix, Amazon, and more than two dozen other companies.

Last year, ACE filed a lawsuit against the Georgia-based company Tickbox TV, which sells Kodi-powered set-top boxes that stream a variety of popular media.

ACE sees these devices as nothing more than pirate tools so the coalition asked the court for an injunction to prevent Tickbox from facilitating copyright infringement, demanding that it removes all pirate add-ons from previously sold devices.

Last month, a California federal court issued an initial injunction, ordering Tickbox to keep pirate addons out of its box and halt all piracy-inducing advertisements going forward. In addition, the court directed both parties to come up with a proper solution for devices that were already sold.

The movie companies wanted Tickbox to remove infringing addons from previously sold devices, but the device seller refused this initially, equating it to hacking.

This week, both parties were able to reach an agreement on the issue. They drafted an updated preliminary injunction which replaces the previous order and will be in effect for the remainder of the lawsuit.

The new injunction prevents Tickbox from linking to any build, theme, app, or addon that can be indirectly used to transmit copyright-infringing material. Web browsers such as Internet Explorer, Google Chrome, Safari, and Firefox are specifically excluded.

In addition, Tickbox must also release a new software updater that will remove any infringing software from previously sold devices.

TickBox shall issue an update to the TickBox launcher software to be automatically downloaded and installed onto any previously distributed TickBox TV device and to be launched when such device connects to the internet, the injunction reads.

Upon being launched, the update will delete the Subject [infringing] Software downloaded onto the device prior to the update, or otherwise cause the TickBox TV device to be unable to access any Subject Software downloaded onto or accessed via that device prior to the update.

All tiles that link to copyright-infringing software from...


Silicon Nanostructures Bend Light to Make Faster Photodiodes IEEE Spectrum Recent Content full text

Speedy silicon photodiodes are one of the missing ingredients to silicon photonics systems Image: Hilal Cansizoglu/University of California, Davis

There are some things silicon doesnt do well. It neither absorbs nor emits light efficiently. So, silicon photonics systems, which connect racks of servers in data centers via high-data rate optical fiber links, are dependent on photodiode receivers made of germanium or other materials to turn optical signals into electronic ones. Saif Islam, professor of electrical and computer engineering at University of California Davis, and colleagues have come up with a way for silicon photodiodes to do the job, potentially driving down the cost of optical computer-to-computer communications.

The difficulty for silicon photodiodes, explains Islam, is the trade-off between speed and efficiency. When a photon is absorbed in a photodiode, it becomes an electron and a hole (a positive charge), which must then travel to the devices anode and cathode to produce current. The thicker the absorption region, the more likely a photon is to be absorbed, increasing efficiency. But thinner regions have a speed advantage: When you make it very thin, your electrons and holes take little time to reach the electrical terminals. And that speeds up the photodiodes switching speed and the systems data rate.

Islam and his colleagues came up with a silicon structure that makes photodiodes both fast and efficient by being both thin and good at capturing light. The structure is an array of tapered holes in the silicon that have the effect of steering the light into the plane of the silicon. So basically, were bending light 90 degrees, he says.

Optical microscope image of the photodiode structure lookks like the end of a hairpin with many black dots in the middle. Image: Hilal Cansizoglu/University of California, Davis Nanoholes bend light into the photodiode.

Ordinarily, most light would pass through the photodiode, with only a few percent of photons captured and turned into electricity. But by steering photons into the specially-structured photodiode, the light spends more time interacting with it instead of falling straight through it, leading to higher efficiency. Because the light is traveling the photodiodes length, not its thickness, the device can be made thin and therefore speedy.  

Using data from these photodiodes, Islam calculates that it could help a single silicon transceiver operate at 60 gigabits per secon...


Ubuntu 18.04 LTS Landing Mesa 18.0, Enabling GLVND Phoronix

Ubuntu developers are in the process of landing Mesa 18.0 within the "Bionic Beaver" archive for the upcoming 18.04 LTS distribution release. In the process they are also enabling GLVND for allowing the Mesa and NVIDIA proprietary drivers more happily co-exist on the same system...

Wednesday, 14 February


Gene Activity After Death Could be Used for Forensic Investigations SoylentNews

A team of scientists have found that changes in gene activity in human tissue after death could be used to determine the time of death:

Computational biologist Roderic Guig didn't start out as a death detective. Guig, of the Centre for Genomic Regulation in Barcelona, Spain, is also part of the Genotype-Tissue Expression (GTEx [open, DOI: 10.1126/science.1262110] [DX]) pilot, a large consortium of geneticists and molecular biologists that has been measuring gene activity in tissues from hundreds of people, living and dead. The goal is to determine how the body makes different cells do different things, given that they all carry the same DNA instructions. It also seeks to determine how slight variations in DNA from person to person change what cells do. Other researchers have already shown that some genes stay active up to 4 days after death. Guig wanted to find out how gene activity changes as the time to preservation is extended.

He and his colleagues looked at 9000 samples of 36 tissues, "an impressive data set," Tagkopoulos says. Each sample included data on the time between the death of the donor and the preservation of the sample. Each tissue has a distinct pattern of increases and decreases in gene activity over time, and these changes can be used to backtrack to the time of death [open, DOI: 10.1038/s41467-017-02772-x] [DX], the team reports today in Nature Communications.

Also at BBC.

Original Submission

Read more of this story at SoylentNews.


Defense in depth -- the Microsoft way (part 52): HTTP used to distribute (security) updates, not HTTPS Bugtraq

Posted by Stefan Kanthak on Feb 14

Hi @ll,

yesterdays "Security update deployment information: February 13, 2018"
<> links the following
MSKB articles for the security updates of Microsoft's Office products:


[security bulletin] MFSBGN03800 rev.1 - Micro Focus Performance Center, Remote Arbitrary Code Execution or Remote Arbitrary File Modification Bugtraq

Posted by cyber-psrt on Feb 14


Document ID: KM03091103
Version: 1

MFSBGN03800 rev.1 - Micro Focus Performance Center, Remote Arbitrary Code
Execution or Remote Arbitrary File Modification

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.



A Perfect Rose, a Stepper, an X-Ray Machine, and Thee Hackaday

The Day of Compulsory Romance is once more upon us, and in recognition of that fact we submit for your approval an alternative look at one of the symbols of romantic love: an X-ray of a rose.

Normally, diagnostic X-rays are somewhat bland representations of differential densities of the tissues that compose various organs and organ systems, generally rendered in shades of gray. But [Linas K], a physicist with time to kill and access to some cool tools, captured the images in the video below not only in vivid color, but as a movie. The imaging side of the project consists of a low-power X-ray tube normally used for non-clinical applications and a CMOS sensor panel. The second video shows that [Linas] did an impressive upgrade on the X-ray controller, rolling his own from an FPGA. This allowed him to tie in a stepper motor to rotate the rose incrementally while taking images which he stitched together in post.

Watching the interior structure of the flower as it spins is fascinating and romantic in its own right, for certain subsets of romance. And really, who wouldnt appreciate the work that went into this? But if you dont have access to X-ray gear, fear not a lovely Valentines gift is only a bottle of ferric chloride away.



Initial Icelake Support Heading To Linux 4.17, Many Bug Fixes Thanks To CI Testing Phoronix

Now that the Linux 4.16 merge window ended this past weekend, Intel has submitted their first pull request to DRM-Next of material they want to get in for Linux 4.17...


The Best Rising Linux Distros in 2018

Linux is built for tinkering and experimentation, which means its always morphing and changing. New distros are popping up all the time, because all it takes is a little bit of determination, time and effort to create a custom operating system.

Not all of them hit the mark there are stacks of Linux distros that have seen little to no action, and were almost certain that some have been released and never installed by anyone other than their creator.

So lets look at our pick of the five distros moving up swiftly through the ranks in 2018. 


Experts fear US losing ground to China on AI The Hill: Technology Policy

Chinas public intention to become the world leader in the development of artificial intelligence has many in the United States questioning what the U.S. government is doing to protect the countrys dominant position in the AI race.U.S. technology...


The History of the Service Mesh

The idea of a service mesh is still a fairly new concept for most people, so it may seem a little funny to already be talking about its history. But at this point Linkerd has been running in production by companies around the world for over 18 months an eternity in the cloud-native ecosystem and we can trace its conceptual lineage back to developments that happened at web-scale companies in the early 2010s. So theres certainly a history to explore and understand.


Julia vs R vs Python: Simple Optimization

In this post, I will try to compare and contrast Julia, R, and Python via a simple maximum likelihood optimization problem which is motivated by a problem from the credit risk domain and is discussed in more detail in this post.


For such a simple optimization problem, R, Julia, and Python/SciPy will all do a competent job, so there is no clear winner. However as noted by Julia discourse member ChrisRackauckas


Canon selects Vera to secure the future of digital imaging and printing Help Net Security

Canon has selected Vera to secure and protect Canons fleet of digital imaging and printing products and services. This partnership will help enterprises protect their intellectual property and business information from data leaks for all information processed or handled by Canon devices. Canon will leverage Veras award-winning encryption and dynamic data protection technology to further its commitment to innovation and deliver advanced rights management across its entire product portfolio. Veras data-centric security platform gives customers More


Hacker extracts customer data from Canadian Telecom Firm after rebuttal HackRead

By Waqas

A hacker who found critical vulnerability in Canadian Freedom Mobile has

This is a post from Read the original post: Hacker extracts customer data from Canadian Telecom Firm after rebuttal

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog