IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Saturday, 20 January


What has the Necurs botnet been up to? Help Net Security

The Necurs botnet has been slowly growing since late 2012 and still tops the list of largest spam botnets in the world. Since then, the botnet has occasionally stopped or temporarily minimized the sending out of spam but has returned in full force. How big is the Necurs botnet? Its difficult to say precisely, but the latest information provided by the Cisco Talos team can give a general idea. The researchers analyzed 32 distinct spam More


Researchers uncover mobile, PC surveillance platform tied to different nation-state actors Help Net Security

The Electronic Frontier Foundation (EFF) and mobile security company Lookout have uncovered a new malware espionage campaign that has targeted activists, journalists, lawyers, military personnel, and enterprises in more than 20 countries in North America, Europe, the Middle East, and Asia. They have dubbed the threat Dark Caracal, and have traced its activities to as far back as 2012. The malware used by Dark Caracal The attackers went after information stored on targets Android devices More


Infosec expert viewpoint: Google Play malware Help Net Security

Researchers routinely discover a variety of malicious apps on Google Play, some of which have been downloaded and installed on millions of devices worldwide. Heres what infosec experts think about the security of Google Play, what they think Google should do better, and what users can do in order to protect themselves from malicious apps on the official Android app store. Chris Boyd, Lead Malware Intelligence Analyst, Malwarebytes Google Play continues to have issues where More


New infosec products of the week: January 19, 2018 Help Net Security

Continuous vulnerability management for ICS cybersecurity PAS Cyber Integrity 6.0 now includes continuous vulnerability management providing visibility into vulnerability risk within industrial process control networks. Cyber Integrity moves beyond traditional IT vulnerability management by also addressing the proprietary industrial control systems that comprise 80 percent of a facility environment. BlackBerry releases cloud-based static binary code scanning solution BlackBerry Jarvis is a cloud-based static binary code scanning solution that identifies vulnerabilities in software used in automobiles. More


chaiOS Bug can crash iMessage App on any iPhone and macOS with a simple link Security Affairs

The software developer Abraham Masri has discovered a new bug, dubbed chaiOS that could be exploited to crash a targets iMessage application.

The researcher and software developer Abraham Masri has discovered a new bug, dubbed chaiOS  Text Bomb that could be exploited to crash recipients iMessage application in a continuous loop.

The flaw exploited by the chaiOS  Text Bomb affects both iOS and macOS, according to researchers at Yalu Jailbreak, the bug is currently compatible up till iOS 11.1.2 firmware, this means that it affects iMessage apps on macOS High Sierra, iOS 10 to 10.3.3, and iOS 11 to 11.2.1.

The exploitation of the issue is very simple, an attacker just needs to send a link to a web page hosting a JavaScript code that attempts to send an SMS message. The iMessage application fails to properly handle the code triggering the crash of the app. In some cases, it has been observed that the iMessage app enters a continuous reboot loop.

A proof-of-concept page has been put together by Masri and shared on Twitter yesterday, but the page has been removed from GitHub due to potential abuses, anyway, a new mirror has been already added.

chaiOS is a malicious iOS bug that can cause the target device to freeze, respring, drain the battery, and possibly kernel panic. It is developed by the eminent jailbreak developer, Abraham Masri.

Here are the known after-effects once someone opens the malicious link.

  • The stock Messages app goes completely blank.
  • Messages app crashes instantly after openi...


IT infrastructure spending for cloud environments to reach $46.5 billion in 2017 Help Net Security

Total spending on IT infrastructure products (server, enterprise storage, and Ethernet switches) for deployment in cloud environments is expected to total $46.5 billion in 2017 with year-over-year growth of 20.9%, according to a new forecast from IDC. Public cloud datacenters will account for the majority of this spending, 65.3%, growing at the fastest annual rate of 26.2%. Off-premises private cloud environments will represent 13% of cloud IT infrastructure spending, growing at 12.7% year over year. More

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Friday, 19 January


Experimental KPTI Support For x86 32-bit Linux Phoronix

For the Kernel Page Table Isolation (KPTI) support currently within the Linux kernel for addressing the Meltdown CPU vulnerability it's currently limited to 64-bit on the x86 side, but for the unfortunate souls still running x86 32-bit operating systems, SUSE is working on such support...


Long-Range RFID Leaflets Hackaday

Pick a card, any card. [Andrew Quitmeyer] and [Madeline Schwartzman] make sure that any card you pick will match their NYC art installation. Replantment is an interactive art installation which invites guests to view full-size leaf molds from around the world.

A receipt file with leaf images is kept out of range in this art installation. When a viewer selects one, and carries it to the viewing area, an RFID reader tells an Arduino which tag has been detected. Solid-state relays control two recycled clothing conveyors draped with clear curtains. The simple units used to be back-and-forth control but through dead-reckoning, they can present any leaf mold front-and-center.

Clothing conveyors from the last century werent this smart before, and it begs the question about inventory automation in small businesses or businesses with limited space.

We havent seen much long-range RFID, probably because of cost. Ordinary tags have been read at a distance with this portable reader though, and NFC has been transmitted across a room, sort of.


CVE-2017-15105 Unbound: NSEC processing vulnerability (DNSSEC) Open Source Security

Posted by Ralph Dolmans on Jan 19


Below is a copy of Unbound's CVE description that can be found at



The CVE number for this vulnerability is CVE-2017-15105.

== Summary
We discovered a vulnerability in the processing of wildcard synthesized
NSEC records. While synthesis of NSEC records is allowed by RFC4592,
these synthesized owner names should not be used in the NSEC processing.
This does, however,...


Re: How to deal with reporters who don't want their bugs fixed? Open Source Security

Posted by Nicholas Luedtke on Jan 19

In my extremely humble opinion, a patched "semi-public" issue is better
than a unpatched private issue that is known to unknown number of people
with unknown intentions.


Apologies for sending this off list Alexander.


AMDGPU Firmware Blobs Updated For Video Encode/Decode Phoronix

There are updated AMDGPU microcode/firmware files now available for recent Radeon GPUs...


AI is continuing its assault on radiologists Lifeboat News: The Blog

A new model can detect abnormalities in x-rays better than radiologistsin some parts of the body, anyway.

The results: Stanford researchers trained a convolutional neural network on a data set of 40,895 images from 14,982 studies. The paper documents how the algorithm detected abnormalities (like fractures, or bone degeneration) better than radiologists in finger and wrist radiographs. However, radiologists were still better at spotting issues in elbows, forearms, hands, upper arms, and shoulders.

The background: Radiologists keep getting put up against AI, and they usually dont fare even as well as this. Geoffrey Hinton, a prominent AI researcher, told the New Yorker that advances in AI mean that medical schools should stop training radiologists now.


Is aging natural or a pathological disease that we can treat? Lifeboat News: The Blog

Treating the diseases of ageing requires rethinking of our approach to treating disease. Rather than a whack-a-mole strategy going after individual conditions, a concerted medical effort against ageing as a whole is in order.

Aging is something that we all share, rich or poor; it is something that happens to us all, and we are taught from a young age that it is inevitable. However, some scientists believe that aging is amenable to medical intervention and that such interventions could be the solution to preventing or reversing age-related diseases.

Academics are currently debating whether aging is natural or a pathological disease that we can treat.

In fact, there is now pressure from many academics to classify aging itself as a disease; indeed, doing so could potentially improve funding for aging research and help to speed up progress in finding solutions to age-related diseases.[1] The debate continues, but does it really matter if aging is classified as a disease, or is it largely a matter of semantics?


Health South East RHF data breach exposed health records for half of Norways Population Security Affairs

On January 8, the Health South East RHF, that is the healthcare organization that manages hospitals in Norways southeast region disclosed a major security breach.

On January 8, the Health South East RHF, that is the healthcare organization that manages hospitals in Norways southeast region (countries of stfold, Akershus, Oslo, Hedmark, Oppland, Buskerud, Vestfold, Telemark, Aust-Agder and Vest-Agder), disclosed a security breach that may have exposed sensitive data belonging to more than half of the population.

The incident was announced by the national healthcare security centre HelseCERT that detected an abnormal activity against computer systems in the region. HelseCERT notified the incident to local authorities as well as NorCERT.

We are in a phase where we try to get an overview. Its far too early to say how big the attack is. We are working to acquire knowledge of all aspects, Kjetil Nilsen, director of NorCERT, the National Security Authority (NSM) told Norwegian media outlet VG.

Everything indicates that it is an advanced player who has the tools and ability to perform such an attack. It can be advanced criminals. There is a wide range of possibilities,

According to the HelseCert, the security breach is the result of an attack conducted by advanced and professional hackers.

Authorities announced important measures to limit the damage caused by the security breach.

A number of measures have been implemented to remove the threat, and further measures will be implemented in the future, announced Norways Ministry of Health and Care in a statement.

This is a serious situation and measures have been taken to limit the damage caused by the incident, reads a joint statement published by Health South East RHF and Sykehuspartner HF

The hospitals in the region currently serve 2.9 million inhabitants, that correspond to 56 percent of the overall population composed of 5.2 million citizens.



American Pay May be Low Because There Are Too Few Employers SoylentNews

Found this interesting, you may too.

A new research paper that may help unlock the mystery of why Americans can't seem to get a decent raise. Economists have struggled over that question for years now, as wage growth has stagnated and more of the nation's income has shifted from the pockets of workers into the bank accounts of business owners. Since 1979, inflation-adjusted hourly pay is up just 3.41 percent for the middle 20 percent of Americans while labor's overall share of national income has declined sharply since the early 2000s. There are lots of possible explanations for why this is, from long-term factors like the rise of automation and decline of organized labor, to short-term ones, such as the lingering weakness in the job market left over from the great recession. But a recent study by a group of labor economists introduces an interesting theory into the mix: Workers' pay may be lagging because the U.S. is suffering from a shortage of employers.

[...] argues that, across different cities and different fields, hiring is concentrated among a relatively small number of businesses, which may have given managers the ability to keep wages lower than if there were more companies vying for talent. This is not the same as saying there are simply too many job hunters chasing too few openingsthe paper, which is still in an early draft form, is designed to rule out that possibility. Instead, its authors argue that the labor market may be plagued by what economists call a monopsony problem, where a lack of competition among employers gives businesses outsize power over workers, including the ability to tamp down on pay. If the researchers are right, it could have important implications for how we think about antitrust, unions, and the minimum wage.

Read more of this story at SoylentNews.


Theres a new sex robot in town: Say hello to Solana Lifeboat News: The Blog

Still looks kind of cartoony. But, i would really like to see a head like this put on the body of the ATLAS robot, just to see where we are at with the best android we could possibly make right now. Oh, and put clothes on it, have it walk down the street. The next Turing test will be can it dupe people into thinking it is a person, in person.


This USB Drive Will Self-Destruct After Ruining Your Computer Hackaday

Who would have thought that you could light up pyrotechnics on USB power? This USB keystroke injector that blows up after its used proves the concept.

Fully aware that this is one of those just because you can doesnt mean you should projects, [MG] takes pains to point out that his danger dongle is just for dramatic effect, like a prop for a movie or the stage. In fact, he purposely withholds details on the pyrotechnics and concentrates on the keystroke injection aspect, potentially nasty enough by itself, as well as the dongles universal payload launching features. Were a little bummed, because the confetti explosion (spoiler!) was pretty neat.

The device is just an ATtiny85 and a few passives stuffed into an old USB drive shell, along with a MOSFET to trigger the payload. If you eschew the explosives, the payload could be anything that will fit in the case. [MG] suggests that if you want to prank someone, an obnoxious siren might be a better way to teach your mark a lesson about plugging in strange USB drives.

While this isnt the most dangerous thing you can do with a USB port, it could be right up there with that rash of USB killer dongles from a year or so ago. All of these devices are fun what ifs, but using them on anything but your own computers is not cool and possibly dangerous. Watching the smoke pour out of a USB socket definitely drives home the point that you shouldnt plug in that thumbdrive that you found in the bathroom at work, though.

[Yuu], thanks for the tip.


Wealthy Exodus to Escape New Tax Rules Worries California Democrats

Via: Sacramento Bee: The states wealthiest 1 percent, for instance, pay 48 percent of its income tax, and the departure of just a few families could lead to a noticeable hit to state general fund revenue. It is a genuine concern and thats why the legislatures in high-tax states are swinging into action immediately, said []


Why Some African Americans Are Moving to Africa

Via: Al Jazeera: You might not have electricity, but you wont get killed by the police either. I think more will come when they begin to see it as a viable alternative. But its not easy and its not cheap. I cant say whats happening in America today is any worse than whats been []


openSUSE Tumbleweed Rolls To Mesa 17.3, Linux 4.14.13 Phoronix

OpenSUSE has continued rolling in the new year with several key package updates in January...


AMDGPU DC Gets More Raven Ridge Improvements, Audio Fixes Phoronix

Harry Wentland of AMD has sent out the latest batch of patches for the AMDGPU DC display code stack. Fortunately it lightens up the DRM driver by about six thousand lines thanks to removing some unused code...


Researchers Uncover Government-Sponsored Mobile Hacking Group Operating Since 2012 The Hacker News

A global mobile espionage campaign collecting a trove of sensitive personal information from victims since at least 2012 has accidentally revealed itselfthanks to an exposed server on the open internet. It's one of the first known examples of a successful large-scale hacking operation of mobile phones rather than computers. The advanced persistent threat (APT) group, dubbed Dark Caracal,


R600g "Soft" FP64 Shows Signs Of Life, Enabling Older GPUs To Have OpenGL 4 In 2018 Phoronix

Most pre-GCN AMD graphics cards are still limited to OpenGL 3.3 support at this time due to not supporting FP64. Only the HD 5800/6900 series on R600g currently have real double-precision floating-point support working right now so at present they are on OpenGL 4.3 rather than 3.3, but those other generations may be catching up soon thanks to the "soft" FP64 code...


Volumetric Photogrammetry Big Words, Bigger Impact on VR SoylentNews

Although VR is still in its infancy, "traditional" methods of capturing and transforming footage have emerged. Typically, to shoot 360-degree VR content, a cameraperson employs several cameras rigged in a spherical formation to capture the scene. According to Alicia Millane's blog entry on The Primacy, "Each camera is mounted at a specific angle so the camera's field of view will overlap portions of the surrounding cameras' field of view." With the overlap, editors should be able to get more seamless footage, without any gaps.

[...] Enter volumetric photogrammetry. A mouthful, for sure, but this method of creating virtual environments could possibly hold the key to the future of VR. Unlike the method mentioned above, there are no takes or shots in volumetric VR that are later edited in post-production. This allows for a much more fluid experience, as the consumer frames the scene and chooses his or her own perspective. Using the volumetric capture method, footage of a real person is recorded from various viewpoints, after which software analyzes, compresses and recreates all the viewpoints of a fully volumetric 3D human.

With volumetric VR explained, photogrammetry's defining characteristic is the principle of triangulation. As explained in a blog post on Viar360, triangulation involves taking photographs from at least two locations to form lines of sight. "These lines of sight are then mathematically intersected to produce the 3-dimensional coordinates of the points of interest."

[...] Immersive experiences utilizing volumetric photogrammetry may convey a much more authentic and realistic environment to the end user. Per VRt Ventures founder, Jacob Koo, "If virtual reality has the chance to reach its full potential, then consumers must feel like they are actually somewhere they cannot be physically. That perception takes VR technology out of the novelty category and makes it something actually useful."

Source: TechCrunch

Original Submission

Read more of this story at SoylentNews.


CVE-2017-18043 Qemu: integer overflow in ROUND_UP macro could result in DoS Open Source Security

Posted by P J P on Jan 19


Quick Emulator(Qemu) built with a macro ROUND_UP(n, d), used to promote number
'n' to the nearest multiple of 'd', is vulnerable to an integer overflow
issue. It could occur if 'd' is unsigned and smaller in type from 'n'.

A user could use this flaw to crash the Qemu process resulting in DoS.

Upstream patch:


Mesa 17.3.3 Released With RADV & ANV Vulkan Driver Fixes Phoronix

Mesa 17.3.3 is now available as the latest point release for the Mesa 17.3 stable series...


Dark Caracal APT Lebanese intelligence is spying on targets for years Security Affairs

A new long-running player emerged in the cyber arena, it is the Dark Caracal APT, a hacking crew associated with to the Lebanese General Directorate of General Security that already conducted many stealth hacking campaigns.

Cyber spies belonging to Lebanese General Directorate of General Security are behind a number of stealth hacking campaigns that in the last six years, aimed to steal text messages, call logs, and files from journalists, military staff, corporations, and other targets in 21 countries worldwide.

New nation-state actors continue to improve offensive cyber capabilities and almost any state-sponsored group is able to conduct widespread multi-platform cyber-espionage campaigns.

This discovery confirms that the barrier to entry in the cyber-warfare arena has continued to
decrease and new players are becoming even more dangerous.

The news was reported in a detailed joint report published by security firm Lookout and digital civil rights group the Electronic Frontier Foundation.

The APT group was tracked as Dark Caracal by the researchers, its campaigns leverage a custom Android malware included in fake versions of secure messaging apps like Signal and WhatsApp.
Lookout and Electronic Frontier Foundation (EFF) have discovered Dark Caracal2, a persistent and prolific actor, who at the time of writing is believed to be administered out of a building belonging to the Lebanese General Security Directorate in Beirut. At present, we have knowledge of hundreds of gigabytes of exfiltrated data, in 21+ countries, across thousands of victims. Stolen
data includes enterprise intellectual property and personally identifiable information. states the report.

The attack chain implemented by Dark Caracal relies primarily on social engineering, the hackers used messages sent to the victims via Facebook group and WhatsApp messages. At a high-level, the hackers have designed three different kinds of phishing messages to trick victims into visiting a compromised website, a typical watering hole attack.



[SECURITY] [DSA 4092-1] awstats security update Bugtraq

Posted by Sebastien Delafond on Jan 19

Debian Security Advisory DSA-4092-1 security () debian org Sebastien Delafond
January 19, 2018

Package : awstats
CVE ID : CVE-2017-1000501
Debian Bug :...


Links 19/1/2018: Linux Journalism Fund, Grsecurity is SLAPPing Again Techrights

GNOME bluefish



  • $25k Linux Journalism Fund

    Linux Journals new parent, Private Internet Access, has established a $25k fund to jump-start the next generation of Linux journalismand to spend it here, where Linux journalism started in 1994.

    This isnt a contest, and there are no rules other than the ones that worked for journalism before it starting drowning in a sea of content.

  • Private Internet Access and Linux Journal set up $25,000 fund to reward experienced and aspiring writers
  • NHS used Linux project to negotiate with Microsoft: claim

    Britains National Health Service appears to have used a project set up to create a Linux alternative for its employees smartcards and later, hopefully, a desktop alternative to Windows to bargain with Microsoft and obtain an enterprise-wide desktop deal.

  • Desktop

    • Introducing my new friend: a Slimbook

      I have been following Slimbook for some time now. As you probably know, they ship a KDE laptop that is very cool, with KDE Neon pre-installed. They have attended to a couple of events I have attended to so I have been able to test their laptops, get feedback from buyers and ask them questions directly. The fact that they are a Spanish company was a beautiful surprise, We do not have that many hardware integrators and vendors in Spain.

      But what definitely caught my attention was the fact that they pay a lot of attention to the software. They ship the laptops with Linux pre-installed. Ok, that is not new any more. But they do pre-install several different distros. Now, thats uncommon. But news do not...


Chinas ambitions in space are growing Lifeboat News: The Blog

That failure, and another one last year involving another type of Long March rocket, slowed Chinas space efforts. Officials had hoped to launch around 30 rockets of one type or another in 2017 but only managed 18 (there were 29 launches in America and another 20 of Russian onessee chart). But they promise to bounce back in 2018, with 40-or-so lift-offs planned this year. These will probably include a third outing for the Long March 5assuming its flaws can be fixed in timeand missions that will greatly expand the number of satellites serving BeiDou, Chinas home-grown satellite navigation system.

NATTY yellow carts whizz tourists around Wenchang space port, a sprawling launch site on the tropical island of Hainan. The brisk tour passes beneath an enormous poster of Xi Jinping, Chinas president, then disgorges passengers for photographs not far from a skeletal launch tower. Back at the visitor centre there is a small exhibition featuring space suits, a model moon-rover and the charred husk of a re-entry capsule that brought Chinese astronauts back from orbit. A gift shop at the exit sells plastic rockets, branded bottle openers and cuddly alien mascots.

The base in a township of Wenchang city is the newest of Chinas four space-launch facilities. It is also by far the easiest to visitthanks in part to the enthusiasm of officials in Hainan, a haven for tourists and rich retirees. Wenchangs local government has adopted a logo for the city reminiscent of Starfleet badges in Star Trek. It is building a space-themed tourist village near the launch site, with attractions that include a field of vegetables grown from seeds that have been carried in spaceships.

Upgrade your inbox.


How to install Spotify application on Linux nixCraft

How do I install Spotify app on Ubuntu Linux desktop to stream music? Spotify is a digital music stream service that provides you access to tons of songs. You can stream for free or buy a subscription. Creating a playlist is possible. A subscriber can listen music ad-free. You get better sound quality. This page Continue reading "How to install Spotify application on Linux"

The post How to install Spotify application on Linux appeared first on nixCraft.


DIY Spray Booth is Both Light and Lit Hackaday

Industrial designer [Eric Strebel] has access to big, walk-in spray booths, but bigger isnt always better. For small jobs, its overkill, and he wanted his own spray booth anyway. If youre ready to upgrade from that ratty old cardboard box in the garage, look no further than [Eric]s spray booth how-to after the break.

If you dont already know, [Eric] is something of a foam core legend. He has several videos about model building techniques that produce really slick results, so its no surprise to see these skills transfer to a larger build. The booth is built from a single 40 x 60 sheet of 1/2 foam core board, a furnace filter, and a vent fan modified to fit his shops system. The whole thing cost less than $200, most of which goes toward the fan.

[Eric] modified an existing spray booth plan to fit his needs and added some really nice touches along the way. All the edges are beveled and the unfinished faces are taped, so at first glance it looks like its made out of painted wood or melamine board. The furnace filter slides out one side for easy replacement and is braced with foam scraps so it wont fall forward. The best part of this booth is the LED stripsthey make for way better working conditions than the dim recesses of a cardboard box.

If youd rather build a walk-in spray booth, why not make your own sliding barn doors, too?

FTC Investigating Broadcom for Antitrust Practices SoylentNews

The Federal Trade Commission (FTC) is investigating whether chipmaker Broadcom Ltd engaged in anticompetitive tactics in negotiations with customers, the company said on Wednesday.

The investigation comes as Broadcom pursues a hostile takeover of Qualcomm in a $103 billion deal. Since the FTC would likely review any merger for anticompetitive practices, the current probe could make regulatory approval more challenging.

Broadcom was recently issued subpoenas that seek an extensive amount of information, according to The Wall Street Journal, which was the first to report the probe on Wednesday.

The focus of the concern has been that Broadcom has changed some contracts to require customers to buy a percentage of its production of items rather than a certain number, the paper reported.

"This FTC review is immaterial to our business, does not relate to wireless and has no impact on our proposal to acquire Qualcomm," Broadcom said in a statement.

Source: Reuters

Original Submission

Read more of this story at SoylentNews.


MPAA Wins $19.8 Million From Pirate Site Pubfilm TorrentFreak

In recent years the MPAA has pursued legal action against several pirate sites and the streaming service Pubfilm is one of their latest targets.

Hollywoods industry group initially kept the lawsuit secret. This was done to prevent Pubfilms operator from moving to a new domain preemptively. While this strategy worked, Pubfilm didnt throw in the towel.

Soon after the domain name was suspended, the site moved to And that wasnt all. Pubfilm also started to actively advertise its new domain through Google Adsense to regain its lost traffic.

Today, close to a year has passed and Pubfilm is still around. The site moved from domain to domain and currently resides at and a few other domains that are advertised on the site.

All this time the company failed to responded in court, so the case saw little movement. This week, however, the MPAA made its demands clear and soon after the court issued a default against the site and its unknown operators.

Defendants are Internet pirates who own, operate, and promote a ring of interconnected websites under the name PubFilm and variants thereof whose purpose is to profit from the infringement of copyrighted works, the group wrote in its request.

Because of this continued infringement, the MPAA demanded the maximum amount of statutory copyright infringement damages. With 132 titles listed in the complaint, this totals nearly $20 million.

Given the egregious circumstances of this case, Plaintiffs should be awarded the full amount of statutory damages of $150,000 for each of the 132 Works identified in the Complaint, for a total of $19,800,000, the MPAA writes in its memorandum.

In addition, the Hollywood studios requested a permanent injunction that will require domain registries to put associated domain names on hold and sign them over to the MPAA.

Both requests were granted by the court on Thursday.

Pubfilm domain hopping

Previously, several domain names were aready seized through a preliminary injunction that resulted in Pubfilm moving from domain to domain in recent months. While these seizures can be effective, not all domain registries will comply with a US court order.

One of Pubfilms main domai...


First full-colour motion video from satellites Lifeboat News: The Blog

Earth-i, a mapping service based in England, has launched a prototype of the worlds first full-colour, full-motion video satellite constellation.

worlds first colour video from satellites

British company Earth-i has successfully launched a prototype of its upcoming satellite constellation into orbit. The new network known as Vivid-i will be the first of its kind to provide full-colour motion video and the first European-owned constellation able to provide both video and still images.


Detexian Reviewed

I am an early adopter of Detexian, a service which I increasingly rely on for security. My wife and I run a small media entity which attracts about 5 million hits a week. The sites are and One of the sites is modest and non-confrontational, whereas the other one (the latter) is more controversial because it is critical of activities such as bribery, illegal surveillance, and all sorts of corruption. There are certainly people and organisations that are willing to spy on and undermine the site. Some of those who get criticised are large technology companies and institutions they work with.

We cannot keep up with logs because we are a small team and we cannot properly analyse these for security threats. It is just infeasible. For analysis of logs we also require a service which is isolated from surveillance-intensive hosts such as Amazon. We moreover operate on a very small budget as the sites are public services rather than for-profit.

We now rely on Detexian to inspect the traffic and generate concise reports. Detexian helps to avert disaster or alert about troubling patterns in activity before disaster strikes or flaws are found/exploited. and are not young sites. They have been around for nearly a decade and a half; over the years we have suffered more DDOS attacks than we can remember and there were also intrusion attempts (none were successful). Some attacks managed to cause damage, but it was always repairable. Recently, Detexian alerted us about SQL injection attempts and made recommendations.

We shall continue to rely on Detexian in the foreseeable future and are happy to pay for the service knowing that someone has got our back and is providing informed advice on how to guard the sites.


Warren Buffett Won a Decade-Old $1M Bet Terra Forming Terra

The truth this underlies has always been there.  It is that money management is hopelessly over priced and that it needs to extract human input generally.   In fact an AI will easily beat them all  sooner or later.

Recall that all markets are made by the shifting back and forth of investors. Thus the proper object of analysis is actually the human distribution of those investors and their inherent financial capability.  The actual company involved if it is a stock needs only operate to ensure investor confidence .  

In short, investigating their accountancy is mostly a complete waste of effort.

In the event Buffet understood that what was claimed by all hedge funds was not realistic..

Warren Buffett Won a Decade-Old $1M Bet

Friday, January 05, 2018

Now, the ten-year betting period is officially over.



Strange Anomalies on Sunshine Coast Terra Forming Terra

What makes this unusual is that they are effectively spaced apart and not a group but obviously still are.

It could be a section of soldiers wearing  gravity belts and camouflaged to look like a bit of cloud.  It is an obvious application once you have the gravity belts.  It certainly is no natural phenomena and the cotton like camouflage  is about right for this as human operated platform.

This naturally extends our expectations regarding the USSS and its operational capabilities.

Recall that this entire program is dependent on one discovery and that is gravity manipulation.  Original lab work around 1955 and we also confirmed it all in our own lab work.  In short I know it exists and why from a theoretical viewpoint.  When we discovered it, it was obviously too easy and I checked the literature to locate 1955.

Strange Anomalies on Sunshine Coast

I recently received the following account:

I'm sorry but I will have to guess the year as around 2010. I had been living in Australia since 2007 and had moved back to the Sunshine Coast after a year in Northern Queensland.

My mother had come out to visit from the U.K and the weather had not been good so when we had a clearer day (it was a Wednesday, I'm sure about that). I decided to take her to one of the nicest spots, just to sit on the beach and relax. Mums not young anymore and she likes to just sit and re...


Five Russian Cryptocurrency Projects You Should Know About Terra Forming Terra

This item gives us a glimpse of the future coming at us.  It even reflect my earlier thoughts regarding the natural community in those farm based applications.  It is already infecting the natural community and blossoming.
This is actually huge of course and informs us the the bitcoin market will provide a true global currency outside the control of all national governments. 

Yet it will be subsumed by the natural community is both its virtual manifestation and its physical form however rare.
Five Russian Cryptocurrency Projects You Should Know About

Russia is a massive presence in the cryptocurrency phenomenon.

Nina Lyon

Sat, Dec 23, 2017

Russia has produced lots of prominent figures in the crypto industry, including Vitalik Buterin and Igor Barinov. These days, its almost impossible to come across some ICO landing page without seeing at least one Russian name on the team.

While projects like Ethereum and Blocknotary went global and are hardly related to Russia itself, the country seems to have more prominent projects and people it could contribute to the expanding blockchain universe. Even though the regulatory environment in Russia remains ambiguous with controversial statements issued by government officials almost every week, these projects managed to not only to emerge but to truly flourish.


Waves, a Moscow-based project led by Sasha Ivanov, hit the headlines back in 2016 with their platform that offered nothing other than killing Kickstarter. Since then, it has become a global public blockchain platform providing shared infrastructure with highly functional and intuitive tools. The company has held one of the most succes...


Eyewitness Reports of Apparent Living Pterosaurs in the US Terra Forming Terra

The problem is that no one even knows this phenomena exists and then have no place to go with their data.  The map pretty well confirms a real lack of resolution.  We really need to get those hundreds of missing reports.

I do think that this creature spends plenty of time underwater fishing at night.  Thus it should by active around wetlands, lakes and swamps or where fish are readily availablie.

In the event, the phenomena now has ample confirmation sightings to fully establish its presence.


 Eyewitness Reports of Apparent Living Pterosaurs in the US

Monday, January 08, 2018

Eyewitness Reports of Apparent Living Pterosaurs in the US

Statistical analysis on the number of reported sightings of flying creatures resembling living pterosaurs, by human populations in American states

Jonathan David Whitcomb - Dec 28, 2017, 4:00 a.m., MT. MURRAY, Utah, Dec 28, 2017/LUAPT -- A nonfiction-cryptozoology author has analyzed reports of non-extinct pterosaurs, commonly called pterodactyls or flying dinosaurs, and found how sightings relate to thirty-three states (and Washington D.C.) of the United States. Jonathan Whitcomb, of Murray, Utah, has been receiving emails, and an occasional phone call, over a period of 13 years, from eyewitnesses from five continents, and most reported sightings are in North America.

Using 161 sighting reports, which Whitcomb chose after eliminating ones that had too much potential for misidentification of a bird, he found that California and Texas had the most, at 27 and 11, but he ascribed that to higher human populations in those two states. (On this list, seventeen U.S. states had no reported sightings.) Other findings surprised Whitcomb.


The EPO Ignores This Weeks Decision Which Demonstrates Patent Scope Gone Awry; Software Patents Brought Up Again Techrights

Its all about money and replacing examiners with machines

Battistelli and money

Summary: The worrisome growth of European Patents (EPs) a 40% jump in one year in spite of decline in the number of patent applications is a symptom of the poor judgment, induced largely by bad policies that impede examiners activities for the sake of so-called production; this weeks decision regarding CRISPR is another wake-up call and software patents too need to be abolished (as a whole), in lieu with the European Patent Convention (EPC)

THE EPO has said absolutely nothing about the Board or about Broad. Odd, isnt it? Not even a tweet. Sometimes they do link to decisions of the Boards of Appeal, but not this time. Instead, theres this junk about a new Benot Battistelli photo op (warning: link). We dont know if theyre intentionally distracting from something, but we can only guess. Got to maintain the perception of top-notch patent quality, right?

Battistelli took a flight on some plane and all he got was a lousy photo op (in which he is barely even visible).As usual, this EPO news is all about Benot Battistelli. Heck, the entire Web site of the EPO is a shrine to Battistelli. How many years will that take to undo?

The worlds news aggregators said nothing about the above meeting, which is pretty insignificant anyway. Battistelli took a flight on some plane and all he got was a lousy photo op (in which he is barely even visible). Blog post imminent? Either way, lets look at the real news.

The EPO went overboard, unhinged from the actual purpose and function of patent offices.Fallout of EPO granting (in error) patents on life is very much visible. Its prominent in the news. We already wrote 3 articles about it earlier this week (on Wednesday and Thursday [1, 2,...


'ChaiOS' Bug Can Cause IMessage to Crash With a Text Message SoylentNews

There's a new bug floating around called "chaiOS" that appears to be a basic GitHub link. However, when you text it to a person via the iMessage app (whether on iOS or MacOS), it will crash the app and possibly cause the device to freeze and restart. In other words: Be aware that this exists, but don't send it to anyone.

It was Twitter user Abraham Masri who first uncovered the bug. The people over at 9to5Mac tested it out, and it certainly messed up their devices. They reported crashes and severe lags as a result of the bugs that persisted until the thread containing the link was deleted from the iMessage app. If you did send or receive it, and your device is a mess, there's also a fix in the replies to Masri's original tweet. We've reached out to Apple to confirm that their team is aware of the bug, and to see if there are any fixes in the works.

Source: EnGadget

Original Submission

Read more of this story at SoylentNews.


WesternGeco v ION Geophysical (at the US Supreme Court) Wont Affect Patent Scope Techrights

The de facto reference for the case

WesternGeco LLC v. ION Geophysical Corp.

Summary: As WesternGeco v ION Geophysical is the main if not sole major patent case that the US Supreme Court will deal with, it seems safe to say that nothing substantial will change for patent scope in the United States this year

THE patent microcosm has begun speaking more and more about WesternGeco v ION Geophysical a case which weve mentioned several times so far this week, usually in the context of Alice being safe from challenge [1, 2].

It has absolutely no impact on patent scope.To avoid misunderstandings, let is be stressed that the decision whichever way it may go wont have any profound effect on anything we cover. Its barely of any relevance to us. An article from Prof. Kumar (last revised days ago) is titled Patent Damages Without Borders [via] and the abstract is a concise summary of the case: The presumption against extraterritoriality is a deceptively straightforward principle: that U.S. law applies only inside the United States. But there is confusion regarding whether the presumption applies when a court calculates patent damages. In WesternGeco L.L.C. v. Ion Geophysical Corp., the Federal Circuit held that patent holders who show infringement under 271(f) of the Patent Act cannot recover foreign lost profits. The court maintained that allowing recovery of such damages would result in the Patent Act applying extraterritorially, which cannot be done without Congresss clear intent. This interpretation severely limits the ability of district courts to make patent infringement victims whole. This Article maintains that the Federal Circuits reliance on the presumption is misplaced. The presumption was established to prevent U.S. law from applying to extraterritorial c...


Reading out an EPROM with DIP switches Hackaday

Were all too spoiled nowadays with our comfortable ways to erase and write data to persistent memory, whether its our microcontrollers internal flash or some external EEPROM. Admittedly, those memory technologies arent exactly new, but they stem from a time when their predecessors had to bathe under ultraviolet light in order to make space for something new. [Taylor Schweizer] recently came across some of these quartz-window decorated chips, and was curious to find out what is stored in them. Inspired by the BIOS reverse engineering scene in Halt and Catch Fire, he ended up building his own simple reader to display the EPROMs content.

The 2732 he uses is a standard EPROM with 32kbit memory. Two pins, Chip Enable and Output Enable, serve as main control interface, while 12 address pins select the data stored in the chips internal 4K x 8 arrangement, to output it on the 8 data output pins. You could of course hook up the EPROM to a microcontroller and send what you read via serial line, but [Taylor] opted for a more hands-on approach that lets him read out the data in a manual way. He simply uses a bank of DIP switches to set the address and control pins, and added a row of LEDs as display.

As you can see from the short demonstration in the video after the break, reading out the entire EPROM would be a rather tedious task this way. If you do have more serious intentions to read out the content, you could have a look at one of those microcontroller based solutions sending data via serial line after all.


Walmart to Hand Out Packets That Turn Leftover Opioids Into Disposable Gel SoylentNews

Walmart offers way to turn leftover opioids into useless gel

Walmart is helping customers get rid of leftover opioids by giving them packets that turn the addictive painkillers into a useless gel. The retail giant announced Wednesday that it will provide the packets free with opioid prescriptions filled at its 4,700 U.S. pharmacies.

The small packets, made by DisposeRX, contain a powder that is poured into prescription bottles. When mixed with warm water, the powder turns the pills into a biodegradable gel that can be thrown in the trash. It works on other prescription drugs and for pills, tablets, capsules, liquids or patches, according to DisposeRx.

[...] Some drugstore chains like CVS and Walgreens also collect unused medications at many of their stores. People can also take leftovers to hospital pharmacies or police stations. Unused prescriptions also can be thrown in the trash. But the Food and Drug Administration recommends mixing them first with something unpalatable like kitty litter or used coffee grounds and sealing the mixture in a plastic bag.

Original Submission

Read more of this story at SoylentNews.


Drone comes to the rescue of two swimmers in Australia Lifeboat News: The Blog

One day, they may yet turn against us, but for now, theyre still our allies: A drone rescued two teenage swimmers in distress off the coast of New South Wales in Australia, according to a new report. The drone spotted two teenagers in trouble around a half-a-mile out from shore, and then dropped a flotation device it carries for the purpose to give them something to hang on to (via Verge).

This drone was actually not supposed to be saving anyone just yet it was engaged in a pilot project to test its viability. But the Sydney Morning Herald reports that when a call came through about the swimmers in trouble, the drone happened to be in the Ari and nearby, positioned well to respond.

The drones pilot, a decorated veteran lifeguard for New South Wales, was able to Gert out to the swimmers position, and drop the pod in a minute or two, which is at least a few minutes less than it wouldve taken to respond directly with actual flesh and blood lifeguards.


Blood test to detect 8 cancers early gives promising results Lifeboat News: The Blog

Associated Press historical news archive articles dating back to 1985.


Scientists Move Closer to a Universal Flu Vaccine Lifeboat News: The Blog

Researchers hope their new approach, which works well in lab animals, may save more lives.


Watch a Thought Race Across the Surface of the Brain SoylentNews

Although neuroscientists have a general idea of what parts of the brain do what, catching them in the act is a difficult proposition. But UC Berkeley researchers have managed to do it, visualizing based on direct measurement the path of a single thought (or at least thread) through the brain.

Normal scalp-based electroencephalography (EEG) is easy to do, but it really can only get a very blurry picture of brain activity near the surface, because it has to detect all that through your hair, skin, skull, etc.

What if you could take all that stuff out of the way and put the electrodes right on the brain? That'd be great, except who would volunteer for such an invasive procedure? Turns out, a handful of folks who were already getting open-brain surgery did.

[...] We are trying to look at that little window of time between when things happen in the environment and us behaving in response to it," explained lead author Avgusta Shestyuk in the Berkeley news release. "This is the first step in looking at how people think and how people come up with different decisions; how people basically behave."

Source: TechCrunch

Original Submission

Read more of this story at SoylentNews.



MicroPython learns a new trick ISP for AVRs Hackaday

One of the reasons why the Arduino became so popular was the ability to program it with ease. It meant the end of big parallel programmers that would cost an arm and a leg. The latest installment of CircuitPython from [Lady Ada] and the team over at Adafruit is a library for programming AVR microcontrollers without a dedicated PC.

For the uninitiated, in-system programming or ISP for AVR controllers employ the SPI bus to write the compiled binary to the flash memory of the controller. The discount on the number of pins used itself is a benefit though getting the timings right was a bit tricky in the good old days. Most dedicated ISPs handle this nicely, though they are normally slaves to a host PC where an upload button initiates the process.

With CircuitPython (a derivative of MicroPython), programming microcontrollers does not require going through the code-compile-flash cycle. It can be run on a number of processors, however, AVRs are not among them so this neat little library offers the next best thing. Wire-up an Atmega328P or ATmega2560 to a board like the ESP8266 that does run CircuitPython, and you can write firmware on the fly.

There is a complete tutorial on the subject thanks to [Phillip Torrone] and [Lady Ada] which includes some demo files for testing out the functionality. This opens up a lot of possibilities where OTA firmware updates for an AVR co-processor. We expect to see some keychain AVR programmers in the near future taking a hint from the ESP8266 based Two-Factor Authentication featured previously.


What Makes the Hardest Equations in Physics So Difficult? - Facts So Romantic Nautilus

Reprinted with permission from Quanta MagazineAbstractions blog.

Familiarity hasnt bred knowledge: Turbulence is one of the least understood parts of the physical world.Photograph by Mike / Flickr

Physics contains equations that describe everything from the stretching of space-time to the flitter of photons. Yet only one set of equations is considered so mathematically challenging that its been chosen as one of seven Millennium Prize Problems endowed by the Clay Mathematics Institute with a $1 million reward: the Navier-Stokes equations, which describe how fluids flow.

Last month I wrote a story about an important new result related to those equations. If anything, the new work suggests that progress on the Millennium Prize will be even harder than expected. Why are these equations, which describe familiar phenomena such as water flowing through a hose, so much harder to understand mathematically than, say, Einsteins field equations, which involve stupefying objects like black holes?

The answer, I discovered, is turbulence. Its something weve all experienced, whether flying through choppy air at 30,000 feet or watching a whirlpool gather in the bathtub drain. Yet familiarity hasnt bred knowledge: Turbulence is one of the least understood parts of the physical world.

Lucy Reading-Ikkanda /
Read More


Apple Plans to Invest $350 Billion (with a "B") in USA Over Next 5 Years SoylentNews

Apple invests $350 billion (with a "B") in USA over next 5 years

Apple today announced a new set of investments to build on its commitment to support the American economy and its workforce, concentrated in three areas where Apple has had the greatest impact on job creation: direct employment by Apple, spending and investment with Apples domestic suppliers and manufacturers, and fueling the fast-growing app economy which Apple created with iPhone and the App Store. Apple is already responsible for creating and supporting over 2 million jobs across the United States and expects to generate even more jobs as a result of the initiatives being announced today.

Combining new investments and Apples current pace of spending with domestic suppliers and manufacturers an estimated $55 billion for 2018 Apples direct contribution to the US economy will be more than $350 billion over the next five years, not including Apples ongoing tax payments, the tax revenues generated from employees wages and the sale of Apple products.

[...] "Apple, already the largest US taxpayer, anticipates repatriation tax payments of approximately $38 billion as required by recent changes to the tax law. A payment of that size would likely be the largest of its kind ever made."

Read more of this story at SoylentNews.


Samsung Announces Mass Production of GDDR6 SDRAM SoylentNews

Samsung has announced the mass production of 16 Gb GDDR6 SDRAM chips with a higher-than-expected pin speed. The chips could see use in upcoming graphics cards that are not equipped with High Bandwidth Memory:

Samsung has beaten SK Hynix and Micron to be the first to mass produce GDDR6 memory chips. Samsung's 16Gb (2GB) chips are fabricated on a 10nm process and run at 1.35V. The new chips have a whopping 18Gb/s pin speed and will be able to reach a transfer rate of 72GB/s. Samsung's current 8Gb (1GB) GDDR5 memory chips, besides having half the density, work at 1.55V with up to 9Gb/s pin speeds. In a pre-CES 2018 press release, Samsung briefly mentioned the impending release of these chips. However, the speed on release is significantly faster than the earlier stated 16Gb/s pin speed and 64GB/s transfer rate.

18 Gbps exceeds what the JEDEC standard calls for.

Also at Engadget and Wccftech.

Related: GDDR5X Standard Finalized by JEDEC
DDR5 Standard to be Finalized by JEDEC in 2018
SK Hynix to Begin Shipping GDDR6 Memory in Early 2018
Samsung's Second Generation 10nm-Class DRAM in Production

Original Submission

Read more of this story at SoylentNews.


Overnight Tech: Senate extends NSA spy program | Apple to allow customers to disable phone slowdowns | Amazon down to 20 HQ2 finalists | Facebook gets first black board member The Hill: Technology Policy

SENATE VOTES TO EXTEND NSA SURVEILLANCE: The Senate on Thursday passed an extension of a government surveillance program, sending the bill to President Trump's desk.Senators voted 65-34 on the bill, which includes a six-year extension with...



Gesture-Control Chip Lifeboat News: The Blog

This chip can control certain devices using *just* gestures.


Singularity Hypotheses Photo Lifeboat News: The Blog

Has AI made significant progress over the years towards artificial general intelligence?

This decades-old debate could end by the new project from the Stanford 100 Year Study on AI, called The AI Index. If their goal is achieved.

Off to a good start, the AI Indexs first report includes many useful visualisations of the data they are collecting, such as the following outline of AI breakthroughs since 1980.


Cardboard wall is surprisingly well built Hackaday

We all built cardboard forts when we were kids. [Paintingcook] has taken it into adulthood with a hand built cardboard wall. He and his wife leased a loft apartment. Lofts are great one giant space to work with. Plans changed a bit when they found out they had a baby on the way. A single living, working, and sleeping space definitely wouldnt be good for a newborn, so the couple set about separating a section of the room with a wall.

Sheetrock and steel or wood lumber would be the normal path here. They instead decided to recycle their cardboard moving boxes into a wall. The boxes were formed into box beams, which created the framework of the wall. The two pillars were boxed in and incorporated into the wall itself. The skin of the wall is a random patchwork of cardboard pieces. Most of the construction is completed with 3/8 screws and masking tape. Tape wont last forever, but this is a temporary wall after all.

You might be wondering about fire hazards sure, cardboard burns more readily than gypsum board, but the apartment is outfitted with sprinklers, which should help on this front. A few commenters on [Paintingcooks] Reddit thread asked about formaldehyde and other gasses emitting from the cardboard. Turns out hes an inorganic chemist by trade. He says any outgassing happens shortly after the cardboard is manufactured. It should be safe for the baby.

Cardboard is a great material to work in. You can build anything from robots to computers to guns with it. So get hop the couch, grab that Amazon box, and get hacking!


HPR2470: Obamacare Update At The End Of 2017 Hacker Public Radio

In 2017 Obamacare was the subject of a great deal of political jockeying, and yet by the end of the year almost nothing changed. So what happened, and why?



Quantum Superposition Experiment Will Test for "Universal Background Noise" SoylentNews

Groundbreaking Experiment Will Test The Limits Of Quantum Theory

[A] consortium has devised an ambitious experiment to test the so-called quantum superposition principle (QSP) the law that allows microscopic systems to appear in two different, perfectly distinguishable, configurations at the same time. [...] Unproven theories advanced since the 1980s suggest the existence of a universal background 'noise' that destroys QSP of larger objects, such as particles that can be seen using an optical microscope.

The 'Project TEQ' consortium, led by the University of Trieste, in Italy, will test the existence of this noise thanks to a 4.4M (3.9M) award from the European Commission.

Its experiment will involve a tiny particle of glass, one-thousandth of the width of a human hair, being levitated by an electric field in a vacuum at a temperature close to absolute zero (-273C). A laser will be shot at the particle, and the scattering of the laser's light measured for signs of movement of the particle.

If there is no movement, it means that quantum mechanics still apply at this scale and there is no universal background noise. However, if movement is detected, it indicates the existence of a noise that prevents QSP applying at this scale. This would represent the first observed failure of quantum theory, setting a limit on the scale at which quantum mechanics apply and having implications for large-scale applications of any physical system based on quantum principles.

Quantum superposition.

Original Submission

Read more of this story at SoylentNews.


Drone saves teen swimmers in world first Lifeboat News: The Blog

Lifeguards in Australia interrupt a drone training session to save two stricken boys.


This 3D-Printed Heart Could Replace Blood Pumps Lifeboat News: The Blog

These 3D-printed, artificial hearts could replace real hearts one day.


Staff Persona Avatars: Social Media, Big Data and Employer Branding Social Network by Laurel Papworth

Would you use big data tools that analyse social media to identify your perfect job and ditch unsuitale jobs? Should organisations use big data tools to analyse social media to identify perfect candidates and ditch less than ideal ones?