IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Tuesday, 19 June


French authorities dismantle Black Hand dark web market Help Net Security

The Black Hand forum, considered to be one of the most important illegal platforms of the dark web in France, has been dismantled by French law enforcement. According to information shared by Grald Darmanin, the French Minister of Public Action and Accounts, over 40 agents of the National Directorate of Intelligence and Customs Investigations (DNRED), customs handlers and technical experts were involved in coordinated raids in several French cities on June 12, 2018. The operation More

The post French authorities dismantle Black Hand dark web market appeared first on Help Net Security.


Buttery Smooth Fades with the Power of HSV Hackaday

In firmware-land we usually refer to colors using RGB. This is intuitively pleasing with a little background on color theory and an understanding of how multicolor LEDs work. Most of the colorful LEDs we are use not actually a single diode. They are red, green, and blue diodes shoved together in tight quarters. (Though interestingly very high end LEDs use even more colors than that, but thats a topic for another article.) When all three light up at once the emitted light munges together into a single color which your brain perceives. Appropriately the schematic symbol for an RGB LED without an onboard controller typically depicts three discrete LEDs all together. So its clear why representing an RGB LED in code as three individual values {R, G, B} makes sense. But binding our representation of color in firmware to the physical system we accidentally limit ourselves.

The inside of an RGB LED



Free software is at risk in the EU -- take action now FSF blogs

Members of the European Parliament want to turn upload platforms like GitLab into "censorship machines" that require user-uploaded materials to be monitored and automatically filtered, a process which would prevent modified and reused code from being uploaded. This provision is covered under Article 13 of the Copyright Directive.

If Article 13, embedded within the proposal, becomes official policy, it will be impossible for developers to build off of one another's code -- which is not only a blow to the collaborative development of free software, but a push against the basic freedoms of free software. Software isn't free unless it can be modified and shared. Article 13 will affect all users of free software -- as development of free software suffers, the quality and availability of updates, new features, and new programs will also suffer.

What you can do

You can help turn the tide against Article 13. Contact your member of European Parliament (MEP) before June 20th.

Not sure what to say? You can try this sample email.

Dear MEP,

I am an EU citizen and I oppose Article 13 of the proposed Copyright Directive. Article 13 is harmful to the free, global development of software, including that which provides necessary infrastructure on an international scale. Please vote against the Copyright Directive.


Need help finding your MEPs?

A complete list of MEPs is available online.

What to do next

After you contact your MEP, there is still more to do!

To learn more, you can check out the links below:

You can also support the work of the Free Software Foundation by become an Associate Member or making a donation today.


Apple macOS Bug Reveals Cache of Sensitive Data from Encrypted Drives The Hacker News

Security researchers are warning of almost a decade old issue with one of the Apple's macOS feature which was designed for users' convenience but is potentially exposing the contents of files stored on password-protected encrypted drives. Earlier this month, security researcher Wojciech Regula from SecuRing published a blog post, about the "Quick Look" feature in macOS that helps users


Why a minor change to how EPA makes rules could radically reduce environmental protection Lifeboat News: The Blog

Since the Reagan administration, federal agencies have been required to produce cost-benefit analyses of their major regulations. These assessments are designed to ensure that regulators are pursuing actions that make society better off.

In my experience working on the White House economic team in the Clinton and Obama administrations, I found cost-benefit provides a solid foundation for understanding the impacts of regulatory proposals. It also generates thoughtful discussion of ways to design rules to maximize net benefits to the public.

On June 7, Environmental Protection Agency Administrator Scott Pruitt proposed changing the agencys approach to this process in ways that sound sensible, but in fact are a radical departure from how government agencies have operated for decades.


To Start a New Life at Proxima Centauri, This Is How Many People We Need to Send Lifeboat News: The Blog

Humanity has long dreamed about sending humans to other planets, even before crewed spaceflight became a reality. And with the discovery of thousands exoplanets in recent decades, particularly those that orbit within neighboring star systems (like Proxima b), that dream seems closer than ever to becoming a reality.

But of course, a lot of technical challenges need to be overcome before we can hope to mount such a mission.

In addition, a lot of questions need to be answered. For example, what kind of ship should we send to Proxima b or other nearby exoplanets? And how many people would we need to place aboard that ship?


A Session Suspension & Restoration Protocol Proposed For Wayland Phoronix

KDE Wayland developer Roman Gilg who started contributing to Wayland via last year's Google Summer of Code is proposing a new Wayland protocol for dealing with desktop session suspension and restoration...


(IN)SECURE Magazine issue 58 released Help Net Security

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 58 has been released today. Table of contents Is GDPR-regulated data lurking in unexpected pockets of your organization? Leveraging security analytics to investigate and hunt modern threats When was the last time your anti-virus software alerted you? Software-defined perimeter: The pathway to Zero Trust Report: Infosecurity Europe 2018 Life after May 25th: How large organization should navigate the More

The post (IN)SECURE Magazine issue 58 released appeared first on Help Net Security.


Promising new material has the right properties to capture solar energy, split water into hydrogen and oxygen Lifeboat News: The Blog

Solar energy is clean and abundant. But when the sun isnt shining, you must store the energy in batteries or through a process called photocatalysisin which solar energy is used to make fuels. In photocatalytic water splitting, sunlight separates water into hydrogen and oxygen. The hydrogen and oxygen can then be recombined in a fuel cell to release energy.

Now, a new class of halide double perovskitesmay have just the right properties to split water, according to a newly published paper in Applied Physics Letters.

If we can come up with a material that can be useful as a water-splitting photocatalyst, then it would be an enormous breakthrough, said Feliciano Giustino, a co-author on the paper.


LibreOffice Picks Up A Native "KDE 5" File Picker Phoronix

Several months back LibreOffice developers began working on better integration with KDE Plasma 5 and that has advanced again today with now having a native file picker...


Tens or Hundreds of Billions of Dollars Needed to Combat Opioid Crisis? SoylentNews

US needs to invest 'tens of billions or hundreds of billions' to fight opioid epidemic

The goal of an opioid is to reduce pain, but the addictive drugs are creating pain for millions of families suffering through the crisis. Deaths from opioid overdoses number at least 42,000 a year in the U.S., according to the Centers for Disease Control.

"This is an epidemic that's been getting worse over 10 to 20 years," Caleb Alexander, co-director of Johns Hopkins Center for Drug Safety, told CNBC's "On The Money" in a recent interview. "I think it's important that we have realistic expectations about the amount of work that it will take and the amount of coordination to turn this steamship around," Alexander added.

[...] Alexander added: "The statistics are stunning. More than 2.1 million Americans have an opioid use disorder or opioid addiction" and he says the country needs to "invest tens of billions or hundreds of billions of dollars" to shore up the treatment system. He said patients should be able to access medications that "we know work to help reduce the cravings for further opioids."

Don't mention the Portugal model!

Meanwhile, the Massachusetts Attorney General is suing members of the family that runs Purdue Pharma:

Their family name graces some of the nation's most prestigious bastions of culture and learning the Sackler Center for Arts Education at the Guggenheim Museum, the Sackler Lefcourt Center for Child Development in Manhattan and the Sackler Institute for Developmental Psychobiology at Columbia University, to name a few.

Now the Sackler name is front and center in a lawsuit accusing the family and the company they own and run, Purdue Pharma, of helping to fuel the deadly opioid crisis that has killed thousands of Americans. Massachusetts Attorney General Maura Healey took the unusual step of naming eight members of the Sackler family this week in an 80-page complaint that accused Purdue Pharma of spinning a "web of illegal deceit" to boost profits.

While prosecutors in more than a dozen other states hit ha...


Watch The World Spin With The Earth Clock Hackaday

With the June solstice right around the corner, its a perfect time to witness first hand the effects of Earths axial tilt on the days length above and beyond 60 degrees latitude. But if you cant make it there, or otherwise prefer a more regular, less deprived sleep pattern, you can always resort to simulations to demonstrate the phenomenon. [SimonRob] for example built a clock with a real time rotating model of Earth to visualize its exposure to the sun over the year.

The daily rotating cycle, as well as Earths rotation within one year, are simulated with a hand painted plastic ball attached to a rotating axis and mounted on a rotating plate. The hand painting was done with a neat trick; placing printed slivers of an atlas inside the transparent orb to serve as guides. Movement for both axes are driven by a pair of stepper motors and a ring of LEDs in the same diameter as the Earth model is used to represent the Sun. You can of course wait a whole year to observe it all in real time, or then make use of a set of buttons that lets you fast forward and reverse time.

Earths rotation, and especially countering it, is a regular concept in astrophotography, so its a nice change of perspective to use it to look onto Earth itself from the outside. And who knows, if [SimonRob] ever feels like extending his clock with an aurora borealis simulation, he might find inspiration in this northern lights tracking light show.

This is a spectacular showpiece and a great project you can do with common tools already in your workshop. Once youve mastered earth, put on your machinists hat and give the solar system a try.


DHS, FBI published a join alert including technical details of Hidden Cobra-linked Typeframe Malware Security Affairs

The US DHS and the FBI have published a new joint report that includes technical details of a piece of malware allegedly used by the Hidden Cobra APT.

A new joint report published by US DHS and FBI made the headlines, past document details TTPs associated with North Korea-linked threat groups, tracked by the US government as Hidden Cobra.

The US authorities have published the report to reduce the exposure to the activities of North Korea-linked APT groups.

Hidden Cobras arsenal includes Sharpknot, Hardrain, Badcall, BankshotFallchil, Volgmer, and Delta Charlie.

The latest joint report includes a piece of malware dubbed Typeframe and it covers a total of 11 samples analyzed by the government experts.

The researchers analyzed several executables and weaponize Word documents containing VBA macros.

DHS and FBI identified Trojan malware variants used by the North Korean government. This malware variant is known as TYPEFRAME. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. reads the joint report.

This malware report contains analysis of 11 malware samples consisting of 32-bit and 64-bit Windows executable files and a malicious Microsoft Word document that contains Visual Basic for Applications (VBA) macros. These files have the capability to download and install malware, install proxy and Remote Access Trojans (RATs), connect to command and control (C2) servers to receive additional instructions, and modify the victims firewall to allow incoming connections.

Hidden Cobra

The security alert includes indicators of compromise (IoCs) for each of the sample analyzed by the experts.

The report includes a description...


California Tests Kindle-ized License Plates IEEE Spectrum Recent Content full text

California drivers can now opt for e-paper license plates that display custom messages Photo: Reviver Auto

That license plate frame sporting a dealership name, sports team logo, or your favorite superhero? Thats so last year.

This year, auto dealers in California will be able to go beyond personalized license plate frames to sell Kindle-ized license plates, in which the entire plate can display custom text and graphics using e-paper technology. These displays can be updated remotely, with such updates replacing the little date stickers that must be reapplied each year when registration is renewed.

And, when the car is stopped, drivers will also be able to reduce the license number to a small window and use the rest of the screen for a different graphic. (Though Im not sure the people stopped behind a custom-plate-bearing car will notice; so many people take that opportunity to surreptitiously check their mobile phones.)

Reviver Auto is making the so-called Rplates, and they arent cheapthe plates are listed at US $700, plus an $8 a month subscription fee. The company is initially focused on marketing them to fleet managers, who are expected to use the displays for advertising messages, but expects early adopters to quickly jump on the technology, and other consumers to come on board as the company proves out the plates usefulness.

The project started in 2008, Reviver founder and CEO Neville Boston says, with a plan to eliminate those date stickersit was time, he thought, to get registration renewals out of snail mail and into the wireless world. In the midst of an economic downturn, he says, he was also looking to get involved with something that exists in good times and badand the DMV is certainly that.

Then, he says, he started thinking about what else e-paper plates could do. His list of possibilities includes:

  • Paying for tolls and parking

  • Identifying cars as legal for travel in high-occupancy vehicle lanes

  • Replacing special hangtags and license plates for people with disabilities

  • Helping an Uber driver find a passenger by displaying the passengers name

  • Indicating that a car is in autonomous mode

  • Displaying a QR code that could work with an app for keyless entry

  • Celebrating holidays with greetings, like Happy Fathers Day

  • Switching between multiple special interest plates...


Security updates for Monday

Security updates have been issued by CentOS (kernel), Debian (libgcrypt20, redis, and strongswan), Fedora (epiphany, freedink-dfarc, gnupg, LibRaw, nodejs-JSV, nodejs-uri-js, singularity, strongswan, and webkit2gtk3), Mageia (flash-player-plugin, freedink-dfarc, and imagemagick), openSUSE (enigmail, gpg2, java-1_7_0-openjdk, java-1_8_0-openjdk, poppler, postgresql96, python-python-gnupg, and samba), Oracle (kernel), SUSE (gpg2 and xen), and Ubuntu (gnupg and webkit2gtk).


Aevums New Rocket-Drone Airplane Duo Could Launch Satellites Every 3 Hours Lifeboat News: The Blog

A space launch every 3 hours may soon be possible using rockets carried on a fully autonomous unmanned airplane, a new startup company suggests.

Alabama-based startup Aevum aims to per mission, using an air-launch system called Ravn.

Ravn is designed to launch every 180 minutes, Jay Skylus, Aevums CEO and chief launch architect, told Other launch vehicles fly only a handful of times a year with an average of 18 months of lead time. [Rocket Launches: The Latest Liftoffs, Photos & Videos].


Phoronix Test Suite 8.0.1 Is Coming Next Week Phoronix

Just a heads up that Phoronix Test Suite 8.0.1 is slated for release next week if there are any last minute bug reports or requests...


How SUSE Is Bringing Open Source Projects and Communities Together

How SUSE Is Bringing Open Source Projects and Communities Together


F-Secure acquires MWR InfoSecurity Help Net Security

F-Secure has signed an agreement to acquire all the outstanding shares of MWR InfoSecurity, a privately held cyber security company operating globally from its main offices in the UK, the US, South Africa and Singapore. Im thrilled to welcome MWR InfoSecuritys employees to F-Secure. With their vast experience and hundreds of experts performing cyber security services on four continents, we will have unparalleled visibility into real-life cyber attacks 24/7. This enables us to detect indicators More

The post F-Secure acquires MWR InfoSecurity appeared first on Help Net Security.


Can Great Tech Products Suffer From Poor Marketing? TechWorm

Image is everything in business. The right illustrations, logo, and stock images can speak volumes about the essence of who you are and what you do as a company. The old adage of a picture speaking a thousand words goes to show that this has been the case for a long time. As humans, we respond to images. If the history of art has thought us anything, it is that there is always an audience for bold and beautiful things to look at, once they come in the right frame.

As our brains are hardwired to judge on the visual aspects of a person, company, and their actions, we can be persuaded into purchasing products and services through the medium of advertising alone. Striking images can attract the eyes like almost nothing else. Pictures from Focused Collection are a strong example of a company who further this point. For almost every adult over a certain age will tell you, sometimes impulse buys happen. The reason for our last-minute splurges and spontaneous purchases quite often come down to the image within the advertisement.

The importance of imagery to a business, therefore, cannot be underestimated. Procuring the right images ones which will do a brand good rather than harm is crucial. You want to stand out from the cacophony of advertisements and marketing material out there and sometimes, even if it is against our inner-nature, we must learn to adopt the understanding that those that shout loudest get the most attention.

The Dominant Sense

For those of us blessed with the wonders of good eyesight will know, the majority of things which our human minds are attracted to come via our vision. It is the most dominant of our senses and the one which forces the brain to work harder than any other. In fact, our eyesight is accountable for up to half of the human brains functioning powers, which, in turn, means that we are designed to respond to images.

Although the voracious reader may argue with this, text can only go so far to stimulate the human mind. It is the photos and images which resonate on a deeper cognitive level and this is not something which is breaking news.

Standing Out in the Crowd...


malicious_ip_check.ps1- Freaky fast PowerShell script for malicious IP address checking The S@vvy_Geek Tips Tech Blog

I here want to introduce my new PowerShell script, malicious_ip_check.ps1.

It checks a single IP address against a huge database (it included 26,073 IP addresses when I checked it today) of malicious IP addresses, constantly updated, available at

The code downloads the information from the webpage to an output text file, dumps that to an array and checks whether an IP address entered by the user is included in the list or not, and all this in one minute!

Isn't that awesome?

I think it is.

I recently published it on GitHub, so go check it out!


Google to Fix Location Data Leak in Google Home, Chromecast Krebs on Security

Google in the coming weeks is expected to fix a location privacy leak in two of its most popular consumer products. New research shows that Web sites can run a simple script in the background that collects precise location data on people who have a Google Home or Chromecast device installed anywhere on their local network.

Craig Young, a researcher with security firm Tripwire, said he discovered an authentication weakness that leaks incredibly accurate location information about users of both the smart speaker and home assistant Google Home, and Chromecast, a small electronic device that makes it simple to stream TV shows, movies and games to a digital television or monitor.

Young said the attack works by asking the Google device for a list of nearby wireless networks and then sending that list to Googles geolocation lookup services.

An attacker can be completely remote as long as they can get the victim to open a link while connected to the same Wi-Fi or wired network as a Google Chromecast or Home device, Young told KrebsOnSecurity. The only real limitation is that the link needs to remain open for about a minute before the attacker has a location. The attack content could be contained within malicious advertisements or even a tweet.

It is common for Web sites to keep a record of the numeric Internet Protocol (IP) address of all visitors, and those addresses can be used in combination with online geolocation tools to glean information about each visitors hometown or region. But this type of location information is often quite imprecise. In many cases, IP geolocation offers only a general idea of where the IP address may be based geographically.

This is typically not the case with Googles geolocation data, which includes comprehensive maps of wireless network names around the world, linking each individual Wi-Fi network to a corresponding physical location. Armed with this data, Google can very often determine a users location to within a few feet (particularly in densely populated areas), by triangulating the user between several nearby mapped Wi-Fi access points. [Side note: Anyone whod like to see this in action need only to turn off location data and remove the SIM card from a smart phone and see how well nav...


Fatalities vs False Positives: The Lessons from the Tesla and Uber Crashes Hackaday

In one bad week in March, two people were indirectly killed by automated driving systems. A Tesla vehicle drove into a barrier, killing its driver, and an Uber vehicle hit and killed a pedestrian crossing the street. The National Transportation Safety Boards preliminary reports on both accidents came out recently, and these bring us as close as were going to get to a definitive view of what actually happened. What can we learn from these two crashes?

There is one outstanding factor that makes these two crashes look different on the surface: Teslas algorithm misidentified a lane split and actively accelerated into the barrier, while the Uber system eventually correctly identified the cyclist crossing the street and probably had time to stop, but it was disabled. You might say that if the Tesla driver died from trusting the system too much, the Uber fatality arose from trusting the system too little.

But youd be wrong. The forward-facing radar in the Tesla should have prevented the accident by seeing the barrier and slamming on the brakes, but the Tesla algorithm places more weight on the cameras than the radar. Why? For exactly the same reason that the Uber emergency-braking system was turned off: there are too many false positives and the result is that far too often the cars brake needlessly under normal driving circumstances.

The crux of the self-driving at the moment is precisely figuring out when to slam on the brakes and when not. Brake too often, and the passengers are annoyed or the car gets rear-ended. Brake too infrequently, and the consequences can be worse. Indeed, this is the central problem of autonomous vehicle safety, and neither Tesla nor Uber have it figured out yet.

Tesla Cars Drive Into Stopped Objects

Lets start with the Tesla crash. Just before the crash, the car was following behind another using its traffic-aware cruise control which attempts to hold a given speed subject to leaving appropriate following distance to the car ahead of it. As the Tesla approached an exit ramp, the car ahead kept right and the Tesla moved left, got confused by the lane markings on the lane split, and accelerated into its programmed speed of 75 mph (120 km/h) without noticing the barrier in front of it. Put simply, the algorithm got things wrong and drove into a lane divider at full speed.



Supreme Court to hear Apple's challenge to class action lawsuit over iPhone apps The Hill: Technology Policy

The Supreme Court on Monday agreed to hear Apple's challenge to a class action lawsuit brought by consumers who alleged the company has a monopoly on how apps can be purchased for its devices.Consumers allege the tech company illegally...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Monday, 18 June


Near-Infrared Photosynthesis Discovered in Cyanobacteria SoylentNews

A newly discovered form of photosynthesis could have implications for exoplanet/exomoon habitability:

The vast majority of life on Earth uses visible red light in the process of photosynthesis, but the new type uses near-infrared light instead. It was detected in a wide range of cyanobacteria (blue-green algae) when they grow in near-infrared light, found in shaded conditions like bacterial mats in Yellowstone and in beach rock in Australia. As scientists have now discovered, it also occurs in a cupboard fitted with infrared LEDs in Imperial College London.

The standard, near-universal type of photosynthesis uses the green pigment, chlorophyll-a, both to collect light and use its energy to make useful biochemicals and oxygen. The way chlorophyll-a absorbs light means only the energy from red light can be used for photosynthesis.

Since chlorophyll-a is present in all plants, algae and cyanobacteria that we know of, it was considered that the energy of red light set the 'red limit' for photosynthesis; that is, the minimum amount of energy needed to do the demanding chemistry that produces oxygen. The red limit is used in astrobiology to judge whether complex life could have evolved on planets in other solar systems.

However, when some cyanobacteria are grown under near-infrared light, the standard chlorophyll-a-containing systems shut down and different systems containing a different kind of chlorophyll, chlorophyll-f, takes over.

Also at ScienceAlert.

Photochemistry beyond the red limit in chlorophyll fcontaining photosystems (DOI: 10.1126/science.aar8313) (DX)

Original Submission

Read more of this story at SoylentNews.


Epic Games Fortnite for AndroidAPK Downloads Leads to Malware The Hacker News

Given Fortnite's current popularity and craziness across the globe, we understand if you have been searching the web for download links to Fortnite APK for Android phone. However, you are not alone, thousands of people out there are also searching tutorials and links for, "how to install Fortnite on Android" or "how to download Fortnite for Android" on the Internet. The app has taken the


Using W10Privacy To Boost Ubuntu WSL Performance On Windows 10 Phoronix

While Microsoft is working on low-level improvement to the Windows Subsystem for Linux (WSL) to yield better I/O performance, it is possible to dramatically increase some disk workloads by removing a number of running Windows services via the independent W10Privacy application. Here are some benchmarks of W10Privacy on the overall performance impact to Microsoft Windows 10 Pro x64 itself and of Ubuntu 18.04 running on the Windows 10 installation via WSL.


Will blockchain power the next generation of data security? Help Net Security

Cryptomania is dominating conversations from Silicon Valley to Wall Street. But cryptocurrency is only one implementation of the underlying technology innovation that has the ability to transform the way future technology products are designed and built. Of course, that technology is blockchain, the decentralized digital ledger that makes Bitcoin and other cryptocurrencies possible. First, we need to establish a common framework for the underpinnings of the technology. Its foundational element, the block, is a chunk More

The post Will blockchain power the next generation of data security? appeared first on Help Net Security.


YouTubes Piracy Filter Blocks MIT Courses, Blender Videos, and More TorrentFreak

To protect copyright holders, YouTube uses an advanced piracy recognition system that flags and disables videos which are used without permission.

This system, known as Content ID, works well most of the time, but it is far from perfect.

Its not well equipped to determine whether content deployment is protected under fair use, and in some cases it even views white noise or birds chirping as piracy.

Over the past several days, an even more worrying trend has appeared. Several popular YouTube accounts including those belonging to MIT OpenCourseWare and the Blender Foundation, have suddenly had all their videos blocked.

People who try to watch one of the freely available MIT courses on YouTube get the following message, which typically appears if an uploader doesnt have the rights to show content locally.

This video contains content from MIT. It is not available in your country.

The message appears in all locations that we were able to check, suggesting that it may very well apply worldwide. In any case, on social media theres no shortage of people mentioning that they can no longer access the courses.

Blocked courseware

The issue hasnt gone unnoticed by MITs OpenCourseWare team which is investigating the matter, without pointing fingers.

You may have noticed that we are having some trouble with our videos! Please stand by. The elves are working around the clock to fix the issue, they write, referring people to non-video content in the meantime.

Interestingly, the MIT case doesnt appear to be an isolated incident. Another organization that was hit by the same mysterious blocking efforts is the Blender Foundation.

The nonprofit organization, which is leading the development of the open source 3D content-creation application Blender, has also had its videos blocked.

Ton Roosendaal, Chairman of the Blender Foundation, noticed the issue on Saturday and contacted YouTube. This is most probably an error from their side, Roosendaal said.

At the time of writing, the i...


China-Linked APT15 is still very active, experts found its new malware tracked as MirageFox Security Affairs

Following the recent hack of a US Navy contractor security experts found evidence of very recent activity by the China-linked APT group tracked as APT15.

The China-linked APT15 group (aka Ke3chang, Mirage, Vixen Panda, Royal APT and Playful Dragon) has developed a new strain of malware borrowing the code from one of the tool he used in past operations.

APT15 has been active since at least 2010, it conducted cyber espionage campaigns against targets in defense, high tech, energy, government, aerospace, manufacturing industries worldwide. The attackers demonstrated an increasing level of sophistication across the years, they used a custom-malware and various exploits in their attacks.

Across the years, security firms identified many hacking tools associated with APT15 such as Mirage, BS2005, RoyalCLI, RoyalDNS, TidePool, BMW and MyWeb.

The group has been known to target organizations in the defense, high tech, energy, government, aerospace, manufacturing and other sectors.

In March 2018, APT15 used new backdoors is an attack that was likely part of a wider operation aimed at contractors at various UK government departments and military organizations.

One of the attacks aimed at a UK-based customer of NCC Group, an organization that provides a wide range of services to the United Kingdom government. The hackers focused on government departments and military technology by targeting the customer of the company.

NCC noted at the time that the APT15 used two new backdoors, tracked as RoyalCLI and RoyalDNS.


One of the backdoors has been tracked as RoyalCLI due to a debugging path left in the binary, it is the successor of BS2005 backdoor used by the group. Both RoyalCLI and BS2005 communicate with command and control (C&C) servers via Internet Explorer using the COM interface IWebBrowser2.

The attackers utilized Windows commands to conduct reconnaissance activities, the lateral movement was conducted by using a combination of net command, mounting the C$ share of hosts and manually copying files to or from compromised hosts.

The second backdoor, tracked as RoyalDNS, uses DNS to communic...


Working through the cybersecurity skills gap Help Net Security

Its no secret that theres a shortage of qualified personnel in the field of cybersecurity. Its a problem that has long been noticed and one that is projected to get even worseto the tune of 1.8 million by 2022, according to (ISC). Despite this massive skills gap on the horizon, the number of breaches appears to be declining. Appearances, however, can be deceiving. As criminals shift their tactics toward new types of threats, such as More

The post Working through the cybersecurity skills gap appeared first on Help Net Security.


13 Ways Cyber Criminals Spread Malware HackRead

By David Balaban

Security incidents where hackers distribute malicious code (malware) via spam,

This is a post from Read the original post: 13 Ways Cyber Criminals Spread Malware


Why Open Source Is Good for Business, And People

The open source world isnt defined by geography, nor are the communities within it. Open source communities are defined by sharing attitudes, interests, and goals, wherever their participants are. An open source community spans locations, political affiliations, religion, and life experience. There are no boundaries of company, country, or even language. People from all backgrounds with diverse perspectives can get involved. And they do.


A Chat With 'Super Meat Boy Forever' Creator Tommy Refenes SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

Tommy Refenes' life is about to change dramatically. He's turning 37 in a few days and his first child, a boy, is expected to arrive just a few weeks later. On top of this perfect storm of personal anxiety, he's preparing to launch his second major video game, Super Meat Boy Forever, later this year on the PlayStation 4, Xbox One, Nintendo Switch and PC.

Unlike in parenthood, Refenes has experience in the video game industry. He's famous in the world of independent development for his programming work on Super Meat Boy, a legendary 2010 platformer that helped usher in the modern marketplace for indie games. He's also a film star: Refenes and game designer Edmund McMillen were the focus of the 2012 documentary Indie Game: The Movie, which tracked the development and surprisingly successful launch of Super Meat Boy. The movie was a critical and commercial hit, picking up an award for documentary editing at the 2012 Sundance Film Festival.


Original Submission

Read more of this story at SoylentNews.


Has Agile Programming Lost its Way?

Programmers are passionate about which development methodology is the best. Is it Agile? Waterfall? Feature Driven Development? Scrum? So everyone took notice when one of the 17 original signers of the seminal Agile Manifestowrote a blog post last month headlined Developers Should Abandon Agile.


Opening A Ford With A Robot and the De Bruijn Sequence Hackaday

The Ford Securicode, or the keyless-entry keypad available on all models of Ford cars and trucks, first appeared on the 1980 Thunderbird. Even though its most commonly seen on the higher-end models, it is available as an option on the Fiesta S the cheapest car Ford sells in the US for $95. Doug DeMuro loves it. Its also a lock, and that means its ready to be exploited. Surely, someone can build a robot to crack this lock. Turns out, its pretty easy.

The electronics and mechanical part of this build are pretty simple. An acrylic frame holds five solenoids over the keypad, and this acrylic frame attaches to the car with magnets. Theres a second large protoboard attached to this acrylic frame loaded up with an Arduino, character display, and a ULN2003 to drive the resistors. So far, everything you would expect for a robot that will unlock a car via...


US Government warns of more North Korean malware attacks Graham Cluley

US Government warns of more North Korean malware attacks

Just days after the two countries signed a joint agreement at their unprecedented talks, the US Department of Homeland Security has issued a warning about more malware being used by the North Korean government against US organisations.

Read more in my article on the Hot for Security blog.


Buildah 1.0: Linux Container Construction Made Easy

The good news about containers, such as Docker's, is they make it easy to deploy applications, and you can run far more of them on a server than you can on a virtual machine. The bad news is that putting an application into a container can be difficult. That's where Buildah comes in.


Feral Is Bringing Total War: WARHAMMER 2 To Linux Phoronix

Feral Interactive has announced this morning that they will be bringing Total War: WARHAMMER 2 to Linux this year as the latest Total War game seeing a native Linux port...


Hayabusa2 Approaches Asteroid Ryugu SoylentNews

Hayabusa2 will begin orbiting asteroid 162173 Ryugu on June 27th. The spacecraft includes four robotic landers and will capture material for a sample return:

The Japanese asteroid sampling mission Hayabusa2, launched on December 3, 2014 aboard an H-IIA rocket from Tanegashima, Japan, has nearly completed its long flight to asteroid Ryugu (formerly 1999 JU3) after a five year mission and an Earth flyby.

[...] The Hayabusa2 follow-on has one more reaction wheel (to make four) and improved, higher thrust ion engines, along with a backup asteroid sampling system, and the spacecraft is in good health so far. Hayabusa2 is a 600 kilogram (1300 pound) spacecraft that is based on the Hayabusa craft, with some improvements. It is powered by two solar panels and uses an ion engine with xenon propellant as its main propulsion source. The ion engine technology was first used in the Deep Space One experimental spacecraft in the late 1990's and also has been successfully used in the Dawn asteroid probe as well.

[...] Besides the primary and backup sample collectors, the mission includes three MINERVA "hoppers" similar to the one used on the original Hayabusa mission that will land at several locations on the surface to study these locations with cameras and thermometers. [...] International contributions include a small robotic lander (10 kilograms or 20 pounds) called MASCOT that is a joint venture of DLR (Germany) and CNES (France), while NASA is providing communications through the Deep Space Network.

[...] Its arrival at Ryugu is set for June 27th, and Hayabusa2 will be 20 km (12 miles) above the surface on that date, as things currently stand. The arrival will be followed by a press conference in Sagamihara, Japan.

The total mission cost is about $150 million. The H-IIA rocket costs about $90 million to launch.

Also at NHK.

Original Submission

Read more of this story at SoylentNews.


cantata: cantata-mounter D-Bus service local privilege escalation and other security issues Open Source Security

Posted by Matthias Gerstner on Jun 18

Hello list,

this is a report about local privilege and local denial of service
issues found in cantata, a graphical client for MPD

cantata supports a D-Bus helper daemon "cantata-mounter" for mounting
remote samba shares by calling `mount.cifs` on Linux systems. This
daemon is configured for on-demand activation, running as root and its
D-Bus interface is accessible by...


Systems Languages: An Experience Report

Recently, theres been a lot of turmoil in the systems language community. We have the Rust Evangelism Strikeforce nudging us towards rewriting everything in Rust. We have the C++17 folks who promise the safety and ease of use of modern programming languages with the performance and power of C. And then theres a long tail of other systems programming languages, like Nim, Reason / OCaml, Crystal, Go, and Pony.


Interplanetary Challenge Lifeboat News: The Blog


Let Bill Nye and Robert Picardo take you on a journey through the future of space exploration and artificial intelligence. Each week they will show us a different space-themed topic and reveal how AI can help us reach the stars.


Orrin Hatch, Sponsored the Most by the Pharmaceutical Industry, Tries to Make Its Patents Immune From Scrutiny (PTAB) Techrights

American (US) pharmaceutical patents on Canadian soil are meanwhile at risk as a result of Trumps trade war that invites retaliation

Orrin Hatch's funding
Source: OpenSecrets

Summary: Orrin Hatch is the latest example of laws being up for sale, i.e. companies can buy politicians to act as their couriers and pass laws for them, including laws pertaining to patents

THE SCOTUS issued some important rulings such as Alice and Mayo, which meant that patents granted by the USPTO may, in retrospect, be invalid. The Saint Regis Mohawk Tribe is attempting to shield Allergan from the Patent Trial and Appeal Board (PTAB), the only tribunal that can render Allergans patents invalid unless Allergan sues. All sorts of pharmaceutical patents are under a similar threat from PTAB and Mr. Kyle Bass made headlines some years ago when he used PTAB as a weapon. His threat was ending a monopoly.

The subject of immunity from PTAB is now at the Federal Circuit and we need to question the motivation of politicians who take Allergans side, even based on their sources of funding alone.

Watchtroll likes to heckle politicians who receive money from technology firms, but what about pharmaceutical firms?To be clear, in the area of technology pretty much all the companies both large and small support PTAB, except a few like IBM, which nowadays relies on patent shakedowns rather than sales (we have been saying this for years [1, 2,...


Elon Musk and State of Minds Transhumanism Philosophy Lifeboat News: The Blog

What does it mean to be human in world of increasingly powerful technology? This is a question video games have grappled with, most recently in the Deus Ex franchise and the upcoming E3 show-stealing Cyberpunk 2077.

Daedalics State of Mind approaches the topic in a different, more philosophical way. Guns and body mods arent the order of the day. Rather, State of Mind is a narrative adventure that considers how far the human race will go to trade dystopia for utopia.

Creative lead Martin Gantefhr is an avid follower of transhumanist theory, and how humanity will evolve over the coming decades as scientists pursue the singularity. Transhumanism explores the intersection of people and technology, with the ultimate goal giving all people access to technology that leads to an egalitarian utopia.


Is your brain ready for Monday? Tease your mind with these four optical illusions Lifeboat News: The Blog

Better than coffee smile

___ A great way to learn more about our brains and minds is to look at how we can trick themthat is, to see how we react to brain teasers and visual illusions. Below are four fun optical illusio


Australian Government Pursues "Golden Key" for Encryption SoylentNews

The Australian Government believes that it needs a golden key to backdoor encryption within Australia via legislation. The Brits and the Yanks have both already had a nudge at this and both have conceded that requiring a backdoor to encryption is not viable but this will not stop the Australian Liberal Party from trying.

Digital rights experts have described the proposal as "ludicrous" as Cyber security minister Angus Taylor stating that the legislation would be presented for public comment within the next quarter. While the Australian Government has not detailed how it expects to gain access to encrypted data, companies may be penalized if they don't kowtow to the new laws. There is nothing to be discussed here that hasn't been said before other than the Australian Government sincerely believes it can force companies to divulge encrypted data to authorities on demand.

Original Submission

Read more of this story at SoylentNews.


Distribution Release: Porteus Kiosk 4.7.0 News

Tomasz Jokiel has announced the release of Porteus Kiosk 4.7.0, the latest stable build of the project's specialist Gentoo-based distribution designed for web kiosks (with Firefox and Chrome browsers): "I'm pleased to announce that Porteus Kiosk 4.7.0 is now available for download. Major software upgrades in this release....


Foxtel Pirate Site Blocking Application Could Be Granted in Record Time TorrentFreak

Back in April, pay TV company Foxtel filed the latest in a series of blocking applications, this time targeting more than two dozen domain names facilitating access to 15 torrent and streaming services.

To save on time and costs, Foxtel envisioned things going a little bit differently this time around. The company didnt want to have expert witnesses present in court and asked whether live demonstrations of websites could be replaced by videos and screenshots instead.

Foxtel also said that if the ISPs expected to block the domains agree, it wouldnt serve its evidence on them as it had done previously.

The company then asked Justice Nicholas to deal with the entire injunction application on paper. He declined, instead scheduling a hearing to take place today.

As hoped by Foxtel, events were indeed more streamlined. According to a ZDNet report, the hearing lasted for just an hour, with no live website demonstrations and the requested videos being allowed.

The application targeted 15 torrent site domains and ten streaming sites located overseas (a requirement for blocking under Australian law), each of which unashamedly and flagrantly infringes copyright.

ComputerWorld lists the torrent sites as ETTV, MagnetDL, Torrent Download (possibly, Torrent Room (, and A domain facilitating access to the previously-blocked Pirate Bay was also included in the application.

Also demonstrated in Court was a search bar that can be used to access content on torrent sites including 1337x and The Pirate Bay. No further details on the bar have been made available, but as a standalone item, blocking seems unlikely.

The streaming services targeted by Foxtel include HDO, HDEuropix, 123Hulu, Watch32, Sockshare, NewEpisodes, 1Movies, 5Movies, WatchFreeMovies and SeriesTop. They represent just a handful of the hundreds of similar domains offering streaming today.

Both the torrent and streaming sites stand accused of facilitating access to a range of popular TV shows including Game of Thrones, Greys Anatomy and Fear the Walking Dead plus movies including Jason Bourne, Pacific Rim, and Red Sparrow.

Under Section 115a of the Copyright Act, Foxtel wants the usual ISPs Optus, Vocus, Telstra, TPG plus their subsidiaries to render the sites inaccessible by the usual means.

None were present in Court today, and none turned u...


Dissecting the Elusive Wax Motor Hackaday

Wed wager most readers arent intimately acquainted with wax motors. In fact, a good deal of you have probably never heard of them, let alone used one in a project. Which isnt exactly surprising, as theyre very niche and rarely used outside of HVAC systems and some appliances. But theyre fascinating devices, and once youve seen how they work, you might just figure out an application for one.

[AvE] recently did a complete teardown on a typical wax motor, going as far as cutting the thing in half to show the inner workings. Now weve seen some readers commenting that everyones favorite foul-mouthed destroyer of consumer goods has lost his edge, that his newer videos are more about goofing off than anything. Well we cant necessarily defend his signature linguistic repertoire, but we can confidently say this video does an excellent job of explaining these little-known gadgets.

By turning heat directly into mechanical energy, wax motors are often used to open val...


Top 10 Most Pirated Movies of The Week on BitTorrent 06/18/18 TorrentFreak

This week we have three newcomers in our chart.

Escape Plan 2: Hades is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the articles of the recent weekly movie download charts.

This weeks most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 () Escape Plan 2: Hades 3.9 / trailer
2 (1) Tomb Raider 6.6 / trailer
3 (2) Pacific Rim: Uprising 5.8 / trailer
4 (4) Avengers: Infinity War (HDCam) 9.1 / trailer
5 () Acrimony 5.0 / trailer
6 (8) Sherlock Gnomes 4.8 / trailer
7 (6) A Quiet Place 8.0 / trailer


Six Fitbit Employees Charged in Jawbone Trade Secrets Case SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

Fitbit's and Jawbone's trade secret theft saga apparently didn't end when they reached a settlement in court back in December. According to Reuters, six former and current Fitbit employees have been charged in a federal indictment for being in possession of trade secrets stolen from the company's once-staunch rival Jawbone. All six worked for Jawbone for at least a year between May 2011 and April 2015. If you'll recall, the fallen wearables giant filed a lawsuit against Fitbit back in 2015 for "systematically plundering" insider information.

At the time, Jawbone said some of its employees sent over 300,000 confidential files to its rival, including outlines of future products, manufacturing prices and schedules. Jawbone even said that some of the products Fitbit released in recent years use tech stolen from the company. Fitbit, however, denied using Jawbone trade secrets in any product, feature or technology.

[...] Update: A Fitbit spokesperson offered the following statement: "In a trade secret misappropriation case brought by Jawbone in the International Trade Commission in 2016 that involved these same individuals, a federal administrative law judge during a nine-day trial on the merits found that no Jawbone trade secrets were misappropriated or used in any Fitbit product, feature or technology."


Original Submission

Read more of this story at SoylentNews.


Capital Flight to Germany in Full Swing? Terra Forming Terra

Bah, here we go again.  Public demand for currency never ends and provides a continuing shrinking supply of cash which allows governmental spending.

The problem remains locating risk free investments and they do not exist except as a government promise.   The expanding cash and credit bubble drives the economy and makes it all work well enough.  Throw away all those borders and all this disappears immediately.

Local guarantees shift that capital to areas that are capital poor.  This is as it should be.  A guarantee in North Dakota shifts deposits into their banking system.  Their loan portfolio expands locally.

All those private deposits landing in Germany merely come back as local bank deposits simply absolving the individual of local government confiscation.  As it should.
Capital Flight to Germany in Full Swing

The ECB guarantees these loans.

As long as they are guaranteed, then hells bells, why not make more loans?

1 Germany and the creditor nations forgive enough debt for Europe to grow. This is the transfer union solution.

2 Permanently high unemployment and slow growth in Spain, Greece, Italy, with stagnation elsewhere in Europe

3 Breakup of the eurozone

Capital; flight to Germany, the Netherlands, and Finland is in full swing. These sums cannot be paid bac...


Qanon - Congress/ DOJ/FBI Confrontation Wednesday Terra Forming Terra


The traffic from Q has become unusually heavy.  We now know that Huma and Podesta were indicted early last November.  This would remain sealed.  We also learn that the principal motive behind this Mil Intel operation is the ending of human trafficking or the children.  It also entails rolling up the DEEP STATE.  I understood that this was what was happening and this is formal confirmation trough this intel feed.

It is one thing to think logically and surmise actions.  it is quite another to have it directly confirmed. 

Our attention is now drawn to Obama's 2014 speech to the Bilderberg group.  Hitler could not have said this better and i am angry this was never brought out by the MSM who must be now understood as complicit.

Full confrontation between Congress and the DOJ/FBI is on this week.  They have now run out of stall options.

We are still some ways away from mass arrests it appears but sealed indictments are now past 35,000.  In the meantime rising support for the Trump GOP is narrowing DEM options.  Half of those in congress are likely to be forced to resign before the midterms as well.  That is only four months away and the shoe must drop soon.

I do think that the Obstructionists may well throw in the towel now.  ..
Q !CbboFOtcZs ID: 9fc2c1 No.1785859
Jun 17 2018 12:05:46 (EST)
Anonymous ID: 84b9ef No.1785584
Jun 17 2018 11:50:20 (EST)


The Natural Pedophile Conspiracy and the Royal Family. Terra Forming Terra

The Natural Pedophile Conspiracy and the Royal Family.

I bring this topic up because it is an underlying meme drifting around the NPC or the Natural Pedophile Conspiracy.  First, though I do think that it is a False meme and my reasoning all goes back to numbers.

The NPC is made up of those individuals who are addicted to pedophilia and are largely unable to help themselves.  This is actually a very small group of men and women.  In numbers, it is likely in the thousands throughout North America.  This does not include those so driven but able to manage the impulses.  This dangerous subset works out to be several per million.  This still gives us a population of over ten thousand.

The difficulty worsens since they are all attracted to where children are vulnerable.  Thus they get to meet each other and by circumstance must conspire with each other.  It really is a natural conspiracy that can then last a lifetime.  No other conspiracy has this type of natural glue and is thus always suspect and unstable.

By extension, this network has worked itself into government service were their coherence allows them to promote internally and maintain loyalties as well.  Other organizations are far more vulnerable to exposure and that includes the church which is why we are hearing so much about it.

It is the very nature of a criminal conspiracy to claim that leadership comes from the very top even when that is impossible.  Thus we have the persistent claim of royal family involvement even when the natural statistics tells us that this must be impossible. The inclination is rare enough to ensure any given family will have candidates generations apart unless special influences are brought to bear and that is actually ridiculous.


Buddhists in love Terra Forming Terra

Here is a fresh insight on the whole issue of relationships that is well worth thinking through.

This is different inasmuch Buddhism teaches change and the objective viewing of change.  I also observe that Christianity teaches the centrality of love while Islam is far to accepting of hate.  This article is central to developing a completed viewpoint.

Buddhists in love

Lovers crave intensity, Buddhists say craving causes suffering. Is it possible to be deeply in love yet truly detached?

Lisa Feldman Barrett is professor of psychology at Northeastern University in Boston and the author of How Emotions Are Made: The Secret Life of the Brain(2017).
John Dunne is a professor of contemplative humanities at the University of Wisconsin-Madison.

Humans are social animals. We live in groups. We care for our offspring for years. We coope...


New antibiotic shows long-lasting promise as superbug killer Lifeboat News: The Blog

Antibiotics have saved countless lives for the better part of a century, but these medical marvels may be approaching the end of their usefulness. Thanks to overuse, bacteria are rapidly evolving resistance to our best drugs, prompting scientists to try to develop new ones. Now, a team at Purdue University has found that a compound called F6 is effective at killing bacteria that have already evolved resistance to existing antibiotics. In tests, the new drug also seems less susceptible to bacterial resistance down the track.

The discovery and use of antibiotics was one of the greatest scientific achievements of the 20th century, as previously-dangerous procedures quickly became safe and infections relatively easy to treat. But after decades of overuse and overprescription, bacteria are fighting back, with more and more antibiotics becoming ineffective including some of our last lines of defense. If left unaddressed, the problem is predicted to worsen until these so-called superbugs are killing up to 10 million people a year by 2050.


IBM overcomes von Neumann bottleneck for AI hundreds of time faster using hundreds of times less energy Lifeboat News: The Blog

IBM Research AI team demonstrated deep neural network (DNN) training with large arrays of analog memory devices at the same accuracy as a Graphical Processing Unit (GPU)-based system. This is a major step on the path to the kind of hardware accelerators necessary for the next AI breakthroughs. Why? Because delivering the Future of AI will require vastly expanding the scale of AI calculations.

Above Crossbar arrays of non-volatile memories can accelerate the training of fully connected neural networks by performing computation at the location of the data.

This new approach allows deep neural networks to run hundreds of times faster than with GPUs, using hundreds of times less energy.


New (?) ideas for utilizing space for business: hypergravity for isotopic enrichment Lifeboat News: The Blog

One night, as I was putting my daughter to bed and waiting for her to fall asleep, I tried to think of some new markets for space utilization.

We often hear about attempts to find industrial uses for microgravity for growing crystals, for purification of electronic materials (which is an actual thing with ACME Advanced Materials:, maybe growth of certain metal foams, etc. However, in space, youre in both a hard vacuum and not physically resting on anything, so you can spin up something, and it will simply keep on spinning (stably, if you spin it around the correct axis) nearly indefinitely without any additional energy input and no wear on bearings or anything. So in fact, you can get basically any gravity level you want, including HYPERgravity, nearly for free.

What are the applications of this?


Nearly a Decade in Twitter and Half a Million Tweets

Twitter at 500000

Twitter is not a site that I like. Honestly, I dont! In fact, I think it is getting worse over time. In 2016 it shadowbanned me a lot of times and I receive plenty of abuse there. I now identify as living in the North Pole to avoid messages like youre English, so (method of shooting the messenger). I only very reluctantly joined Twitter after I had begun participating in for the purpose of posting Free software news. Prior to that I preferred just blogging, relying on people who subscribe to RSS feeds to find my writings. At the time there was also, which Im proud to say I was ranked 17th on (they had millions of users at the time). Having taken a quick look at my Twitter account last night, I noticed that a milestone is approached and will have been reached by weekss end. I am nowhere near the most prolific users (like 38 million tweets for this Japanese account; see the out-of-date chart below), but quantity was never my goal and besides, as many people know, I primarily post in Diaspora these days, with posts being exported from there to Twitter. I vastly favour these Freedom/Free software-centric communities (like at the time and nowadays GNU Social, Diaspora etc.) and I humbly think that all this social control media phenomenon is a waste of human productivity and a threat to real, in-depth, fact-checked journalism. But no single person can tell the world how to use the Internet and how to communicate; if social control media is whats normal and necessary now (adapting to the so-called market), then so be it.

Twitter top users


Android-based devices Amazon Fire TV and Fire Stick hit by cryptomining malware Security Affairs

A new crypto mining malicious code dubbed ADB.miner is targeting Android-based devices Amazon Fire TV and Fire Stick.

Recently, security experts spotted the crypto mining malware ADB.miner (Android.CoinMine.15) targeting Amazon Fire TV and Fire TV Stick devices.

The malicious code is active at least since February when researchers at Qihoo 360s Netlab have spotted the Android mining botnet that targets Android devices by scanning for open ADB debugging interface (port 5555) and infects them with a Monero cryptocurrency miner.

The port 5555 is the working port ADB debug interface on Android device that should be shut down normally. The devices infected by ADB.miner are devices where users or vendors have voluntary enabled the debugging port 5555.

The Amazon devices hit by the ADB.miner leverages the ADB (Android Debug Bridge) for uninterrupted internet connections it is no surprise that they are now under attack.

Many Amazon Fire TV owners reported through a thread on the XDA forums that they streaming media players have been infected by the malware.

Once the malware has infected the device, it will abuse its resources to mine cryptocurrency and disrupts video playback feature.

The infected devices display the official Android logo and a message that states Test.

Infected devices will become very slow to use. Loading apps will take longer than usual. This is because the malware is using 100%...


Apple USB Restricted Mode feature will make hard for law enforcement to crack devices Security Affairs

Apple introduced a new feature in the latest beta versions of iOS, dubbed USB Restricted Mode, to improve the security of a locked device,

Apple is implementing a new feature dubbed USB Restricted Mode to improve the security of its device, it is going to lock down the iPhones data port to avoid unauthorized access, but experts observed that in this way password-cracking tools used by forensics experts will be no more effective.

The USB Restricted Mode was implemented in the latest beta versions of the iOS operating system, it disables the data connection of the iPhones Lightning port after a specific interval of time but it doesnt interrupt the charging process.

Any other data transfer would require the user providing the passcode.

Initially, the USB Restricted Mode required a passcode after 7 days.

The USB Restricted Mode was implemented in the latest beta versions of the iOS operating system, it disables the data connection of the iPhones Lightning port after a specific interval of time but it doesnt interrupt the charging process. reads a blog post published by ElcomSoft.

Last week Apple provided an update on the new feature confirming that it will require a passcode every hour for the data transfers to continue.

Apple said it was planning an iPhone software update that would effectively disable the phones charging and data port the opening where users plug in headphones, power cables and adapters an hour after the phone is locked. reported the New York Times.

While a phone can still be charged, a person would first need to enter the phones password to transfer data to or from the device using the port.

Apple USB Restricted Mode feature

The new feature will have a significant impact on forensics investigation conducted using cracking tools such as Cellebrite and...


[SECURITY] [DSA 4229-1] strongswan security update Bugtraq

Posted by Yves-Alexis Perez on Jun 17

Debian Security Advisory DSA-4229-1 security () debian org Yves-Alexis Perez
June 14, 2018

Package : strongswan
CVE ID : CVE-2018-5388 CVE-2018-10811...


[security bulletin] MFSBGN03810 rev.1 - Universal CMDB, Deserialization Java Objects and CSRF Bugtraq

Posted by cyber-psrt on Jun 17


Document ID: KM03180069
Version: 1

MFSBGN03810 rev.1 - Universal CMDB, Deserialization Java Objects and CSRF

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-06-15
Last Updated: 2018-06-15...


[SECURITY] [DSA 4230-1] redis security update Bugtraq

Posted by Moritz Muehlenhoff on Jun 17

Debian Security Advisory DSA-4230-1 security () debian org Moritz Muehlenhoff
June 17, 2018

Package : redis
CVE ID : CVE-2018-11218 CVE-2018-11219...


[SECURITY] [DSA 4231-1] libgcrypt20 security update Bugtraq

Posted by Salvatore Bonaccorso on Jun 17

Debian Security Advisory DSA-4231-1 security () debian org Salvatore Bonaccorso
June 17, 2018

Package : libgcrypt20
CVE ID : CVE-2018-0495

It was...


[security bulletin] MFSBGN03809 rev.1 - Universal CMDB, Deserialization Java Objects and CSRF Bugtraq

Posted by cyber-psrt on Jun 17


Document ID: KM03180066
Version: 1

MFSBGN03809 rev.1 - Universal CMDB, Deserialization Java Objects and CSRF

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-06-15
Last Updated: 2018-06-15...


Searchable KiCad Component Database Makes Finding Parts A Breeze Hackaday

KiCad, the open source EDA software, is popular with Hackaday readers and the hardware community as a whole. But it is not immune from the most common bane of EDA tools. Managing your library of symbols and footprints, and finding new ones for components youre using in your latest design is rarely a pleasant experience. Swooping in to help alleviate your pain, [twitchyliquid64] has created KiCad Database (KCDB). a beautifully simple web-app for searching component footprints.

The database lets you easily search by footprint name with optional parameters like number of pins. Of course it can also search by tag for a bit of flexibility (searching Neopixel returned the footprint shown above). Theres also an indicator for Kicad-official parts which is a nice touch. One of our favourite features is the part viewer, which renders the footprint in your browser, making it easy to instantly see if the part is suitable. AngularJS and material design are at work here, and the main app is written in Go  very trendy.

The database is kindly publicly hosted by [twitchyliquid64] but can easily be run locally on your machine where you can add your own libraries. It takes only one command to add a GitHub repo as a component source, which then gets regularly ingested. Its great how easy it is to add a neat library of footprints you found once, then forget about them, safe in the knowledge that they can easily be found in future in the same place as everything else.

If you cant find the schematic symbols for the part youre using, we recently covered a service which uses OCR and computer vision to automatically generate symbols from a datasheet; pretty cool stuff.


Musician Wins Over $260,000 in Email Deception/Sabotage Lawsuit SoylentNews

Musician Wins $260,000 In Lawsuit Against Ex-Girlfriend Who Sabotaged Career

In the spring of 2014, Eric Abramovitz got the opportunity of a lifetime. He just didn't know it. Abramovitz was the victim of a deception that a Canadian judge called "despicable," as he granted Abramovitz $350,000 Canadian dollars (more than $260,000 U.S.) in damages.

Abramovitz is a gifted Canadian clarinetist who received national attention when he was still in his teens. As a student at McGill University, he applied for a spot and a scholarship at the prestigious Colburn Conservatory in Los Angeles, where he would study under the famed clarinet teacher Yehuda Gilad.

Only two spots open up per year, and they're seen as launching pads for elite careers. Competition is fierce. Abramovitz made it to the audition phase. But in March 2014, he saw an email in his inbox telling him he had been rejected.

It was heartbreaking. He went through "some really dark, sad, angry days," he told BuzzFeed. His girlfriend at the time, Jennifer Lee, another musician at McGill, consoled him.

But Abramovitz's despair was born out of a lie and Lee's comforting words were, in retrospect, "really sick," he told the site. He had actually made it into the Colburn Conservatory. He never saw his acceptance email, however, because Lee got to it first and sabotaged him. Apparently, a Canadian judge concluded, she didn't want him to move from Montreal to California.

Original Submission

Read more of this story at SoylentNews.


Science liaison Mariya Lyubenova Lifeboat News: The Blog

Mariya Lyubenova is an astronomer at ESO. Her research focusses on the motions and chemical properties of stars in galaxies to unravel the build-up and evolution of galaxies. She also works as a science liaison in the education and Public Outreach Department (ePOD).


8 Women in Science and Their Ground-Breaking Achievements Lifeboat News: The Blog

Women deserve attention for their great contributions to science. Here are some favorite figures who got us to where we are today.


OpenGL Floating Point Textures No Longer Encumbered By Patents, Enabled In Mesa Phoronix

Back in 2012 when talking with Gabe Newell of Valve about open-source/Linux challenges one of the topics he was awed about was patents encumbering the open-source graphics driver progress. Six years later, Timothy Arceri working on the Valve Linux graphics driver team has freed Mesa's ARB_texture_float support from being built conditionally due to these patent fears...


Boston Dynamics Shows Latest Advancements in Robotics at CEBIT 2018 Lifeboat News: The Blog

Robots are getting lighter, faster, stronger and smarter. Marc Rybert, founder of Boston Dynamics shows the latest developments at CEBIT 2018.

Courtesy of CEBIT. June 2018.


HPV vaccine has almost wiped out infections in young women, figures show Lifeboat News: The Blog

T he HPV vaccine has almost completely wiped out infections in young women, and if expanded to men could prevent thousands of cancer cases in Britain each year, new figures suggest.

New figures from Public Health England show that the rate of Human Papilloma Virus (HPV) in women aged between 16 to 21 who were vaccinated between 2010 and 2016 has fallen by 86 per cent.

More than 3,000 women are diagnosed with cervical cancer each year, and more than 800 will die from the disease, with most cases caused by the HPV virus.


The big picture: Were getting closer to AI doctors Lifeboat News: The Blog

Its not unrealistic to think that 80% of what doctors do will be replaced by algorithms and artificial intelligence. The idea, evangelized by venture capitalist Vinod Khosla two years ago, is that machines can more accurately diagnosis us and that will reduce deadly medical errors and free doctors up to do other things.

The bottom line: Were getting closer to this reality. Algorithms, for example, can already diagnose diseases from imaging scans better than human radiologists. Computers possibly could take over the entire radiology specialty.

Read more toggle.


RIPPA The Farm Robot Exterminates Pests And Weeds Lifeboat News: The Blog

RIPPA, a fully autonomous robot, can cover five acres a day on a solar charge finding and exterminating pests and weeds on every single plant over the equivalent of four football fields. Are robots like RIPPA the future of farming?

RIPPA stands for Robot for Intelligent Perception and Precision Application.

Catalyst joins engineers from the Australian Centre for Field Robotics as they explore the world of agriculture to develop robots and smarter ways of farming.

Watch Catalyst on ABC iview now:


About Catalyst:
Catalyst is Australias flagship science documentary program, showcasing Australian and international stories that impact us all. With our exciting mix of science genres, presented by top scientists and experts, viewers are exposed to extraordinary topics, discoveries, observations, and philosophies that shape our world. The viewer will be left inspired, activated, and in awe of this extraordinary planet.


Sunshine Is Making Deepwater Horizon Oil Stick Around SoylentNews

In the days and weeks after the 2010 Deepwater Horizon oil spill in the Gulf of Mexico, sunlight hit the oil slicks on the surface of the water. That triggered chemical reactions that added oxygen to oil molecules that once were just chains of carbon and hydrogen atoms. These oxygenated hydrocarbons are still sticking around eight years later with little evidence of degradation, researchers report May 29 in Environmental Science and Technology.

Chemist Christopher Reddy of Woods Hole Oceanographic Institution in Massachusetts and colleagues analyzed the oily soup of molecules floating in the Gulf post-disaster. (The Deepwater Horizon spill was the largest marine oil spill in U.S. history, leaking more than 3 million barrels.) While investigating how the leaked hydrocarbons broke down over time, the team got a surprise: More than half of the degrading oil by-products found in oil slicks from the spill were these oxygenated hydrocarbons, the researchers reported in 2012. The by-products had gone relatively unnoticed after previous oil spills, and so were mostly unstudied in that context.

Read more of this story at SoylentNews.


The most important lesson from 83,000 brain scans Lifeboat News: The Blog

Never miss a talk! SUBSCRIBE to the TEDx channel:

In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TEDx event, TEDTalks video and live speakers combine to spark deep discussion and connection in a small group. These local, self-organized events are branded TEDx, where x = independently organized TED event. The TED Conference provides general guidance for the TEDx program, but individual TEDx events are self-organized.* (*Subject to certain rules and regulations)


Learn Six Oscilloscope Measurements with One Arduino Hackaday

We wont mention names, but we are always dismayed to see people twist knobs randomly on a scope until it shows a good picture. These days, theres the dreaded auto button, too, which is nearly as bad. If you havent spent the time to learn how to properly use a scope [Bald Engineer] has a great introduction to making six measurements with an Arduino as a test device.

To follow along youll need an Arduino UNO and a two-channel (or better) scope. Actually, most of the measurements would probably work on any Arduino, but there are some that require the separate USB to serial chip like that found on the UNO and similar boards.

The six measurements are:

  1. The auto reset programming pulse
  2. Capture and decode serial data
  3. Noise on the power rail
  4. Observe probe loading effects
  5. PWM duty cycle
  6. The timing of pin manipulation code

Some of these measurements use a bit of Arduino code, while others just make use of the circuitry on the board no matter what software is running.

Not only does the post show you where to make the measurements and what the result should look like, theres also a discussion of what the measurement means and some suggested things to try on your own.

If you go through this post, you might also enjoy learning more about probes. If you are feeling adventurous, you can even build your own current probe.


UMaxHosting 50GB RAID-10 VPS for $1.95/mo with a month free and more! Low End Box

John from UMaxHosting has submitted their first offer ever with us! They are offering OpenVZ based virtual services out of Los Angeles and New York. They started with New York and are now expanding over to the west coast! We hope you enjoy what they have to offer and please let us know of any questions/comments/concerns you may have below.

Heres what they had to say:

UMaxHosting is a hosting provider that specializes in providing maximum performance at the lowest cost possible. UMaxHosting provides a low latency network backed with a 99.9% network uptime guarantee. Additionally, our support staff are available 247 to assist our customers with any questions they may have. Our staff are also working behind the scenes to ensure our mission statement is constantly being delivered, without any shortcuts being taken!

Our Mission Statement: To deliver the highest level of hosting performance at the best value possible. To adapt to customer requirements and provide personalized service.

***** Order any LEB special below and get 1 month free on top of your next due date! Open a ticket to our Billing Department to claim your free month after you have ordered. *****

256MB Plan

  • 1 CPU Core
  • 256MB DDR3 RAM
  • 256MB vSwap
  • 50GB RAID-10 Storage
  • 2000GB Monthly Bandwidth
  • 100Mbps Network Port
  • SolusVM Control Panel
  • Any Linux OS
  • Unlimited OS Reinstalls
  • Full Root Privileges
  • Instant Deployment
  • Easy API Access
  • $1.95/mo [ORDER]

1GB Plan

  • 2 CPU Cores
  • 1024MB (1GB) DDR3 RAM
  • 1024MB (1GB) vSwap
  • 70GB RAID-10 Storage
  • 3000GB Monthly Bandwidth
  • 100Mbps Network Port
  • SolusVM Control Panel
  • Any Linux OS
  • Unlimited OS Reinstalls
  • Full Root Privileges
  • Instant Deployment
  • Easy API Access
  • $9/qtr OR $18/yr [ORDER]

6GB Plan

  • 4 CPU Cores
  • 6144MB (6GB) DDR3 RAM
  • 6144MB (6GB) vSwa...


Astronaut Chris Hadfield says the rockets from NASA, SpaceX, and Blue Origin wont take people to Mars Lifeboat News: The Blog

Sorry, Elon.

Chris Hadfield, a former astronaut, says the future rockets and spaceships of NASA, SpaceX, and Blue Origin would be too risky to get people to and from Mars. He thinks we need some possibly outlandish solutions for space travel to make round-trip travel to the red planet practical.


Week in review: Digital signature spoofing, securing microservices Help Net Security

Heres an overview of some of last weeks most interesting news and articles: Fooling security tools into believing malicious code was signed by Apple Security, incident response, and forensics processes and personnel use code signing to weed out trusted code from untrusted code. To undermine a code signing implementation for a major OS would break a core security construct that many depend on for day to day security operations. Patch management is not just ITs More

The post Week in review: Digital signature spoofing, securing microservices appeared first on Help Net Security.


Elon Musk: I Am a Socialist Lifeboat News: The Blog

Tesla CEO and PayPal billionaire Elon Musk surprised many Friday when he declared on Twitter that he is a socialist. Conservative critics, however, may well have agreed, given his companies reliance on the state.


DistroWatch Weekly, Issue 768 News

This week in DistroWatch Weekly: Review: Devuan GNU+Linux 2.0.0 "ASCII"News: The world's fastest super computer runs Red Hat, openSUSE's supported ARM devices, new NOVA filesystem coming to Linux, OpenBSD offers better handling of cron outputSoftware review: Building packages with pkgsrcReleased last week: deepin 15.6, NethServer 7.5, Univention Corporate....


HPR2576: My swedish and german podcasts part 1 Hacker Public Radio

P1 Sprket P1 Vetenskapsradion Historia Medierna i P1 @mediasres Europa heute Computer und Kommunikation


Smoking and Diabetes Linked to Brain Calcifications SoylentNews

People who smoke or have diabetes may be at increased risk of calcifications in a region of the brain crucial to memory, according to a new study published online in the journal Radiology.

Dementia is a major public health problem that affects tens of millions of people worldwide. One focus of dementia research has been the hippocampus, a brain structure important for both short- and long-term memory storage. Alzheimer's disease, the most common type of dementia, is associated with atrophy of the hippocampus.

Researchers have hypothesized that abnormal buildups of calcium, or calcifications, in the hippocampus may be related to vascular problems that could contribute to hippocampal atrophy and subsequent cognitive deterioration. However, published research on the association between hippocampal calcification and cognitive impairment is limited.

"We know that calcifications in the hippocampus are common, especially with increasing age," said the study's lead author, Esther J.M. de Brouwer, M.D., a geriatrician at the University Medical Center in Utrecht, the Netherlands. "However, we did not know if calcifications in the hippocampus related to cognitive function."

Advances in imaging have provided opportunities to explore the role of hippocampal calcifications in dementia. The development of multiplanar brain CT scans has enabled better distinction between hippocampal calcifications and calcifications in nearby brain structures like the choroid plexus.

"A multiplanar CT scan makes it possible to see the hippocampus in different anatomical planes; for example, from top to bottom, right to left and front to back," Dr. de Brouwer said. "Before multiplanar CT scans, hippocampal calcifications were often mistaken for choroid plexus calcifications. So with multiplanar CT scans, hippocampal calcifications are better distinguished from calcifications in other areas."

[...] The researchers plan to carry out additional studies in different groups of people to better understand possible links between these calcifications and cognitive problems.

Original Submission

Read more of this story at SoylentNews.


EXT4 fscrypt vs. eCryptfs vs. LUKS dm-crypt Benchmarks Phoronix

Given the recent advancements of the EXT4 file-system with its native file-system encryption support provided by the fscrypt framework, here are benchmarks comparing the performance of an EXT4 file-system with no encryption, fscrypt-based encryption, eCryptfs-based encryption, and a LUKS dm-crypt encrypted volume.


Notes on "The President is Missing" Errata Security

Former president Bill Clinton has contributed to a cyberthriller "The President is Missing", the plot of which is that the president stops a cybervirus from destroying the country. This is scary, because people in Washington D.C. are going to read this book, believe the hacking portrayed has some basis in reality, and base policy on it. This "news analysis" piece in the New York Times is a good example, coming up with policy recommendations based on fictional cliches rather than a reality of what hackers do.

The cybervirus in the book is some all powerful thing, able to infect everything everywhere without being detected. This is fantasy no more real than magic and faeries. Sure, magical faeries is a popular basis for fiction, but in this case, it's lazy fantasy, a cliche. In fiction, viruses are rarely portrayed as anything other than all powerful.

But in the real world, viruses have important limitations. If you knew anything about computer viruses, rather than being impressed by what they can do, you'd be disappointed by what they can't.

Go look at your home router. See the blinky lights. The light flashes every time a packet of data goes across the network. Packets can't be sent without a light blinking. Likewise, viruses cannot spread themselves over a network, or communicate with each other, without somebody noticing -- especially a virus that's supposedly infected a billion devices as in the book.

The same is true of data on the disk. All the data is accounted for. It's rather easy for professionals to see when data (consisting of the virus) has been added. The difficulty of anti-virus software is not in detecting when something new has been added to a system, but automatically determining whether it's benign or malicious. When viruses are able to evade anti-virus detection, it's because they've been classified as non-hostile, not because they are invisible.

Such evasion only works when hackers have a focused target. As soon as a virus spreads too far, anti-virus companies will get a sample, classify as malicious, and spread the "signatures" out to the world. That's what happened with Stuxnet, a focused attack on Iran's nuclear enrichment program that eventually spread too far and got detected. It's implausible that anything can spread to a billion systems without anti-virus companies getting a sample and correctly classifying it.

In the book, the president creates a team of the 30 brightest cybersecurity minds the country has, from government, the private sector, and even convicted hackers on parole from jail -- each more brilliant than the last. This is yet another lazy cliche about genius hackers.

The cliche comes from the fact that it's rather easy to impress muggles with magic tricks. As soon as somebody shows an ability to do something...


Canonical Shifts Its Fiscal Year Ahead Of Likely IPO Phoronix

You have likely heard by now about Ubuntu maker Canonical planning to do an initial public offering (IPO) at some point in the not too distant future to become a publicly-traded company. The latest sign of that is Canonical has now shifted its corporate calendar...


Hackaday Links: June 17, 2018 Hackaday

Do you like badges? Of course you like badges. Its conference season, and that means its also badge season. Well good news, Tindie now has a badge category. Right now, its loaded up with creepy Krustys, hypnotoads, and fat Pikas. Theres also an amazing @Spacehuhn chicken from [Dave]. Which reminds me: we need to talk about a thing, Spacehuhn.

On the list of weird emails we get in the tip line comes Rat Grease. Rat Grease is the solution to rodents chewing up cabling and wires. From what we can gather, its a mineral oil-based gel loaded up with capsaicin; its not a poison, and not a glue. Rats are our friends, though, which makes me want to suggest this as a marinade, or at the very least a condiment. The flash point is sufficiently high that you might be able to use this in a fryer.

[Matthias Wandel] is the guy who can build anything with a table saw, including table saws. He posts his stuff online and does YouTube videos. A while back, he was approached by DeWalt to feature their tools in a few videos. He got a few hand tools, a battery-powered table saw, and made some videos. The Internet then went insane and [Matthias] lost money on the entire deal. Part of the reason for this is that his viewers stopped buying plans simply because he featured yellow power tools in his videos. This is dumpster elitism, and possibly the worst aspect of the DIY/engineering/maker community.

Elon Musk is the greatest inventor ever. No scratch that. The greatest person ever. Need more proof? The CEO of Tesla, SpaceX, and our hearts has been given the green light to build a high-speed underground train from Chicago OHare to downtown. Heres the kicker: hes going to do it for only $1 Billion, or $55 Million per mile, making it the least expensive subway project by an order of magnitude. Yes, Subways usually cost anywhere between $500 to $900 Million per mile. How is he doing it? Luck, skill, and concentrated power of will. Elon is the greatest human ever, and were not just saying that to align ourselves with an audience that is easy to manipulate; were also saying this because Elon has a foggy idea for a media vetting wiki.



Four billion years of evolution in six minutes Lifeboat News: The Blog

Did humans evolve from monkeys or from fish? In this enlightening talk, ichthyologist and TED Fellow Prosanta Chakrabarty dispels some hardwired myths about evolution, encouraging us to remember that were a small part of a complex, four-billion-year process and not the end of the line. Were not the goal of evolution, Chakrabarty says. Think of us all as young leaves on this ancient and gigantic tree of life connected by invisible branches not just to each other, but to our extinct relatives and our evolutionary ancestors.


Elizabeth Holmes Steps Down as Theranos CEO as DoJ Levels Charges SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

Elizabeth Holmes steps down as Theranos CEO as DOJ levels charges

CNBC is reporting that Elizabeth Holmes has stepped down from her position as CEO of Theranos and the Department of Justice has indicted her on alleged wire fraud. Both the company and Holmes have been embroiled in scandal following reports that the blood tests it claimed to be working on weren't actually effective. Earlier this year, the Securities and Exchange Commission charged Holmes and Theranos with fraud.

[...] Along with Holmes, Ramesh "Sunny" Balwani, former president of Theranos, is being charged by the DOJ as well. Both Holmes and Balwani appeared before US Magistrate Judge Susan van Keulen today where they were arraigned on nine counts of wire fraud and two counts of conspiracy to commit wire fraud. [...] CNBC reports that Holmes will still chair Theranos' board and the company's general counsel, David Taylor, has been appointed CEO. If convicted, Holmes and Balwani face a maximum prison sentence of 20 years, a $250,000 fine and restitution for each count of wire fraud.

Original Submission

Read more of this story at SoylentNews.


Links 17/6/2018: Linux 4.18 RC1 and Deepin 15.6 Released Techrights

GNOME bluefish



  • Desktop

  • Server

    • Five Supercomputers That Arent Supercomputers

      A supercomputer, of course, isnt really a computer. Its not one giant processor sitting atop an even larger motherboard. Instead, its a network of thousands of computers tied together to form a single whole, dedicated to a singular set of tasks. They tend to be really fast, but according to the folks at the International Supercomputing Conference, speed is not a prerequisite for being a supercomputer.

      But speed does help them process tons of data quickly to help solve some of the worlds most pressing problems. Summit, for example, is already booked for things such as cancer research; energy research, to model a fusion reactor and its magnetically confined plasma tohasten commercial development of fusion energy; and medical research using AI, centering around identifying patterns in the function and evolution of human proteins and cellular systems to increase understanding of Alzheimers, heart disease, or addiction, and to inform the drug discovery process.

    • Office 365 is suffering widespread borkage across Blighty

      Some users are complaining that O365 is completely unusable with others are reporting a noticeable slowdown, whinging that its taking 30 minutes to send and receive emails.

  • ...


Smile, its the Future! Emotions, Mixed Reality, and Techno-Telepathy Lifeboat News: The Blog

Let me propose a hypothetical future scenario: Lets say that weve since developed an advanced method of brain-to-brain (B2B) communication, to which, naturally, has become quite popular among the younger generation of that time.

How might we judge futuristic societies using our present day standards? Better yet, how might the past have judged us today and would there be a difference?


[$] 4.18 Merge window, part 2

By the time that Linus Torvalds released 4.18-rc1 and closed the merge window for this development cycle, 11,594 non-merge changesets had found their way into the mainline kernel repository. Nearly 4,500 of those were pulled after last week's summary was written. Thus, in terms of commit traffic, 4.18 looks to be quite similar to its predecessors. As usual, the entry of significant new features has slowed toward the end of the merge window, but there are still some important changes on the list.


Authorities shut down Dark Web marketplace Black Hand HackRead

By Carolina

In a joint operation, French police, the National Directorate of Intelligence

This is a post from Read the original post: Authorities shut down Dark Web marketplace Black Hand


Using IMUs For Odometry Hackaday

The future is autonomous robots. Whether that means electric cars with rebranded adaptive cruise control, or delivery robots that are actually just remote control cars, the robots of the future will need to decide how to move, where to move, and be capable of tracking their own movement. This is the problem of odometry, or how far a robot has traveled. There are many ways to solve this problem, but GPS isnt really accurate enough and putting encoders on wheels doesnt account for slipping. Whats really needed for robotic odometry is multiple sensors, and for that we have [Pablo] and [Alfonso]s entry to the Hackaday Prize, the IMcorder.

The IMcorder is a simple device loaded up with an MPU9250 IMU module that has an integrated accelerometer, gyro, and compass. This is attached to an Arduino Pro Mini and a Bluetooth module that allows the IMcorder to communicate with a robots main computer to provide information about a robots orientation and acceleration. All of this is put together on a fantastically tiny PCB with a lithium battery, allowing this project to be integrated into any robotics project without much, if any, modification.

One interesting aspect of the IMcorders is that they can be used for robot kidnapping issues. This, apparently, is an issue when it comes to robots and other electronic detritus littering the sidewalks. Those electric scooters abandoned on the sidewalk in several cities contain some amazing components that are ripe for some great hardware hacking. Eventually, were going to see some news stories about people stealing scooters and delivery robots for their own personal use. Yes, its a cyberpunks dream, but the IMcorder can be used for a tiny bit of theft prevention. Pity that.

The HackadayPrize2018 is Sponsored by:


Another Alleged Murderer Shaken Out of the Family Tree SoylentNews

The Associated Press and the Everett Washington HeraldNet carry a story about a 30 year old double murder solved using Public Genealogy Sites similar to the Golden State Killer story carried here on SoylentNews.

Deaths of two Canadian visitors shopping in the Seattle area were unsolved since 1987.

The deaths remained a mystery for more than 30 years, until DNA led to a major breakthrough. A genealogist, CeCe Moore, worked with experts at Parabon NanoLabs to build a family tree for the suspect, based on the genetic evidence recovered from the crime scenes. They used data that had been uploaded by distant cousins to public genealogy websites. They pinpointed a suspect, Talbott, a trucker living north of Sea-Tac International Airport.

Police kept him under surveillance until a paper cup fell from his truck in Seattle in early May. A swab of DNA from the cup came back as a match to the evidence that had waited 30 years. Before then, Talbott had never been considered a suspect. Days later he was in handcuffs.

This time the police used Parabon NanoLabs (more well-known for generating facial models from mere samples of DNA) to build a family tree of the killer by submitting the 30 year old crime scene DNA samples to multiple genealogy sites.

Results from those sites were combined by a Parabon genealogist to map the family of distant cousins found in those data bases. Police were then able to narrow down the list using other methods unmentioned.

Neither article mentions if any family members were stalked by police while being eliminated as suspects, or whether any samples were submitted by other family members.

Original Submission

Read more of this story at SoylentNews.


Astronauts install hi-def docking cameras for Crew Dragon, Starliner capsules Lifeboat News: The Blog

In preparation for the commercial crewed modules that will arrive at the International Space Station soon, astronauts took a lengthy spacewalk to install some crucial equipment to the docking module. The extra-vehicular activity moved commander Drew Feustel to third on the list of all-time spacewalkers.


Watch Hyper-Realistic Skin Get Made for Bionic Limbs Lifeboat News: The Blog

Watch extremely realistic limbs, complete with hair and freckles, get made from beginning to end.


The Universe Is Not a Simulation, but We Can Now Simulate It Lifeboat News: The Blog

Computer simulations have become so accurate that cosmologists can now use them to study dark matter, supermassive black holes, and other mysteries of the real evolving cosmos.


You can now load tool input from URLs good coders code, great coders reuse

You can now pass input data to all tools via ?input-url=URL query argument.

Check out this example - Load a GIF from Giphy and extract 15th frame from it as a PNG.

In this example GIF's URL is:

And ?input-url query is:


Full url to a tool that extracts 15th frame:

Input-url query argument also works with chaining.

Here's an example - Load a good boi JPG from Imgur, flip it horizontally, convert to grayscale and change JPG output quality to 5%.

Image tools also accepts input images as Data URI encoded data via ?input argument.

Here's an example -...


Combining Laser And Particle Beams For Interstellar Travel Lifeboat News: The Blog

By jan mcharg, texas A&M university college of engineering

A new technology combining a laser beam and a particle beam for interstellar propulsion could pave the way for space exploration into the vast corners of our universe. This is the focus of PROCSIMA, a new research proposal by Dr. Chris Limbach and Dr. Ken Hara, assistant professors in the Department of Aerospace Engineering at Texas A&M University.

NASA has chosen the proposal PROCSIMA: Diffractionless Beam Propulsion for Breakthrough Interstellar Missions, for the 2018 NASA Innovative Advanced Concepts (NIAC) phase 1 study. PROCSIMA stands for Photon-paRticle Optically Coupled Soliton Interstellar Mission Accelerator, and is meant to evoke the idea that interstellar travel is not so far away.


To Keep the Patent System Alive and Going Practitioners Will Have to Accept Compromises on Scope Being Narrowed Techrights

They want to keep the pie and eat it as well

Big pie

Summary: 35 U.S.C. 101 still squashes a lot of software patents, reducing confidence in US patents; the only way to correct this is to reduce patent filings and file fewer lawsuits, judging their merit in advance based on precedents from higher courts

THE USPTO has undergone quite a few changes in recent years, triggered initially by AIA and then SCOTUS downwards (trickling down to lower courts over time).

The patent microcosm prefers to cherry-pick cases based on their outcome.Among the main casualties? Software patents. The patent microcosm prefers to cherry-pick cases based on their outcome. The latest such example is Zeroclick v Apple, a Federal Circuit (CAFC) case from the very start of this month [PDF]. We wrote about it a couple of days later and Watchtroll did too (a relatively long time afterwards); its said to be about (G)UI code even though theres no such thing (in programming theres a callback function associated with pertinent GUI elements, but the GUI itself is just a layout, which could possibly be seen as copyrighted). Anyway, this isnt a case about software patents or even 101/Alice. Some say it is about 112. Those same people (or a colleague, Charles Bieneman) speak of DDR Holdings, which is utterly desperate to salvage some abstract patents from 101; the famous case of DDR Holdings was mentioned a lot in 2016 (even here, e.g. [1, 2,...


DoJ Lets Cops Know SESTA/FOSTA Is For Shutting Down Websites, Not Busting Sex Traffickers SoylentNews

DOJ Lets Cops Know SESTA/FOSTA Is For Shutting Down Websites, Not Busting Sex Traffickers

[SESTA/FOSTA] is in force and all it's doing is hurting efforts to track down sex traffickers and harming sex workers whose protections were already minimal. Sex traffickers, however, don't appear to be bothered by the new law. But that's because the law wasn't written to target sex traffickers, as a top DOJ official made clear at a law enforcement conference on child exploitation. Acting Assistant Attorney General John P. Cronan's comments make it clear SESTA/FOSTA won't be used to dismantle criminal organizations and rescue victims of sex traffickers. It's there to give the government easy wins over websites while sex traffickers continue unmolested.

In April, the internet's leading forum to advertise child prostitution was seized and shut down, thanks to the collective action by CEOS and our federal and state partners. The Backpage website was a criminal haven where sex traffickers marketed their young victims. The Backpage takedown and the contemporaneous arrests of individuals allegedly responsible for administering the site struck a monumental blow against child sex traffickers.

But other sites inevitably will seek to fill the void left by Backpage, and we must be vigilant in bringing those criminals to justice as well. With the recent passage of the SESTA-FOSTA legislation, state and local prosecutors are now positioned to more effectively prosecute criminals that host online sex trafficking markets that victimize our children.

"Criminals" that "host sex trafficking markets." That's the target. That's any website that might be used by actual sex traffickers to engage in actual sex trafficking. There's no dedicated web service for sex trafficking -- at least not out in the open where Section 230 immunity used to matter. This is all about taking down websites for hosting any content perceived as sex trafficking-related. It wasn't enough to hang Backpage and its execs. The government will be scanning sites for this content and then targeting the website for content posted by third parties it seems mostly uninterested in pursuing.



Torrents Turn Rambo-Prequel Novel into a Success TorrentFreak

In this day and age, aspiring artists have access to a wide variety of tools they can use to create a decent product.

Creating something is easy, but the real challenge is to escape obscurity and get noticed by the public.

Traditionally, this task has been fulfilled by major publishers and other media distributors, but there are also alternative routes.

The stories of YouTube sensations who turned into their own media empires come to mind. But in darker corners of the web, which are mostly associated with piracy, there are success stories too.

This week we spoke to Italian author Wallace Lee, whose unofficial Rambo-prequel Rambo Year One received great reviews after relying on torrents as a main distribution channel.

Lees story starts several years ago, when he began publishing short Rambo stories on a personal blog hosted by WordPress. It was fan-fiction in its purest form, but the author soon realized that not everyone was happy with his work.

Two years before free-sharing my first novel, I had a blog where I used to post my Rambo prequel short tales for free. And yet, a few months later, my site was shut down because the laws in the US allow copyright owners to stop fanfiction too, and even if its just for free.

It turned out that a rightsholder objected to his use of the Rambo character. While Lee doesnt recall the sender of the notice, it meant that he could no longer publish his work as he pleased.

Caught in a copyright stranglehold, the author felt limited in his creative expression. Ironically, he saw torrents as his way out. If he published his works on The Pirate Bay, copyright holders couldnt touch him, he thought.

It was a defiant thought, which may have worked, but luckily for him, it didnt get that far. Instead of becoming a pirate writer, Lee received permission from David Morrell, author of the novel First Blood on which the Rambo empire was built.

Frankly, I feel very lucky things ended up this way because I did not want to be at war with the same guys who owned Rambo in the first place, Lee tells TorrentFreak.

With permission to freely share his book, the unofficial Rambo-prequel was finally released. While Lee no longer had to turn to piracy, he was still committed to using torrent sites to get exposure and escape obscurity.

That worked to a certain degree. The book was picked up here and there, but without a major publisher, it was hard to be taken seriously by literary critics.

The prejudice was extremely harsh and lasted for a very long time. For one whole year at least, I was just th...


Retrotechtacular: Car Navigation Like Its 1971 Hackaday

Anyone old enough to have driven before the GPS era probably wonders, as we do, how anyone ever found anything. Navigation back then meant outdated paper maps, long detours because of missed turns, and the far too frequent stops at dingy gas stations for the humiliation of asking for directions. It took forever sometimes, and though we got where we were going, it always seemed like there had to be a better way.

Indeed there was, but instead of waiting for the future and a constellation of satellites to guide the way, some clever folks in the early 1970s had a go at dead reckoning systems for car navigation. The video below shows one, called Cassette Navigation, in action. It consisted of a controller mounted under the dash and a modified cassette player. Special tapes, with spoken turn-by-turn instructions recorded for a specific route, were used. Each step was separated from the next by a tone, the length of which encoded the distance the car would cover before the next step needed to be played. The controller was hooked to the speedometer cable, and when the distance traveled corresponded to the tone length, the next instruction was played. Theres a long list of problems with this method, not least of which is no choice in road tunes while using it, but given the limitations at the time, it was pretty ingenious.

Dead reckoning is better than nothing, but its a far cry from GPS navigation. If youre still baffled by how that cloud of satellites points you to the nearest Waffle House at 3:00 AM, check out our GPS primer for the details.

Thanks for the tip, [Chaffel]

[via Jalopnik]


Harvard Rewinds the Biological Clock of Time Lifeboat News: The Blog

Investigators at Harvard Medical School have identified the key cellular mechanisms behind vascular aging and its effects on muscle health, and they have successfully reversed the process in animals.

The scientists used a chemical compound thats an NAD+ booster called NMN which plays a critical role in repairing cellular DNA as well as maintaining cell vitality to test what would happen.

Could reversing the aging of blood vessels hold the key to restoring youthful vitality? If the old adage you are as old as your arteries reigns true then the answer is yes, at least in mice.

According to a new study by Harvard Medical School researchers, they have identified the cellular mechanisms that cause the aging of vascular arteries as well as the effects of such aging on the health of muscles. The Medical team was also able to successfully reverse this aging process.

What these findings seem to indicate is that theres a glitch in the normal crosswalk between both muscles and blood vessels and keeping both tissues healthy. The scientists were also able reverse the demise of blood vessels and muscle atrophy in the aging mice by using the synthetic precursors of two molecules naturally present in the body. This boosted their exercise endurance in the process.

The Medical team is excited because such a breakthrough will now pave the way to identifying new therapies for humans.

Study senior investigator David Sinclair, professor in the Department of Genetics at Harvard Medical School and co-director of the Paul F. Glenn Center for the Biology of Aging at Harvard Medical School stated weve discovered a way to reverse vascular aging by boosting the presence of naturally occurring molecules in the body that augment the physiological response to exercise.

Because there are some very important differences in biology between humans and mice theres a possibility that this treatment may not have the same effect in humans. Nonetheless, the research team plans to follow through with human clinical trials because the results of this experiment were important enough to prompt the research team in doing so.

Sinclair, wh...


Dust Clouds Can Explain Puzzling Features of Active Galactic Nuclei SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

[...] A new analysis by researchers at UC Santa Cruz, published June 14 in Monthly Notices of the Royal Astronomical Society, explains these and other puzzling features of active galactic nuclei as the result of small clouds of dust that can partially obscure the innermost regions of AGNs.

[...] The findings have important implications because researchers use the optical emissions from the broad-line region to make inferences about the behavior of the gases in the inner regions around a supermassive black hole.

[...] "Once the dust crosses a certain threshold it is subjected to the strong radiation from the accretion disk," said Harrington. "This radiation is so intense that it blows the dust away from the disk, resulting in a clumpy outflow of dust clouds starting at the outer edge of the broad-line region."

The effect of the dust clouds on the light emitted is to make the light coming from behind them look fainter and redder, just as Earth's atmosphere makes the sun look fainter and redder at sunset. In their paper, Gaskell and Harrington present several lines of observational evidence supporting the existence of such dust clouds in the inner regions of active galactic nuclei. They developed a computer code to model the effects of dust clouds on observations of the broad-line region.


Original Submission

Read more of this story at SoylentNews.


DSLWP-B first JT4G test Daniel Estvez

Yesterday, between 9:00 and 11:00, DSLWP-B made its first JT4G 70cm transmissions from lunar orbit. Several stations such as Cees Bassa and the rest of the PI9CAM team at Dwingeloo, the Netherlands, Fer IW1DTU in Italy, Tetsu JA0CAW and Yasuo JA5BLZ in Japan, Mike DK3WN in Germany, Jiang Lei BG6LQV in China, Dave G4RGK in the UK, and others exchanged reception reports on Twitter. Some of them have also shared their recordings of the signals.

Last week I presented a JT4G detection algorithm intended to detect very weak signals from DSLWP-B, down to -25dB SNR in 2500Hz. I have now processed the recordings of yesterdays transmissions with this algorithm and here I look at the results. I have also made a Python script with the algorithm so that people can process their recordings easily. Instructions are included in this post.

The JT4G transmissions are made just after the end of each GMSK telemetry packet, as illustrated by the following figure made by Cees Bassa using the signals he received at Dwingeloo. Also note that the JT4G signal starts at an UTC minute, as it is common with WSJT-X modes. The frequency of the lowest JT4G tone seems to be 1kHz higher than the GMSK carrier.

GMSK and JT4G signals from DSLWP-B recorded by Cees Bassa at PI9CAM

As far as I know, the following stations have shared recordings of the JT4G signals:...


17jun2018 Trivium


The Affairs of the USPTO Have Turned Into Somewhat of a Battle Against the Courts, Which Are Simply Applying the Law to Invalidate US Patents Techrights

Poor assessment of patent applications can now be stopped or compensated for by the Patent Trial and Appeal Board (PTAB) and, failing that, the Court of Appeals for the Federal Circuit (CAFC)

A death squad
A death squad is what patent maximalists nowadays call a court (where the only casualty is a piece of paper, or a low-quality patent which US law renders invalid)

Summary: The struggle between law, public interest, and the Cult of Patents (which only ever celebrates more patents and lawsuits) as observed in the midst of recent events in the United States

THE ideology of patent maximalism is a toxic one and it is infectious only within circles that sell, trade, and exploit patents for litigation, not innovation. Its all about financial motivations and those motivated to spread patent maximalism typically profit from mass litigation. Its their most expensive product or service as it can last several years (appeals, discovery, so-called damages with a cut for respective law firms).

They dont seem to care about facts, only mythology and beliefs.Earlier this year we started habitually referring to patent maximalism (of the patent microcosm) as Cult of Patents because it has become almost like a religion to these people. They dont seem to care about facts, only mythology and beliefs.

A reader suggested this chart as we approach U.S. Patent No. 10,000,000, Patently-O wrote on Friday. As we said before, its a pretty meaningless milestone from this Cult of Patents (the patent maximalists). Half a decade or so after Alice and nearly a decade after the Bilski case the Office just granted far too many patents far too fast. Look at the rate of expansion of grants; do people invent twice as many things today as they did about a decade ago? Or a hundred times more than a century ago? Or maybe its just patent maximalism taking over, dubbing just about anything an invention and justifying/ permitting a monopoly on it?

Earlier this year we started habitually referring to patent maximalism (of the patent microcosm) as Cult of Patents because it has become almost like a religion to these people. They dont seem to care about f...


How to turn tutoring from a part-time job into a successful business TechWorm

Tutoring is a fantastic way to earn some cash on the side. Whether youre a full time student doing some tutoring after classes or on weekends, or just trying to help your friendly neighbors get their GEDs, it can be a very satisfying and fulfilling experience.

But is there a way you could turn that part time job into a successful business and start earning serious cash while doing something that you love?

Were here to tell you that there is a way and that its much simpler than you think. You can use your tutoring skills to create something long lasting and meaningful and were here to show you how.

Create a website

Nothing is better at showcasing you and your business than a well made website. SITE123 is a free website builder that allows its users to create beautifully designed, fully responsive websites for free.

Use SITE123 to create a personal website that will make you look more professional and dedicated. Add your biography and your educational background to the About me page, and include testimonials from your former or current students.

Add a booking widget

Youll need a powerful calendar/booking tool to keep track of all of your students and classes, and luckily SITE123 has a few amazing ones to offer.

SITE123 currently offers Zapla, SimplyBookMe and Tockify, some of the best online booking apps available today. It fits seamlessly into your website and simplifies your scheduling and record keeping.

It even sends out confirmation and reminder emails to your students when their appointment is due.

Add a pricing chart

Being transparent with your fees will make you look more professional and trustworthy. Browsing SITE123s App Market, youll come across a few Ninja apps like Pricer Ninja and Charts Ninja. Add them to your website to make your pricing clear and visible. Add a short description of each class you teach and a price per hour per course.

Add videos

Having additional teaching material on your website will help your students learn more about your classes. Create a video and upload it via Huzzaz, a video gallery app you can add to your website. The player fits perfectly into any design and is incredibly fast and responsive.


Having an online base for your tutoring business will help it grow. Your students will have a quick and easy way to book appointments and share your website with their friends and family. Spending a lazy afternoon on your website can definitely bring more opportunities in the future.

Ready to grow your tutoring business? Create a website now.

The pos...


Patent Marketing Disguised as Patent Advice Techrights

Sheep and wolf

Summary: The meta-industry which profits from patents and lawsuits claims that its guiding us and pursuing innovation, but in reality its sole goal is enriching itself, even if that means holding science back

WED LIKE to take a moment aside from the usual EPO and USPTO focus. Something ought to be said which was said here many times before but merits extra emphasis.

The problem is, such patent consultants or practitioners or whatever they call themselves are rarely independent and impartial observers.When it comes to patent advisors, their motivation is usually to get more business or returning customers. This means that advice would likely gravitate towards lawsuits, even futile ones that cannot be won. The problem is, such patent consultants or practitioners or whatever they call themselves are rarely independent and impartial observers. Theyre personally involved and theyre immersed in a particular industry that relies on certain activities a subject we shall cover separately in our next post.

Patent attorneys and lawyers are typically in the business of advising on how to manage the mess which they themselves create (or at least perpetuate); we say so with no intention of offending anyone in particular. Its just putting the simple truth out there. Sure, there are some attorneys and lawyers who are honest and with great integrity (some of them send us information and material); some are willing to express the occasional dissent towards patent maximalism at great risk of being framed traitors to their profession. But theyre the exception rather than the norm. They wont be the ones to become abundantly wealthy.

The latter prior art is very important as it helps document the history of science and credit/attribute the correct people for their contribution to the sciences.To give a couple of examples from several hours ago, over at Patent Docs they now market or promote some upcoming webinars (Patent Portfolio Management and...


FPV-Rover 2.0 Has 3D Printed Treads and Plenty of Zip Hackaday

[Markus_p] has already finished one really successful 3D printed tracked robot build. Now hes finished a second one using standard motors and incorporating what he learned from the first. The results are pretty impressive and you can see a video demo of the beast, below.

Most of the robot is PLA, although there are some parts that use PETG and flex plastic. There is an infrared-capable camera up front and another regular camera on the rear. All the electronics are pretty much off the shelf modules like an FPV transmitter and an electronic controller for the motors. Theres a servo to tilt the camera, as you can see in the second video.

The body fits together using nuts and magnets. The robot in the video takes a good beating and doesnt seem to fall apart so it must be sufficient. What appealed to us was the size of the thing. It looks like it would be trivially easy to mount some processing power inside or on top of the rover and it could make a great motion base for a more sophisticated robot.

Weve seen some similar projects, of course. This tracked robot uses mind control. And OpenWheel is a great place to get treads and other locomotion designs.

Looking for a tracked rover you can drive around on the desktop? [Markus_p] has one of those too!

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Sunday, 17 June


Two Critical flaws affect Schneider Electric U.motion Builder. Patch them now! Security Affairs


Short Gamma-Ray Bursts Do Follow Binary Neutron Star Mergers SoylentNews

Researchers at Oregon State University have confirmed that last fall's union of two neutron stars did in fact cause a short gamma-ray burst. The findings, published today [14 June] in Physical Review Letters, represent a key step forward in astrophysicists' understanding of the relationship between binary neutron star mergers, gravitational waves and short gamma-ray bursts.

Commonly abbreviated as GRBs, gamma-ray bursts are narrow beams of electromagnetic waves of the shortest wavelengths in the electromagnetic spectrum. GRBs are the universe's most powerful electromagnetic events, occurring billions of light years from Earth and able to release as much energy in a few seconds as the sun will in its lifetime. GRBs fall into two categories, long duration and short duration. Long GRBs are associated with the death of a massive star as its core becomes a black hole and can last from a couple of seconds to several minutes.

Short GRBs had been suspected to originate from the merger of two neutron stars, which also results in a new black hole -- a place where the pull of gravity from super-dense matter is so strong that not even light can escape. Up to 2 seconds is the time frame of a short GRB.

Read more of this story at SoylentNews.


Zapcc Caching C++ Compiler Open-Sourced Phoronix

Remember the Zapcc compiler that focused on lightning fast compiler times? It's now been open-sourced...


How Human Hibernation Will Soon Get Us to Mars Lifeboat News: The Blog

Itll be like that movie Passengers, but less creepy. #til


Features That Didn't Make It For The Mainline Linux 4.18 Kernel Phoronix

There are many changes and new features for Linux 4.18 with the merge window having just closed on this next kernel version, but still there are some prominent features that have yet to work their way to the mainline tree...


ClipboardWalletHijacker malware replaces address to steal cryptocurrency HackRead

By Waqas

The IT security researchers at Qihoo 360 Total Security have discovered

This is a post from Read the original post: ClipboardWalletHijacker malware replaces address to steal cryptocurrency


All Box, no Boom : The Technics Sitman Techmoan

The Co-Deck was Technics (rushed?) response to the runaway success of the Sony Walkman.

After the Sony Walkman arrived on the scene in 1979 at a price of 33,000 Yen the Technics Co-Deck M1 turned up in 1980 at a price of 29,800 Yen.  Whilst also being a portable cassette player, this was a very different machine in a form-factor that was never to be repeated. A look inside reveals a tell tale mystery button that gives away its simple origins.

FAQs including an update on the operation of the Rewind Auto-play function can be found in the youtube comments.


Dems seek to seize on data privacy as midterm issue The Hill: Technology Policy

Democrats are looking to seize on growing public worries about data privacy to rally voters in the upcoming midterms.Tech policy typically ranks low on an average voters list of priorities, prompting skepticism that data privacy can move the needle...


Satori botnet is back again, experts observed a surge in port scan activity associated with it Security Affairs

This week, security experts observed a surge in port 8000 scan activity, researchers at  Qihoo 360 Netlab determined that the unusual activity was associated with Satori IoT botnet.

Experts from Qihoo 360 Netlab discovered that the author of the Satori botnet have integrated a the proof-of-concept (PoC) code for the XionMai web server software package after it was published on June 8.

The code recently included in the Satori botnet exploits a buffer overflow vulnerability, tracked as CVE-2018-10088, in XionMai uc-httpd 1.0.0. The exploit could be used by remote attackers to execute arbitrary code by sending a malformed package via ports 80 or 8000.

Two days ago, on 2018-06-14, we noticed that an updated Satori botnet began to perform network wide scan looking for uchttpd 1.0.0 devices. reads the report published by Qihoo 360 Netlab.

Most likely for the vulnerability of XiongMai uchttpd 1.0.0 (CVE-2018-10088). The scanning activities led to a surge in scanning traffic on ports 80 and 8000.

Satori botnet scan-on-port-80



FBI Recovers WhatsApp, Signal Data Stored on Michael Cohen's BlackBerry SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

Letter to judge reveals 731 pages of messages, call logs uncovered on one of two phones.

[...] The letter to Judge Kimba Wood stated that "the Government was advised that the FBI's original electronic extraction of data from telephones did not capture content related to encrypted messaging applications, such as WhatsApp and Signal... The FBI has now obtained this material."

In a letter to the presiding judge in the case against Michael Cohen, President Donald Trump's long-time personal attorney, the US Attorney's Office for the Southern District of New York revealed today that it had obtained additional evidence for reviewincluding a trove of messages and call logs from WhatsApp and Signal on one of two BlackBerry phones belonging to Cohen. The messages and call logs together constitute 731 pages of potential evidence. The FBI also recovered 16 pages of documents that had been shredded, but it has not yet been able to complete the extraction of data from the second phone.

This change is likely because of the way the messages are stored by the applications, not because the FBI had to break any sort of encryption on them. WhatsApp and Signal store their messages in encrypted databases on the device, so an initial dump of the phone would have only provided a cryptographic blob. The key is required to decrypt the contents of such a database, and there are tools readily available to access the WhatsApp database on a PC.


Original Submission

Read more of this story at SoylentNews.


Cheap Front Panels with Dibond Aluminium Hackaday

The production capability available to the individual hacker today is really quite incredible. Even a low-end laser engraver can etch your PCBs, and it doesnt take a top of the line 3D printer to knock out a nice looking enclosure. With the wide availability of these (relatively) cheap machines, the home builder can churn out a very impressive one-off device on a fairly meager budget. Even low volume production isnt entirely out of the question. But theres still one element to a professional looking device that remains frustratingly difficult: a good looking front panel.

Now if your laser is strong enough to engrave (and ideally cut) aluminum sheets, then youve largely solved this problem. But for those of us who are plodding along with a cheap imported diode laser, getting text and images onto a piece of metal can be rather tricky. On, [oaox] has demonstrated a cost effective way to create metal front panels for your devices using a print service that offers Dibond aluminum. Consisting of two thin layers of aluminum with a solid polyethylene core, this composite material was designed specifically for signage. Through various online services, you can have whatever you wish printed on a sheet of pre-cut Dibond without spending...


A Complete Look At Spectre V1/V2/V4 & Meltdown Phoronix

Canonical's Engineering Tech Lead, Gavin Guo, has passed along a big slide deck on a presentation he is preparing about the Spectre and Meltdown CPU vulnerabilities...


Fun with DBM-type databases... Open Source Security

Posted by Lionel Debroux on Jun 17


Many crashes upon offline data corruption in multiple database systems.
Only two of these DB systems patched after 4+ months. Much work needed
to backport fixes and move away from insecure & unmaintained DB systems.

In January, February and May 2018, I spent some of my free time fuzzing
a set of DBs more or less loosely from the DBM family, which are
packaged by Debian: LMDB, GDBM, freecdb, QDBM,...


Local User Tails Linux IP Leak SoylentNews

A compromised local user can leak your IP by using a script to start unsafe-browser hidden in the background and use X11 trickery to leak your real IP without privilege escalation. Most applications exploited on Tails would be capable of this.

deleting /etc/sudoers.d/zzz_unsafe-browser after booting will fix this issue until Tails fixes it themselves

Bug #15635

Feature #7072: Research potential for deanonymization by a compromised "amnesia" user

The Unsafe Browser allows to retrieve the public IP address by a compromised amnesia user with no user interaction

Original Submission

Read more of this story at SoylentNews.


Foxconn looks to AI after maker of Apple and Amazon products celebrates 30 years in China Lifeboat News: The Blog

That growth in factory worker salaries has been a double-edged sword for China. On one hand, it has increased the purchasing power of Chinese which in turn has powered consumer-led economic growth, but on the other it has made China less competitive on wages and forced companies like Foxconn to introduce more automation.

With 1 million employees and half a dozen factories contributing 4 per cent of the countrys export value, Foxconns expansion symbolises Chinas role as tech manufacturing powerhouse.


Sceper Set to Return After Attempted Sale Turned Into a Scam TorrentFreak

Earlier this year, TorrentFreak received a steady stream of emails from users of, one of the most popular release blog sites.

After about eight years of serving up links to large volumes of mainstream content, the site had apparently disappeared. There was no warning or indication of what may have transpired, but several weeks ago a message appeared on its homepage, indicating the platform was up for sale.

Intrigued as to why its operators had decided to throw in the towel, TF made contact seeking information. This week we received a response from part owner and long-standing editor Error but it wasnt what we were expecting.

The problems started when we stopped paying attention to our website due to real-life issues, Error explained.

Once we forgot to renew our domain which caused a few days of down time and more recently we switched to a new server and the payment renewal was not automated, so it expired. In the end, I decided it would be better to sell the site to a person who can actually take care of it and run it as we used to years back.

Error says that after putting the site up for sale they had a lot of responses from people with bids, but one individual stood out as a reasonable person with a decent offer.

In the world of warez, however, not many things are straightforward. Few people want to make their identities known and meeting people face to face is mostly out of the question. Error says he asked the prospective buyer to nominate an intermediary, such as a trusted and well-known person within the warez scene. The offer was declined.

[The buyer] said that he didnt trust anyone and was fine sending the money in two payments, half before he received the database and half after he was satisfied that he can work with the old database. Then the domain transfer could happen, Error explains.

The buyer identified himself as a former editor of a Sceper rival which had shut down under legal pressure back in 2012.

Additional proof came in the form of a panel screenshot which showed the buyer had access to a current scene release blog and other related domains. An email address used in correspondence with Error also belonged to the same blog, confirming the buyers identity.

Error says he hadnt heard of the release blog until that moment, bu...


Microsoft is Still Cybermobbing Its Competition Using Patent Trolls Such as Finjan Techrights

Protection offered only to those who pay Microsoft for Azure IP Advantage [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13,...


ClipboardWalletHijacker miner hijacks your Ether and Bitcoin transaction, over 300,000 computers have been infected Security Affairs

Researchers uncovered a new malware campaign spreading a clipboard hijacker dubbed ClipboardWalletHijacker that has already infected over 300,000 computers.

Security researchers from Qihoo 360 Total Security have spotted a new malware campaign spreading a clipboard hijacker, tracked as ClipboardWalletHijacker, that has already infected over 300,000 computers. Most of the victims are located in Asia, mainly China.

Recently, 360 Security Center discovered a new type of actively spreading CryptoMiner, ClipboardWalletHijacker. The Trojan monitors clipboard activity to detect if it contains the account address of Bitcoin and Ethereum. reads the analysis published by the company.

It tampers with the receiving address to its own address to redirect the cryptocurrency to its own wallet. This kind of Trojans has been detected on more than 300 thousand computers within a week.

Modus operandi for ClipboardWalletHijacker is not a novelty, the malware is able to monitor the Windows clipboard looking for Bitcoin and Ethereum addresses and replace them with the address managed by the malwares authors.

In March 2018, researchers at Palo Alto Networks discovered a malware dubbed ComboJack that is able of detecting when users copy a cryptocurrency address and alter clipboards to steal cryptocurrencies and payments.

In a similar way, ClipboardWalletHijacker aims at hijacking BTC and ETH transactions.

Experts observed the malware using the following addresses when replacing legitimate ones detected in users clipboards:

  • BTC: 1FoSfmjZJFqFSsD2cGXuccM9QMMa28Wrn1
  • BTC: 19gdjoWaE8i9XPbWoDbixev99MvvXUSNZL
  • ETH: 0x004D3416DA40338fAf9E772388A93fAF5059bFd5
below the function the replace the legitimate Ethereum wallet address with the attackers one:


Frozen Rat Kidney Shipping Container Hackaday

The biggest allure of 3D printing, to us at least, is the ability to make hyper-personalized objects that would otherwise fall through the cracks of our mass-market economy. Take, for instance, the Frozen Rat Kidney Shipping Container, or maybe some of the less bizarro applications in the US National Institute of Healths 3D Print Exchange.

The Exchange is dominated, at least in terms of sheer numbers, by 3D models of proteins and other biochemical structures. But there are two sections that will appeal to the hacker in you: prosthetics and lab equipment. Indeed, we were sent there after finding a nice model of a tray-agitator that we wanted to use for PCB etching. We havent printed one yet, but check out this flexible micropositioner.

While its nowhere near as comprehensive a resource as some other 3D printing model sites, the focus on 3D printing for science labs should really help those who have that particular itch to find exactly the right scratcher. Or a tailor-made flexible container for slicing frozen rat kidneys. Whatever youre into. We dont judge.

Man with skull image: [jaqtikkun]


Genode-Based Sculpt OS Now Available With Easy-To-Use Disk Image Phoronix

Sculpt OS is striving to become a general purpose operating system built off the Genode OS framework. The second release of Sculpt OS is now available and it's much easier now to try out...


SpinLaunch Gets $40 Million in Funding to Catapult Payloads Into Space SoylentNews

Startup SpinLaunch Inc. has received $40 million in funding. The company intends to use a centrifuge to catapult small payloads to the edge of space:

The company remains tight-lipped about exactly how this contraption will work, although its name gives away the basic idea. Rather than using propellants like kerosene and liquid oxygen to ignite a fire under a rocket, SpinLaunch plans to get a rocket spinning in a circle at up to 5,000 miles per hour and then let it gomore or less throwing the rocket to the edge of space, at which point it can light up and deliver objects like satellites into orbit.

[...] Over the past few years, the rocket industry has become quite crowded. Following in the footsteps of Elon Musk's Space Exploration Technologies Corp., dozens of companies have appeared, trying to make small, cheap rockets that can be launched every week or perhaps even every day. These smaller rockets have been built to carry a new breed of shoebox-sized satellitesdubbed smallsatsthat are packed full of imaging, telecommunications and scientific equipment. The small rockets, though, are really just miniaturized versions of the large, traditional rockets that have flown for decades. SpinLaunch is an entirely new take on the rocket-launch concept itself.

[...] SpinLaunch has a working prototype of its launcher, although the company has declined to provide details on exactly how the machine operates or will compare to its final system. The startup plans to begin launching by 2022. It will charge less than $500,000 per launch and be able to send up multiple rockets per day. The world's top rocket companies usually launch about once a month, and most of SpinLaunch's rivals have been aiming for $2 million to $10 million per launch for small rockets. If the startup were able to reach its goals, it would easily be the cheapest and most prolific small launcher on the market.

NextBigFuture puts the velocity at up to 4,800 km/h (3,000 mph) instead.

See also: Spinlaunch is using large centrifuges to accelerate to payloads into space target $500,000 per launch

Original Submission

Read more of this story at SoylentNews.


The incredible career of NASAs Peggy Whitson, who applied to become an astronaut 10 times before she broke the American record for space travel Lifeboat News: The Blog

She retired from NASA on Friday after blazing a trail for countless female astronauts.

NASA astronaut Peggy Whitson, the 58-year-old from Iowa farm country who spent a record-breaking 665 days in space, retired from the space agency on Friday.

I have hit my radiation limit, Whitson told Business Insider during a recent interview. So not going into space with NASA anymore.

That realization is both melancholic and exciting for the biochemist, who only half-jokingly admits shes still not sure what shes going to do when I grow up.


A Black Hole Ate A Star And Left Crumbs Of Light For Astronomers To Discover Lifeboat News: The Blog

Black holes are notoriously messy eaters.

Using more than ten years of data, astronomers discovered traces of an unlucky star that got too close to a black hole. Because this event was partly hidden from us by dust, this discovery shows how we might find other cases of star-eating black holes.


Probiotics may help boost mood and cognitive function Lifeboat News: The Blog

Probiotics can do more than improve your gut health. They also may indirectly enhance your brain, too.

Research shows that the gut and brain are connected, a partnership called the gut-brain axis. The two are linked through biochemical signaling between the nervous system in the digestive tract, called the enteric nervous system, and the central nervous system, which includes the brain. The primary information connection between the brain and gut is the vagus nerve, the longest nerve in the body.

The gut has been called a second brain because it produces many of the same neurotransmitters as the brain does, like serotonin, dopamine, and gamma-aminobutyric acid, all of which play a key role in regulating mood. In fact, it is estimated that 90% of serotonin is made in the digestive tract.


US Painkiller Restriction Linked to 'Significant' Increase in Illicit Online Drug Trading SoylentNews

The US Drug Enforcement Administration's decision to restrict prescription drugs containing hydrocodone (a popular opioid painkiller) was associated with a 'significant' increase in illicit trading of opioids through online markets, finds a study published by The BMJ today.

In this study, the term opioids refers to drugs that are usually available by prescription but here are sourced illegally through the dark net and are not prescribed by anyone.

The findings show that the proportion of sales of opioids through illicit markets doubled over the study period and sales of more potent opioids also increased. Overdose death rates have quadrupled in the US since 1999, and 40% of all deaths involve prescription opioids, which are primarily used for pain relief.

Read more of this story at SoylentNews.


Howard Roark, John Galt, and The Transhumanist Wager Lifeboat News: The Blog

Heres a full chapter out exploring my novel The Transhumanist Wager as part of a new book out called Ayn Rand and the Posthuman: #transhumanism

In his novel The Transhumanist Wager, Zoltan Istvan recreates certain elements of Ayn Rands work, in order to advance an argument for transhumanism. Istvan sees the transhuman


DIY Coil Winding Machine Counts The Hacky Way Hackaday

Wait, was that 423 or 424? When youre stuck winding a transformer or coil that has more than a few hundred turns, youre going to want to spend some time on a winding jig. This video, embedded below, displays a simple but sufficient machine with a few twists.

The first elaboration is the addition of a shuttle that moves back and forth in sync with the main spindle to lay the windings down nice and smooth. Here, its tremendously simple a piece of threaded rod and a set of interchangeable wheels that are driven by a big o-ring belt. We love the low-tech solution of simply adding a twist into the belt to swap directions. We would have way overthought the mechanism.

But then the hack is the digital counter made out of an old calculator. Weve seen this before, of course, but heres a great real-world application.

Thanks [Jnis] for the tip!



Xfdesktop 4.13.2 Released As Another Step Towards Xfce 4.14 Phoronix

As another step towards the long-awaited Xfce 4.14 desktop environment release, Xfdesktop 4.13.2 is now available as the latest development release for this important piece of the Xfce desktop stack...


YouTube Download Sites Throw in the Towel Under Legal Pressure SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

The music industry sees stream ripping as one of the largest piracy threats, worse than torrent sites or direct download portals.

The RIAA, IFPI, and BPI showed that they're serious about the issue when they filed legal action against YouTube-MP3, the largest stream ripping site at the time.

This case eventually resulted in a settlement where the site, once good for over a million daily visitors, agreed to shut down voluntarily last year.

YouTube-MP3's demise was a clear victory for the music groups, which swiftly identified their next targets, putting them under pressure, both in public and behind the scenes.

This week this appears to have taken its toll on several 'stream ripping' sites, which allowed users to download videos from YouTube and other platforms, with the option to convert files to MP3s.


Original Submission

Read more of this story at SoylentNews.


A set of weekend stable kernel updates

The stable update machine continues to crank out releases: 4.17.2, 4.16.16, 4.14.50, 4.9.109, and 4.4.138 are all available with another set of important fixes.


Most Deepfake Videos Have One Glaring Flaw: A Lack of Blinking SoylentNews

Submitted via IRC for SoyCow8093

The rate at which deepfake videos are advancing is both impressive and deeply unsettling. But researchers have described a new method for detecting a "telltale sign" of these manipulated videos, which map one person's face onto the body of another. It's a flaw even the average person would notice: a lack of blinking.

Researchers from the University at Albany, SUNY's computer science department recently published a paper titled "In Ictu Oculi: Exposing AI Generated Fake Face Videos by Detecting Eye Blinking." The paper details how they combined two neural networks to more effectively expose synthesized face videos, which often overlook "spontaneous and involuntary physiological activities such as breathing, pulse and eye movement."


Original Submission

Read more of this story at SoylentNews.


Kernel prepatch 4.18-rc1

The first 4.18 prepatch is out, and the merge window has closed for this development cycle. "You may think it's still Saturday for me, and that I should give you one more day of merge window to send in some last-minute pull requests, but I know better. I'm in Japan, and it's Sunday here."


3D Printer Tech Cuts Paper Hackaday

While 3D printing has been a great thing all by itself, it has also made electromechanical hardware a commodity item. Instead of raiding an old printer for motors and rods of unknown provenance, you can now buy everything very inexpensively due to the economy of scale and offshore manufacturing.

[Mr. Innovation] proves this point with his recent paper cutting machine which feeds and slices paper strips with user-selected width and quantity. He did steal one roller assembly from an old printer, but most of it is straight out of a 3D printer build. Theres NEMA stepper motors, modular motor driver boards, smooth rods, belts, and pulleys.

The blade of the cutter is just a standard snap off box cutter blade. It is angled so it doesnt drag when the motor pulls it back to the home position after a cut. Honestly, we might have made the paper mechanism retract the paper a bit at that point, but that would be simple to add to the devices firmware.

You might think an automated paper cutter is a bit lazy, but we could see if you were cutting up flyers for a hackerspace event, or cutting paper insulators to fit in an enclosure for a kit you were selling in small quantities.

The biggest issue we saw was that the machine is open loop. It would have been interesting to put an optical sensor between the roller and the blade. When the paper covered the sensor youd know the position of the edge and could then move the paper a precise amount, assuming it didnt slip. Another idea would be to put the sensor after the blade in such a way that it could be moved so that the cut would happen once the paper covered the sensor. You could probably do the same thing with a microswitch or some other sensor.

Still, this looks like a simple but useful project for some leftover 3D printer parts. Just be careful with the open blade.

We couldnt help but think about building this with a floppy disk blade for cutting plastic. Or you could mount a laser (but use a different power supply, please).


Heres whos going to win the World Cup, according to A.I. Lifeboat News: The Blog

Robots arent playing professional soccer just yet, but they can certainly help predict it! With the FIFA World Cup kicking off, San Francisco-based tech firm Unanimous A.I. has used its considerable artificial intelligence expertise to predict the outcome of the 32-team mens soccer tournament. Given that the startup has previously predicted the Super Bowl results successfully right down to the exact final score, we totally think this is worth taking seriously.

These predictions were generated using swarm A.I. technology, Louis Rosenberg, founder and CEO of Unanimous A.I., told Digital Trends. This means it uses a unique combination of human insights and artificial intelligence algorithms, resulting in a system that is smarter than the humans or the machines could be on their own. It works by connecting a group of people over the internet using A.I. algorithms, enabling them to think together as a system, and converge upon predictions that are the optimized combination of their individual knowledge, wisdom, instincts, and intuitions.

The technology is modeled on the remarkable abilities of swarms in nature, such as swarms of bees, schools of fish, or flocks of birds. These natural swarms combine the insights of large groups in optimized ways. Unanimous swarms utilize this same principle to answer complex questions such as giving precise probability-based outcomes on each game in the World Cup.


UK Prime Minister Theresa May "Disappointed" at Upskirting Law Block SoylentNews

May 'disappointed' at upskirting law block

Theresa May says she is "disappointed" an attempt to make upskirting a criminal offence in England and Wales did not progress through Parliament after one of her own MPs blocked it. Conservatives have criticised Sir Christopher Chope for objecting to the private member's bill.

If passed, it could see someone who has secretly taken a photo under a victim's skirt face up to two years in prison. The PM said she wanted to see it pass soon "with government support". Minister for Women, Victoria Atkins, said the government will allocate time for the bill in Parliament to ensure it does not get pushed down the list of private members' bills, which would mean it could some time to return to the Commons.

[...] Sir Christopher has yet to speak out about why he blocked the bill but upskirting victim Gina Martin - who started the campaign for the new law - said he had told her he objected to it "on principle" because it "wasn't debated". She also told the BBC that he said he "wasn't really sure" what upskirting was. "I said, 'well, I can help you with that'," Ms Martin added.

The bill was expected to sail through the Commons on Friday, but parliamentary rules mean it only required one MP to shout "object" to block its progress. Sir Christopher's intervention was met with shouts of "shame" from other MPs.

Original Submission

Read more of this story at SoylentNews.


A New Study Details Everything That Would Be Needed For An Interstellar Journey To Proxima Centauri Lifeboat News: The Blog

Scientists have determined the minimum amount of crew members needed for a 6,300-year journey to Proxima b.

A team of French scientists have recently published a new study detailing everything that would be needed if humans were to one day make the long interstellar journey to Proxima Centauri to start a new life and civilization. The research went to great lengths to determine the correct amount of people that would ensure a successful voyage to Proxima b.

The study was conducted by particle physicist Dr. Camille Beluffi and Dr. Frederic Marin from the Astronomical Observatory of Strasbourg and marks the second study conducted on such an interstellar journey to Proxima b, as ScienceAlert reported.


The Changes & New Features For Linux 4.18 Phoronix

With the early release of Linux 4.18-rc1, feature development on Linux 4.18 is over and it's onto roughly eight weeks worth of testing and bug fixes. For those that are behind in their Phoronix reading with our extensive and original reporting on the Linux 4.18 merge window happenings, here is our recap of the big changes that made it into Linux 4.18. We are also in the process of firing off the start of our Linux 4.18 kernel benchmarks.


Frogs Found Trapped in Amber After 99 Million Years SoylentNews

Prehistoric frogs in amber surface after 99 million years

Frogs trapped in amber for 99 million years are giving a glimpse of a lost world. The tiny creatures have been preserved in sticky tree resin since the end of the Age of the Dinosaurs.

The four fossils give a window into a world when frogs and toads were evolving in the rainforests. Amber from Myanmar, containing skin, scales, fur, feathers or even whole creatures, is regarded as a treasure trove by palaeontologists.

Dr Lida Xing of China University of Geosciences in Beijing said it was a "miracle" find. "In China, frogs, lizards and scorpions are called three treasures of amber," he told BBC News. "These amber fossils provide direct evidence that frogs inhabited wet tropical forests before the mass extinction event at the end of the Cretaceous."

The fossil record of the earliest amphibians is sparse, which makes the discovery particularly valuable for science.

The earliest direct evidence of frogs in wet tropical forests from Cretaceous Burmese amber (open, DOI: 10.1038/s41598-018-26848-w) (DX)

Original Submission

Read more of this story at SoylentNews.


Linux 4.18-rc1 Kernel Released Phoronix

Coming out one day ahead of schedule is the Linux 4.18-rc1 kernel...


AppArmor In Linux 4.18 Supports Audit Rule Filtering Phoronix

Sent out earlier this week were the AppArmor feature updates for the Linux 4.18 kernel merge window...


Definitely-Not-Neopixel Rings, From Scratch! Hackaday

The WS2812 addressable LED is a marvellous component. Any colour light you want, all under the control of your favourite microcontroller, and daisy-chainable to your hearts content. Unsurprisingly they have become extremely popular, and can be found in a significant number of the project s you might read about in these pages.

A host of products have appeared containing WS2812s, among which Adafruits Neopixel rings are one of the more memorable. But they arent quite as cheap as [Hyperlon] would like, so the ever-resourceful hacker has created an alternative for the constructor of more limited means. It takes the form of a circular PCB that apes the Adafruit original, and it claims to deliver a Bill of Materials cost that is 85% cheaper.

In reality the Instructables tutorial linked above is as much about how to create a PCB and surface-mount solder as it is specific to the pixel ring, and many readers will already be familiar with those procedures. But we wont rest until everyone out there has tried their hands at spinning their own PCB project, and this certainly proves that such an endeavour is not out of reach. Whether or not you pay for the convenience of the original or follow this lead is your own choice.

The real thing has been in so many projects its difficult to pick just one to link to. This Christmas tree is rather nice.


Study Finds Evidence of More Organic Material on Ceres SoylentNews

Organic Matter on Dwarf Planet Ceres More Abundant than Thought

A new analysis of data collected by NASA's Dawn orbiter suggests that organic molecules may exist in surprisingly high concentrations on the surface of Ceres. The study [DOI: 10.1029/2018GL077913] [DX] appears in the journal Geophysical Research Letters.

[...] To get an initial idea of how abundant those compounds might be, researchers compared the [Visible and Infrared Spectrometer] data from Ceres with lab reflectance spectra of organic material formed on Earth. Based on that standard, they concluded that 6-10% of the spectral signature they detected on Ceres could be explained by organic matter.

But for this the new study, Southwest Research Institute researcher Hannah Kaplan and co-authors wanted to re-examine those data using a different standard. Instead of relying on Earth rocks to interpret the data, they turned to an extraterrestrial source: meteorites. Some meteorites have been shown to contain organic material that's slightly different from what's commonly found on our own planet. And the new analysis shows that the spectral reflectance of the extraterrestrial organics is distinct from that of terrestrial counterparts. [...] "We estimate that as much as 40-50% of the spectral signal we see on Ceres is explained by organics. That's a huge difference compared to the 6-10% previously reported based on terrestrial organic compounds."

[...] There are two competing possibilities for where Ceres' organics may have come from. They could have been produced internally on Ceres and then exposed on the surface, or they could have been delivered to the surface by an impact from an organic-rich comet or asteroid.

Previously: Organic Molecules Found on Ceres

Related: Dawn Spies Magnesium Sulphate and Possible Geological Activity on Ceres
Ceres May Have Had a Global Surface Ocean in the Past

Original Submission

Read more of this story at SoylentNews.


A 3D-Printed Robot Actuator Hackaday

Somehow, walking robots at our level never really seem to deliver on the promise that should be delivered by all those legs. Articulation using hobby servos is simple enough to achieve, but cumbersome, slow, and not very powerful. [Paul Gould] has a plan to make a better, 3D-printed articulated robot actuator.

His solution is both novel and elegant, a fairly conventional arm geometry that has at its joints a set of brushless motors similar to but a little larger than the kind you might be more familiar with on multirotors, paired with 3D-printed cycloidal gearboxes. Magnetic encoders provide the necessary positional feedback, and the result is a unit that is both compact and powerful.

With such a range of small brushless motor controllers on the market, its at first sight unexpected that hes designed his own controller board. But this gives him complete control over his software, plus the CAN bus that ties everything together. Hes given us a video which weve placed below the break, showing the build process, the impressive capabilities of his system, and a selection of builds including a robot dog complete with tail. This is definitely a project to watch.

The HackadayPrize2018 is Sponsored by:


Chandra Space Telescope: Revealing the Invisible Universe Lifeboat News: The Blog

The Chandra X-Ray Observatory is a NASA telescope that looks at black holes, quasars, supernovas, and the like all sources of high energy in the universe. It shows a side of the cosmos that is invisible to the human eye.

After more than a decade in service, the observatory has helped scientists glimpse the universe in action. It has watched galaxies collide, observed a black hole with cosmic hurricane winds, and glimpsed a supernova turning itself inside out after an explosion.

The telescope billed as one of NASAs Great Observatories along with the Hubble Space Telescope, Spitzer Space Telescope and the Compton Gamma Ray Observatory has been a public relations tool for the agency, as well. Its pictures are frequently used by NASA in press releases.


Distribution Release: deepin 15.6 News

deepin is a Debian-based Linux distribution which strives to provide an attractive and user-friendly experience via the Deepin Desktop Environment (DDE). The project's latest release, deepin 15.6, features a new welcome window and a quick settings navigation bar. There is also a new launcher window, designed to use....


FreeBSD 11.2-RC3 Released, Enables Eager FPU Context Switching For Latest CPU Bug Phoronix

The newest weekly release candidate of the upcoming FreeBSD 11.2 is now available for testing...


Lentils Significantly Reduce Blood Glucose Levels SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

Replacing potatoes or rice with pulses can lower your blood glucose levels by more than 20 per cent, according to a first-ever University of Guelph study.

Prof. Alison Duncan, Department of Human Health and Nutritional Sciences, and Dan Ramdath of Agriculture and Agri-Food Canada, found that swapping out half of a portion of these starchy side dishes for lentils can significantly improve your body's response to the carbohydrates.

Replacing half a serving of rice with lentils caused blood glucose to drop by up to 20 per cent. Replacing potatoes with lentils led to a 35-per-cent drop.

"Pulses are extremely nutrient-dense food that have the potential to reduce chronic diseases associated with mismanaged glucose levels," said Duncan, who worked on the study with PhD student Dita Moravek and M.Sc. students Erica Rogers, Sarah Turkstra and Jessica Wilson.


Dita Moravek, Alison M Duncan, Laura B VanderSluis, Sarah J Turkstra, Erica J Rogers, Jessica M Wilson, Aileen Hawke, D Dan Ramdath. Carbohydrate Replacement of Rice or Potato with Lentils Reduces the Postprandial Glycemic Response in Healthy Adults in an Acute, Randomized, Crossover Trial. The Journal of Nutrition, 2018; 148 (4): 535 DOI: 10.1093/jn/nxy018

Original Submission

Read more of this story at SoylentNews.


Inside the Former Texas Walmart Where 1,400 Immigrant Children Are Held

Via: WGN: The strangeness of the largest migrant childrens center in the United States, near the border with Mexico, shows up in the details. Here, there are 1,469 boys, ages 10 to 17, housed inside the 250,000-square-foot shell of a former Walmart superstore. None of the 313 bedrooms have doors. Or ceilings, so that children []


U.S. Drops Indictment Against Alleged Operator of Pirate App Store TorrentFreak

applanetAssisted by police in France and the Netherlands, the FBI took down the pirate Android stores Appbucket, Applanet, and SnappzMarket during the summer of 2012.

During the years that followed several people connected to the Android app sites were arrested and indicted, resulting in prison sentences for some.

SnappzMarkets Scott Walton was handed a 46-month prison sentence for conspiracy to commit copyright infringement, and his colleague Joshua Taylor was sentenced to a 16-month term.

While some defendants pleaded guilty in order to get a reduced sentence, not all did. David Lee, a California man linked to Applanet, decided to fight the case instead, and not without success.

The US Government had charged Lee with aiding and abetting criminal copyright infringement (pdf). In addition, he was charged with conspiring to infringe copyrights and violating the DMCAs anti-circumvention provision.

As the case progressed, it became clear that the U.S. Governments evidence wasnt as strong as initially thought. Before the trial even started, the prosecution voluntarily dropped the criminal copyright infringement charge.

What remained was the conspiracy charge, but after hearing evidence and testimony from both sides of the case, the jury was unable to issue a unanimous decision. As a result, the case ended in a mistrial two years ago.

The Department of Justice did not let the case go though. Soon after the mistrial, it informed the court that it would re-try Lee. This second trial was delayed a few times but never took place.

Instead, the US Government asked the court to dismiss the indictment against the alleged pirate app store operator, without providing any context. This request was granted earlier this week, which means that Lee is relieved of all charges.

It is not clear what moved the US to dismiss the case. TorrentFreak contacted both Lees lawyers and the US Department of Justice for comment, but at the time of publication, we have yet to hear back.

However, with the indictment dismissed, Lee can close this chapter of his life after nearly six years.

Indictment dismissed


For The First Time, Scientists Have Caught Bacteria Fishing For DNA From Their Dead Friends Lifeboat News: The Blog

Horizontal gene transfer is an important way that antibiotic resistance moves between bacterial species, but the process has never been observed before, since the structures involved are so incredibly small, said biologist Ankur Dalia of Indiana University Bloomington.

Bacteria are slippery little suckers. They evolve rapidly, developing resistance to antibiotics and therefore becoming increasingly difficult to deal with. Now, for the first time, researchers have caught on film one of the mechanisms the microbes use for this speedy evolution.

Two Vibrio cholerae bacteria the pathogen responsible for cholera sit under a microscope, glowing a vivid green. As we watch, a tendril snakes forth from one of the bacterium, harpooning a piece of DNA and carrying it back to its body.

That appendage is called a pili, and the process whereby the bacteria incorporates the new genetic material from a different organism into its own DNA to expedite its evolution is called horizontal gene transfer.


Building An Ultralight In A Basement is Just So Beautiful to See Hackaday

[Peter] is at it again. Not content with being one of the best RC confabulators on YouTube, and certainly not content with the first airplane he built in his basement, [Peter Sripol] is building another airplane in his basement.

The first airplane he built was documented on YouTube over a month and a half. It was an all-electric biplane, built from insulation foam covered in fiberglass, and powered by a pair of ludicrously oversized motors usually meant for large-scale RC aircraft. This was built under Part 103 regulations an ultralight which means there were in effect no regulations. Anyone could climb inside one of these without a license and fly it. The plane flew, but there were a few problems. It was too fast, and the battery life wasnt really what [Peter] wanted.

Now [Peter] is onto his next adventure. Compared to the previous plane, this has a more simplified,...


Pebble Smartwatch Services to Live on Through Rebble SoylentNews

Pebble smartwatches could be kept alive by an unofficial developer group called Rebble

Pebble's online services will officially die at the end of this month, but some could live on through Rebble, an unofficial group of Pebble users who are trying to keep their watches alive.

Rebble initially popped up after Pebble said in 2016 that it would cease operations and be acquired by Fitbit. Now that Fitbit is weeks away from shutting down Pebble's remaining services, Rebble is promoting an unofficial replacement system that's meant to keep the majority of Pebble's internet-connected functions alive. Former Pebble employee Katharine Berry is spearheading the effort, and it's received an endorsement from Pebble founder Eric Migicovsky.

Also at Engadget.

Previously: Pebble Dead, Assets Sold to Fitbit

Original Submission

Read more of this story at SoylentNews.


First results of DSLWP-B Amateur VLBI Daniel Estvez

In March this year I spoke about the Amateur VLBI with LilacSat-2 experiment. This experiment consisted of a GPS-synchronized recording of LilacSat-2 at groundstations in Harbin and Chongqing, China, which are 2500km apart. The experiment was a preparation for the Amateur VLBI project with the DSLWP lunar orbiting satellites, and I contributed with some signal processing techniques for VLBI.

As you may know, the DSLWP-B satellite is now orbiting the Moon since May 25 and the first Amateur VLBI session was performed last Sunday. The groundstations at Shahe in Beijing, China, and Dwingeloo in the Netherlands performed a GPS-synchronized recording of the 70cm signals from DSLWP-B from 04:20 to 5:40 UTC on 2018-06-10. I have adapted my VLBI correlation algorithms and processed these recordings. Here are my first results.

The baseline for these VLBI recordings (i.e., the distance between the groundstations) is roughly 7250km. The signals transmitted by DSLWP-B are 250bps GMSK using an \(r=1/2\) turbo code. Two transmit frequencies are used: 435.4MHz and 436.4MHz. Each transmit frequency uses a different antenna. The antenna marked below as UV Antenna A is used for 435.4MHz, while the UV Antenna B is used for 436.4MHz.

DSLWP diagram

The transmissions are done in packets. A packet lasts about 15 seconds and is transmitted roughly every 5 minutes. Packets are transmitted simultaneously in both frequencies, but the data transmitted in each of the frequencies is different.

The format of the recordings is as follows. Each recording is 20 seconds long (or 19 seconds in some cases) and contains a single packet. It is formed by two files, one for 435.4MHz and the other for 436.4MHz. Each of these files is an IQ file at 40ksps centred at 435.4MHz or 436.4MHz. The format of the files is the GNURadio metadata format. The file metadata can be read with gr_read_file_metadata and contains the UTC timestamps for the IQ stream. These timest...


What Is Quantum Computing (Future of AI Computing) Lifeboat News: The Blog

Recommended Books

Life 3.0
The Master Algorithm

This video is the ninth in a multi-part series discussing computing and the second discussing non-classical computing. In this video, well be discussing what quantum computing is, how it works and the impact it will have on the field of computing.

[0:286:14] Starting off well discuss, what quantum computing is, more specifically the basics of quantum mechanics and how quantum algorithms will run on quantum computers.

[6:149:42] Following that well look at, the impact quantum computing will bring over classical computers in terms of the P vs NP problem and optimization problems and how this is correlated with AI.

[9:4214:00] To conclude well discuss, current quantum computing initiatives to reach quantum supremacy and ways you can access the power of quantum computers now!


Senolytics for Age-Related Muscle Loss and Frailty Lifeboat News: The Blog

Today, we want to draw your attention to an open-access review that focuses on the role of senescent cells in sarcopenia, the age-related loss of muscle mass and strength that leads to frailty.


Ocean Waves Following Sea Ice Loss Trigger Antarctic Ice Shelf Collapse SoylentNews

Arthur T Knackerbracket has found the following story:

Storm-driven ocean swells have triggered the catastrophic disintegration of Antarctic ice shelves in recent decades, according to new research published in Nature today.

Lead author Dr Rob Massom, of the Australian Antarctic Division and the Antarctic Climate and Ecosystems Cooperative Research Centre, said that reduced sea ice coverage since the late 1980s led to increased exposure of ice shelves on the Antarctic Peninsula to ocean swells, causing them to flex and break. "Sea ice acts as a protective buffer to ice shelves, by dampening destructive ocean swells before they reach the ice shelf edge," Dr Massom said. "But where there is loss of sea ice, storm-generated ocean swells can easily reach the exposed ice shelf, causing the first few kilometres of its outer margin to flex."

"Over time, this flexing enlarges pre-existing fractures until long thin 'sliver' icebergs break away or 'calve' from the shelf front. This is like the 'straw that broke the camel's back', triggering the runaway collapse of large areas of ice shelves weakened by pre-existing fracturing and decades of surface flooding."

Study co-author Dr Luke Bennetts, from the University of Adelaide's School of Mathematical Sciences, said the finding highlights the need for sea ice and ocean waves to be included in ice sheet modelling. This will allow scientists to more accurately forecast the fate of the remaining ice shelves and better predict the contribution of Antarctica's ice sheet to sea level rise, as climate changes. "The contribution of the Antarctic Ice Sheet is currently the greatest source of uncertainty in projections of global mean sea level rise," Dr Bennetts said.

-- submitted from IRC

Original Submission

Read more of this story at SoylentNews.


Delta Printer Morphs into CNC Flat Coil Winder Hackaday

Anyone who has ever wound a coil by hand has probably idly wondered How do they do this with a machine? at some point in the tedious process. Thats about when your attention wanders and the wire does what physics wants it to do, with the rats nest and cursing as a predictable result.

Theres got to be a better way, and [Russ Gries] is on his way to finding it with this proof-of-concept CNC flat coil winder. The video below is a brief overview of what came out of an intensive rapid prototyping session. [Russ] originally thought that moving the coil would be the way to go, but a friend put him onto the idea of using his delta-style 3D-printer to dispense the wire. An attachment somewhat like a drag knife was built, but with a wire feed tube and a metal roller to press the wire down onto an adhesive surface. The wire feed assembly went through a few design iterations before he discovered that a silicone cover was needed for the roller for the wire to properly track, and that the wire spool needed to be fed with as little friction as possible. Fusion 360s CAM features were used to design the tool paths that describe the coils. It seems quite effective, and watching it lay down neat lines of magnet wire is pretty mesmerizing.

Weve seen a couple of cylindrical coil winding rigs before, but it looks like this is the first flat coil winder weve featured. We cant help but wonder about the applications. Wireless power transfer comes to mind, as do antennas and coils for RF applications. We also wonder if there are ways to use this to make printed circuit boards.

Thanks to [smerrett79] for the tip.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Saturday, 16 June


Get the latest in libre from the FSF Bulletin FSF blogs

The biannual Free Software Foundation (FSF) Bulletin is now available online. We hope you find it enlightening and entertaining!

Your activism drives the free software movement. Together, we have been proactively building a future where computer users are in control, while also reacting to immediate threats to our digital freedoms. Our associate membership program provides crucial, ongoing support that ensures the FSF's financial stability, making our work possible. Will you take the next step and join us as an associate member or make a one-time donation today?

Free software activists count on the FSF to play a role no other organization can: we refuse to compromise our values, we directly support free software development via the GNU Project, and we defend copyleft in the form of the GNU General Public License (GPL). We, in turn, count on you to provide the energy and resources that drive us.

So far this year, your financial support:

  • amplified the voice of free software in public conversations about net neutrality, Facebook privacy abuses, and high profile security compromises;

  • fought Digital Restrictions Management (DRM) by storming the US Digital Millennium Copyright Act exemptions process to not only support every exemption but be the sole organization arguing for abolition of the whole charade;

  • made major improvements to the infrastructure powering hundreds of GNU and other free software projects;

  • funded important technical work to help free JavaScript on the Web;

  • enabled certification of two more products according to the standards of our Respects Your Freedom program, put dozens more in the pipeline, and advanced a plan to scale the program to its full potential; and

  • helped policymakers and companies embrace the GPL -- the state of California and the US Department of Defense have both made strong moves in this area, and we expect more to follow suit.

Our Associate Member program launched in 2002, as a way to provide long-term stability for the FSF's work, and to recognize and thank those who choose to give consistently. Today there are over 4600 Associate Members residing in 82 countries, with dues comprising nearly half of the FSF's funding. This funding allows us to stay independent, serving the free software community, not corporations or governments. Thank you for your continued support.

Friday, 15 June


Five Supercomputers That Aren't Supercomputers

A supercomputer, of course, isn't really a "computer." It's not one giant processor sitting atop an even larger motherboard. Instead, it's a network of thousands of computers tied together to form a single whole, dedicated to a singular set of tasks. They tend to be really fast, but according to the folks at the International Supercomputing Conference, speed is not a prerequisite for being a supercomputer.

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog