IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Wednesday, 08 March

01:47

Twitter Suspends Copyright Holder as Musk Outlaws Weaponization of DMCA TorrentFreak

pirate twitterIn May 2022, Elon Musk declared overzealous use of the DMCA a plague on humanity.

As CEO of Twitter, Musk understands that his platform has certain obligations if it wishes to maintain protection from liability under copyright law. On receipt of a properly formatted and submitted takedown notice, allegedly infringing content must be taken down.

A dispute that boiled over yesterday began with these two steps but ended up with the copyright holder having his account suspended, presumably by Musk himself or on his instructions.

The two people at the heart of the original dispute are both Twitter users. Since most tweets relating to the initial dispute have since been deleted or disabled, here we rely on archived and cached copies for evidence. Since one users account has been suspended, links to the account and its tweets are included but are likely to fail.

Adrien Mauduit (@NightLights_AM)

Adrien Mauduit (@NightLights_AM, Norway) operates the currently-suspended Night Lights account. He describes himself as a professional nature cinematographer, astrophotographer, and an Aurora chasing specialist.

A review of Mauduits recent posts suggests that his Twitter account is mainly used to post content he creates himself, usually videos or photographs.

Mauduits pinned tweet is/was a stunning short video dated March 4, 2023. Its described as a double solar storm punch that created a G3 (max) geomagnetic storm. This video sits at the heart of the dispute.

nightlights-am-original

Posted on March 3, the video was well received. Comments under the original tweet include: INCREDIBLE! Feast for the eyes and spirit, This one is off the charts! and Wow Adrien! Absolutely killing it! Thanks for sharing!

Massimo (@Rainmaker1973)

Massimo (Italy) operates the...

01:32

McQueen: Flathub in 2023 LWN.net

The Flathub organization (in the form of Robert McQueen) has posted a lengthy update on the state of Flathub and its plans for the coming year.

So far, the GNOME Foundation has acted as an incubator and legal host for Flathub even though its not purely a GNOME product or initiative. Distributing software to end users along with processing and forwarding payments and donations also has a different legal profile in terms of risk exposure and nonprofit compliance than the current activities of the GNOME Foundation. Consequently, we plan to establish an independent legal entity to own and operate Flathub which reduces risk for the GNOME Foundation, better reflects the independent and cross-desktop interests of Flathub, and provides flexibility in the future should we need to change the structure.

01:25

Beans IN Toast Could Revolutionise British Diet SoylentNews

Scientists are aiming to revolutionise British diets by slipping more UK-grown beans into our daily bread:

Researchers and chefs at the University of Reading aim to encourage British consumers and food producers to switch to bread containing faba beans (commonly known as broad beans), making it healthier and less damaging to the environment.

[...] Five teams of researchers within the University of Reading, along with members of the public, farmers, industry, and policy makers, are now working together to bring about one of the biggest changes to UK food in generations.

[...] This is by increasing pulses in the UK diet, particularly faba beans, due to their favourable growing conditions in the UK and the sustainable nutritional enhancement they provide.

Despite being an excellent alternative to the ubiquitous imported soya bean, used currently in bread as an improver, the great majority of faba beans grown in the UK go to animal feed at present.

[...] "96% of people in the UK eat bread, and 90% of that is white bread, which in most cases contains soya. We've already performed some experiments and found that faba bean flour can directly replace imported soya flour and some of the wheat flour, which is low in nutrients. We can not only grow the faba beans here, but also produce and test the faba bean-rich bread, with improved nutritional quality."

For those who prefer their information in YouTube format


Original Submission

Read more of this story at SoylentNews.

01:15

Security updates for Tuesday LWN.net

Security updates have been issued by Debian (kopanocore), Fedora (golang-github-projectdiscovery-chaos-client, rust-sequoia-octopus-librnp, rust-sequoia-sop, rust-sequoia-sq, and usd), Oracle (libjpeg-turbo and pesign), Red Hat (kernel, kernel-rt, kpatch-patch, osp-director-downloader-container, pesign, rh-mysql80-mysql, samba, and zlib), SUSE (mariadb), and Ubuntu (fribidi, gmp, linux, linux-aws, linux-kvm, linux-lts-xenial, linux-azure, linux-azure-4.15, linux-kvm, linux-raspi2, linux-snapdragon, linux-raspi, nss, python3.6, rsync, systemd, and tiff).

01:11

CVE-2023-27522: Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting Open Source Security

Posted by Eric Covener on Mar 07

Severity: moderate

Description:

HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server:
from 2.4.30 through 2.4.55.

Special characters in the origin response header can truncate/split the response forwarded to the client.

Credit:

Dimas Fariski Setyawan Putra (nyxsorcerer) (finder)

References:

https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/...

01:09

CVE-2023-25690: Apache HTTP Server: HTTP request splitting with mod_rewrite and mod_proxy Open Source Security

Posted by Eric Covener on Mar 07

Severity: important

Description:

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.

Configurations are affected when mod_proxy is enabled along with some form of RewriteRule
or ProxyPassMatch in which a non-specific pattern matches
some portion of the user-supplied request-target (URL) data and is then
re-inserted into the proxied request-target using variable...

00:58

SYS01stealer: New Threat Using Facebook Ads to Target Critical Infrastructure Firms The Hacker News

Cybersecurity researchers have discovered a new information stealer dubbed SYS01stealer targeting critical government infrastructure employees, manufacturing companies, and other sectors. "The threat actors behind the campaign are targeting Facebook business accounts by using Google ads and fake Facebook profiles that promote things like games, adult content, and cracked software, etc. to lure

00:31

SPACE FORCE: The Secret Orbit Arms Race in Space | SpaceTime WELT Documentary Lifeboat News: The Blog

In December 2019, the United States established its new space force: the United States Space Force. A logical step in a globalized and digitized world whose infrastructure depends on satellites in space. This infrastructure is under threat. Also by a resurgence of conflict between East and West. This episode of Spacetime describes how the military conquered space and why the world is in a new arms race in Earth orbit.

#documentary #spacetime #usa.

Watch more documentaries https://www.youtube.com/playlist?list=PL-5sURDcN_Zl8hBqkvZ6uXFpP3t55HU9s.

Subscribe to our full documentary channel.

00:29

Open source software could deliver huge time savings for computational chemists Lifeboat News: The Blog

A new program can streamline the process of creating, launching and analysing computational chemistry experiments. This piece of software, called AQME, is distributed for free under an open source licence, and could contribute to making calculations more efficient, as well as accelerating automated analyses.

We estimate time savings of around 70% in routine computational chemistry protocols, explains lead author Juan Vicente Alegre Requena, at the Institute of Chemical Synthesis and Homogeneous Catalysis (ISQCH) in Zaragoza, Spain. In modern molecular simulations, studying a single reaction usually involves more than 500 calculations, he explains. Generating all the input files, launching the calculations and analysing the results requires an extraordinary amount of time, especially when unexpected errors appear.

Therefore, Alegre and his colleagues decided to code a piece of software to skip several steps and streamline calculations. Among other advantages, AQME works with simple inputs, instead of the optimised 3D chemical structures usually required by other solutions. Its exceptionally easy, says Alegre. AQME is installed in a couple of minutes, then the only indispensable input is as a simple Smiles string. Smiles is a system developed by chemist and coder Dave Weininger in the late 1980s, which converts complex chemical structures into a succession of letters and numbers that is machine readable. This cross-compatibility could allow integration with chemical databases and machine-learning solutions, most of which include datasets in Smiles format, explains Alegre.

00:29

The mushrooms you can wear and build with Lifeboat News: The Blog

A growing number of firms are turning fungi roots into clothing and building material.

00:28

Dr. Moupali Das, MD, MPH Gilead Sciences Dedicated To Ending The HIV Epidemic Lifeboat News: The Blog

Dedicated to ending the HIV epidemic dr. moupali das, MD, MPH, executive director, HIV clinical research, gilead sciences.


Dr. Moupali Das, MD, MPH, is Executive Director, HIV Clinical Research, in the Virology Therapeutic Area, at Gilead Sciences (https://www.gilead.com/), where she leads the pre-exposure prophylaxis (PrEP) clinical drug development program, including evaluating the safety and efficacy of a long-acting, twice yearly, subcutaneous injection being studied for HIV prevention. Her responsibilities also include expanding the populations who may benefit from PrEP.

Dr. Das has led high-performing teams in academic medicine, public health, implementation science, and cross-functionally in drug development. She has successfully helped develop, implement, and evaluate how to better test, link to care, increase virologic suppression, and improve quality of life for people with HIV, and to prevent HIV in those who may benefit from PrEP.

During the COVID19 pandemic, Dr. Das assisted her colleagues in the COVID-19 treatment program, leading the evaluation of a COVID-19 treatment for use in pregnant women and children from the compassionate use program.

After completing her undergraduate degree in Biochemical Sciences at Harvard College, medical school and internal medicine residency training at Columbia University and New York Presbyterian Hospital, Dr. Das came to University of California, San Francisco (UCSF) for fellowship training in Infectious Diseases and to University of California, Berkeley for her MPH in Epidemiology. She cared for HIV patients at San Francisco Generals storied Ward 86 clinic and attended on the inpatient ID Consult Service. She is recognized internally and externally for her expertise in epidemiology, public health, advocacy, and community engagement.

Prior to joining Gilead, Dr. Das developed a novel population-based indicator, community viral load (CVL), to evaluate the impact of treatment as prevention. Her CVL research was the basis for using viral suppression to evaluate the effectiveness of President Barack Obamas National HIV/AIDS Strategy. She also served on the Institute of Medicine Committee on Data Systems for Monitoring HIV/AIDS care.

Dr. Das has authored over 60 manuscripts, presented at scientific conferences, policy forums, and for community and advocacy organizations. Her publications ha...

00:25

NASA shares breathtaking aurora video from space station Lifeboat News: The Blog

NASA has released a breathtaking time-lapse video captured from the International Space Station showing a recent aurora over Earth.

00:25

Scientists found a dinosaur with skin on its face still intact Lifeboat News: The Blog

Scientists have made a freak discovery thats potentially brought us closer to dinosaurs than weve ever been before.

Archaeologists uncovered one of the most well-preserved dinosaur fossils so preserved that its very skin was still intact after all these years.

Talk about a good skincare routine, the discovery is now being hailed as a one-in-a-billion find.

00:25

Fred Hoyle: I dont believe in the Big Bang Lifeboat News: The Blog

Sir Fred Hoyle was an English astronomer who formulated the theory of stellar nucleosynthesis. He also held controversial stances on other scientific matters in particular his rejection of the Big Bang theory, a term coined by him on BBC radio, and his promotion of panspermia and the Steady-state theory of the universe.

00:24

Huge young galaxies seen Lifeboat News: The Blog

Galaxies spotted by the James Webb Space Telescope seem far too massive to have formed so early on in the universes history, which could be a problem for our ideas of galaxy formation.

By Leah Crane and Alex Wilkins.

00:24

Intel Preparing IAA Crypto Compression Driver - Kernel Crypto API Use For Accelerators Phoronix

In addition to Intel's Linux patches in recent days working on broad performance optimizations that can benefit all hardware there has also been some Intel-specific kernel improvements being worked on like the Sapphire Rapids C0.2 idle state support that was published for review on Monday. Also coming out from the covers on Monday was a new patch series for the "iaa_crypto" driver to improve the Linux support for Intel's In-Memory..

00:23

Quantum Physics: Scientists Cool Nanoparticles to Ground-State in 2D Motion Lifeboat News: The Blog

Experts consider glass nanoparticles kept inside extreme vacuum layers as potential platforms for examining the quantum worlds limits. However, a question in the field of quantum theory remains unanswered: at which size does an object start being described by quantum physics laws rather than classical physics laws?

Achieving Quantum-State Cooling in More Than One Direction Is Challenging

SciTechDaily reports that a research team attempted to precisely answer the question through the ERC-Synergy project Q-Xtreme. The team comprised Lukas Novotny from ETH Zurich, Markus Aspelmeyer from the University of Vienna, Oriol Romero-Isart from the University of Innsbruck, and Romain Quidant from Zurich.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Tuesday, 07 March

23:00

Probably The Most Over-Specified Calculator To Ever Be Manufactured Hackaday

Its possible quite a few of our older readers will remember the period from the 1960s into the 70s when an electronic calculator was the cutting edge of consumer-grade digital technology. By the 1980s though, they were old hat and could be bought for only a few dollars, a situation that remains to this day. But does that mean calculator development dead?

...

23:00

GNOME Shell & Mutter 44 Release Candidates Bring Last Minute Changes Phoronix

The GNOME Shell and Mutter release candidates ahead of this month's GNOME 44 desktop update are now available for testing...

22:46

AMD's Suballocator Helper Gets Ready To Help Intel's New Xe Linux Graphics Driver Phoronix

With the Linux 6.3-rc1 kernel now out and that closing the Linux 6.3 merge window, the open-source Linux graphics driver developers are turning their attention to feature work they want to accomplish for Linux 6.4 this summer. Already the first drm-misc-next pull request has been submitted to DRM-Next with some of those early changes that will target the v6.4 kernel...

22:41

Two Security Flaws in the TPM 2.0 Specs Put Cryptographic Keys at Risk SoylentNews

In-hardware security can be defeated with just two extra bytes:

The Trusted Platform Module (TPM) secure crypto-processor became a topic for public debate in 2021 when Microsoft forced TPM 2.0 adoption as a minimum requirement for installing Windows 11. The dedicated hardware controller should provide "extra hard" security to data and cryptographic algorithms, but the official specifications are bugged.

Security researchers recently discovered a couple of flaws in the Trusted Platform Module (TPM) 2.0 reference library specification, two dangerous buffer overflow vulnerabilities that could potentially impact billions of devices. Exploiting the flaws is only possible from an authenticated local account, but a piece of malware running on an affected device could do exactly that.

The two vulnerabilities are tracked as CVE-2023-1017 and CVE-2023-1018, or as "out-of-bounds write" and "out-of-bounds read" flaws. The issue was discovered within the TPM 2.0's Module Library, which allows writing (or reading) two "extra bytes" past the end of a TPM 2.0 command in the CryptParameterDecryption routine.

By writing specifically crafted malicious commands, an attacker could exploit the vulnerabilities to crash the TPM chip making it "unusable," execute arbitrary code within TPM's protected memory or read/access sensitive data stored in the (theoretically) isolated crypto-processor.

In other words, successful exploitation of the CVE-2023-1017 and CVE-2023-1018 flaws could compromise cryptographic keys, passwords and other critical data, making security features of modern, TPM-based operating systems like Windows 11 essentially useless or broken.

Read more of this story at SoylentNews.

22:39

Transparent Tribe Hackers Distribute CapraRAT via Trojanized Messaging Apps The Hacker News

A suspected Pakistan-aligned advanced persistent threat (APT) group known as Transparent Tribe has been linked to an ongoing cyber espionage campaign targeting Indian and Pakistani Android users with a backdoor called CapraRAT. "Transparent Tribe distributed the Android CapraRAT backdoor via trojanized secure messaging and calling apps branded as MeetsApp and MeetUp," ESET said in a report

22:24

Coreboot Adds Support For An ASRock Sandy/Ivy Bridge Era Mini ITX Board Phoronix

For those that happen to have an ASRock B75M-ITX in their collection or have just been looking for an old Intel Sandy Bridge / Ivy Bridge era system that can run the open-source Coreboot firmware, this mini-ITX desktop motherboard can run upstream Coreboot with the latest changes made this week...

22:23

Why Healthcare Can't Afford to Ignore Digital Identity The Hacker News

Investing in digital identity can improve security, increase clinical productivity, and boost healthcare's bottom line.  by Gus Malezis, CEO of Imprivata Digitalization has created immeasurable opportunities for businesses over the past two decades. But the growth of hybrid work and expansion of Internet of Things (IoT) has outpaced traditional 'castle and moat' cybersecurity, introducing

21:29

LastPass hack caused by an unpatched Plex software on an employees PC Security Affairs

The LastPass data breach was caused by the failure to update Plex on the home computer of one of the company updates.

The security breach suffered by LastPass was caused by the failure to update Plex on the home computer of one of its engineers.

Recently, the password management software firm disclosed a second attack, a threat actor used data stolen from the August security breach and combined it with information available from a third-party data breach. Then the attackers exploited a flaw in a third-party media software package to target the firm.

LastPass revealed that the home computer of one of its DevOp engineers was hacked as part of a sophisticated cyberattack.

The attackers targeted one of the four DevOps engineers who had access to the decryption keys needed to access the cloud storage service. The hackers installed a keylogger on the DevOp engineers computed and captured his master password.

The investigation conducted by the company with the help of the cybersecurity firm Mandiant confirmed the attack on the DevOps engineers home computer.

The attackers hacked the employees home computer by exploiting a deserialization of untrusted data in Plex Media Server on Windows. The issue, tracked as CVE-2020-5741 (CVSS score: 7.2), can be exploited by a remote, authenticated attacker to execute arbitrary Python code.

We have recently been made aware of a security vulnerability related to Plex Media Server. This issue allowed an attacker with access to the server administrators Plex account to upload a malicious file via the Camera Upload feature and have the media server execute it. This could be done by setting the server data directory to overlap with the content location for a library on which Camera Upload was enabled. reads the...

20:53

20:00

Displaying the Time is Elemental With This Periodic Table Clock Hackaday

We see a lot of clocks here at Hackaday, so many now that its hard to surprise us. After all, there are only so many ways to divide the day into intervals, as well as a finite supply of geeky and quirky ways to display the results, right?

Thats why this periodic table clock really caught our eye. [gocivici]s idea is a simple one: light up three different elements with three different colors for hours, minutes, and seconds, and read off the time using the atomic number of the elements. So, if its 13:03:23, that would light up aluminum in blue, lithium in green, and vanadium in red. The periodic table was designed in Adobe Illustrator and UV printed on a sheet of translucent plastic by an advertising company that specializes in such things, but wed imagine other methods could be used. The display is backed by light guides and a baseplate to hold the WS2812D...

19:54

Arm Opts for New York Stock Listing in Blow to London SoylentNews

Arm says it decided a sole US listing in 2023 was "the best path forward":

[...] Arm's decision not to pursue a listing on the London Stock Exchange this year has raised concerns that the UK market is not doing enough to attract tech company stock offerings, with US exchanges seen to offer higher profiles and valuations.

SoftBank Group Corp's founder and chief executive Masayoshi Son said last year he would probably look to the tech-heavy Nasdaq exchange for a potential Arm listing.

[...] "Arm is proud of its British heritage, and continues to work with the British Government," he said. "We will continue to invest and play a significant role in the British tech ecosystem."

A Government spokesperson said: "The UK is taking forward ambitious reforms to the rules governing its capital markets, building on our continued success as Europe's leading hub for investment, and the second largest globally."

They added the UK "continues to attract some of the most innovative and largest companies in the world" and acknowledged Arm's commitment to its UK presence with more jobs and investment.

[...] Russ Shaw CBE, founder of Tech London Advocates and Global Tech Advocates, said Arm's statement offered "glimpses of hope" for its commitment to its British roots, but Arm and SoftBank's decision to opt for a sole US listing is "a significant blow to the UK tech sector".

[...] He added Arm's decision "must be upheld as a case study for the UK Government of how 'not to do it'" - citing the company's sale to SoftBank in 2016 as a factor determining its US-only listing.

"Nations like the US and China that recognise the strategic value of chip companies would not have allowed such decisions to be made - then or now - and the UK must now endeavour to proactively protect its semiconductor industry," said Mr Shaw.


Original Submission

Read more of this story at SoylentNews.

19:00

Gates Foundation Insider Admits Covid Vaccines Are Abortion Drugs To Depopulate the World Terra Forming Terra



This report conforms to the actual available data that is also largely suppressed.  The Jab is nasty, but tying in abortion protocls as well would make sense to these folks.

Our real emergent problem is just how do we salvage the Jabbed?  They are suffetr5ing health degragation and i am hoping the damage is not particularly progressive.  That is a much more difficult bio problem to solve.

We are headed for a contracting civilization for some time period.


Gates Foundation Insider Admits Covid Vaccines Are Abortion Drugs To Depopulate the World


https://newspunch.com/gates-foundation-insider-admits-covid-vaccines-are-abortion-drugs-to-depopulate-the-world/

Covid-19 mRNA vaccines were designed as abortion drugs to quietly and deceitfully sterilize vast swathes of the human race, according to a Gates Foundation insider who has admitted that Bill Gates vaccine trials in Africa and India, in which thousands of children were sterilized, were trial runs for the mRNA vaccine roll-out in the Western world.


Many people are still refusing to see the globalist elite for what they really are. They want to believe Bill Gates is a philanthropist and if he accidentally sterilized half of Western Africa and India, then it must have been an accident. They want to believe the World Economic Forum are committed to improving the state of the world.
...

Idiocracy by design Terra Forming Terra




This is not possible unless it is planned and deliberately acted upon.  And where else than Chicago et all.

It is my belief that the only way anyone should be allowed into university is by successfully clearing the full STEM agenda and solid literacy in English in particular.  Everything else handily comes under trade school classification and that even includes most forms of computer programming. 

We have the tools today for anyone to polish their writing skills to a high level.  And reading skills come with reading

Obvious this cuts the whole university MEME down to size and true research schools do fine as well.

The current regime is supposed to educate folks, but it is done with a cherry picked supply of texts.  How is this supposed to educate?  You are the one who educates himself and this is hardly encouraged.  In fact, the best that can be said is that the best thinkers get drunk and skip classes.
.

IDIOCRACY BY DESIGN: Not a single student out of 53 Illinois high schools can do math at their own grade level
-March 2, 2023

https://www.dcclothesline.com/2023/03/02/idiocracy-by-design-not-a-single-student-out-of-53-illinois-high-schools-can-do-math-at-their-own-grade-level/

(Natural News) A report from the Illinois news outlet Wirepoints highlights a very concerning trend in the state of Illinois: Students at dozens of public high schools are not achieving grade-level proficiency in math, and their reading performance isnt much better.

...

Cancer Patient With Tumors as Big as Oranges Recovers in 10 DaysDid He Misunderstand Terra Forming Terra



This is a reminder about just how radically our mind can alter physical outcomes.  What is important is that you hold say a beaker and focus your intent toward a positive goal that indices health.  A little fussy here, but the road to being effective.

Assume a lot of the placebo effect is just this.

Why not hold a witching wand while focusing on intent?  If sick this can direct your so called Qi to the problem in question.  You get my point.



Cancer Patient With Tumors as Big as Oranges Recovers in 10 DaysDid He Misunderstand


Jun 11 2022


https://www.theepochtimes.com/health/cancer-patient-recovers-in-10-days-was-it-the-placebo-effect_4517491.html?

An optimistic state of mind is beneficial to health, while a pessimistic one is harmful. Modern medicine has recognized the so-called placebo effect. However, you may not know that human thoughts, emotions, and beliefs not only change the physical body, but also to the extent that they can possibly reverse cancer.

Below are several real-life cancer cases.

A Patients Terminal Cancer Disappeared Rapidly Due to a Misunderstanding

In a 1957 paper titled Psychological Variables in Human Can...

The bill that would give Americans a four-day workweek Terra Forming Terra





It has certainly become timely to discuss a sensible work week regulation system.  It really needs to be about optimizing outputs.  We have in each week exactly 168 hours or 42 four hour shifts.  Not a bad way to look at it.  I also think that the four hour shift should be the prime unit.  I have already posted that our so called minimum wage needs to be set around a guaranteed four hour base shift that pays base costs.

Clearly we still have with this either five days of two four hour shifts or alternately four days of two four hour shifts and perhaps thgree days of three four hour shifts.  Plenty of flexibility and overtime can be in two hour addons.

The key goal should be four days on and three days off to fully recharge.  To this end we can have two three shift days in there.

The big payoff is that four on will fully drain your energy while three off will also fully recharge your energy.  Also a mandatory break period allows mind resting between shifts if planned peroperly.  This can be really important for all mind work because hte brain actually needs a short term recharge.  And no alcohol in particular unless you want to wreak yourself.

This is driven first by our biology and do understand any rules fighting it will smiply be gamed.  We have long since understood that letting workers run at their own pace is best and letting them keep up with each other while rewarding group performance alone.


The bill that would give Americans a four-day workweek

https://www.semafor.com/article/03/01/2023/the-bill-that-would-give-americans-a-four-day-workweek

Rep. Mark Takano, D-Calif., is reintroducing a bill to put Americans on a four-day work week, capitalizing on a spate of recent news about the concept.

The bill would adjust the Fair Labor Standards Act to shrink the standard 40-hour workweek in the US to only 32 hours. Employers would then be required to pay overtime to employees whose work exceeds 32 hours per week.

...

18:42

Shein's Android App Caught Transmitting Clipboard Data to Remote Servers The Hacker News

application suffered from a bug that periodically captured and transmitted clipboard contents to a remote server. The Microsoft 365 Defender Research Team said it discovered the problem 16, 2021. The issue has since been addressed as of May 2022. Shein, originally named ZZKKO, is a Chinese online fast

17:21

LastPass Hack: Engineer's Failure to Update Plex Software Led to Massive Data Breach The Hacker News

The massive breach at LastPass was the result of one of its engineers failing to update Plex on their home computer, in what's a sobering reminder of the dangers of failing to keep software up-to-date. The embattled password management service last week revealed how unidentified actors leveraged information stolen from an earlier incident that took place prior to August 12, 2022, along with

17:20

Carnivores attacks on humans are becoming more common Terra Forming Terra



We have always had a problem with carnivores and it is only in the past two centuries that we have realy suppressed their numbers.  Unfortunately they are now recovering, mostly because their food supply has also recovered.

The big problem is that we need to fully integrate our animal husbandry with our agriculture.  Venison, wild turkeys and Wild pigs in particular need to be handled everywhere.

Then we have carnivores who are all opportunistic hunters. Coyotes and cougars are a real danger to children who need to be trained and always paired with a dog if doing walk about.  Wolves are dangerous to anyone when they are hungry.  Do not run alone in the winter.

That should keep you safe.  To do better, study the animals habits.

It is still eary days and we need to do more to scare them as well.  .


Carnivores attacks on humans are becoming more common, and climate change isnt helping

Rising population has led to increased human encroachment on natural habitats, but climate change is also pushing some animals closer to population centers, experts say.

A polar bear stands on a pack of ice north of Svalbard, Norway.Wolfgang Kaehler / LightRocket via Getty Images file

Feb. 7, 2023, 6:29 AM PST


https://www.nbcnews.com/science/environment/carnivores-attacks-humans-are-becoming-common-climate-change-isnt-he...

17:08

Flatpak Could Become a Universal App Store for Linux Systems SoylentNews

The Foss community is giving yet another try with an app store for all Linux OSes:

Some influential people in the open-source community are pushing for the adoption of a one-stop app store for Linux-based operating systems. The store would be built on Flatpak, a popular software deployment and package management utility, and it could provide customers with the same user-friendly approach other popular app stores in the consumer market are known for.

[...] The proposal's main goal is to "promote diversity and sustainability" in the Linux desktop community by "adding payments, donations and subscriptions" to the Flathub app store. Flathub is the standard app repository for Flatpak, a project described as a "vendor-neutral service" for Linux application development and deployment.

[...] The universal app store proponents say that "a healthy application ecosystem is essential for the success of the OSS desktop," so that end-users can "trust and control" their data and development platforms on the device they are using. Flathub has been jointly built by the GNOME foundation and KDE, and it isn't the only app store available in the Linux world.

Alternative solutions like Canonical's Snaps, however, are sitting under the control of a single corporation and aren't designed as a universal Linux app store from the get-go. Canonical has recently decided that neither Ubuntu, nor the other Ubuntu-based distros (Kubuntu, Lubuntu, etc.), will give their official support to Flatpak. Users can manually add the tool after installing the operating system, though.

Besides providing a universal app store for the entire Linux world, Flatpak supporters also want to "incentivize participation in the Linux application ecosystem," and remove financial barriers that prevent diverse participation. For this reason, the proponents are planning to add a new way to send donations and payments via Stripe within this year.


Original Submission

Read more of this story at SoylentNews.

17:00

Assembly Language 80s Minicomputer Style Hackaday

In the days before computers usually used off-the-shelf CPU chips, people who needed a CPU often used something called bitslice. The idea was to have a building block chip that needed some surrounding logic and could cascade with other identical building block chips to form a CPU of any bit width that could do whatever you wanted to do. It was still harder than using a CPU chip, but not as hard as rolling your own CPU from scratch. [Usagi Electric] has a Centurion, which is a 1980s-vintage minicomputer based on a bitslice processor. He wanted to use it to write assembly language programs targeting the same system (or an identical one). You can see the video below.

Truthfully, unless you have a Centurion yourself, the details of this are probably not interesting. But if you have wondered what it was like to code on an old machine like this, youll enjoy the video. Even so, the process isnt quite authentic since he uses a more modern editor written for the Centurion. Most editors from those days were more like CP/M ed or DOS edlin, which were painful, indeed.

The target program is a hard drive test, so part of it isnt just knowing assembly but understanding how to interface with the machine. That was pretty common, too. You didnt have a lot of help from canned routines in those days. For example, it was common to read an entire block from a hard drive, tape, or drum and have to figure out what part of it you were actually interested in instead of,...

16:30

Preventing corporate data breaches starts with remembering that leaks have real victims Help Net Security

When it comes to data breaches, organizations are generally informed about the risks and procedures for mitigating them. They can (typically) respond with minimal collateral damage. But the impact a data breach can have on individuals can be devasting; getting back to something that vaguely resembles normality is very challenging. In my work helping these people, Ive been asked multiple times whether it would help to get a new phone number or even move to More

The post Preventing corporate data breaches starts with remembering that leaks have real victims appeared first on Help Net Security.

16:00

Vulnerability in DJI drones may reveal pilots location Help Net Security

Serious security vulnerabilities have been identified in multiple DJI drones. These weaknesses had the potential to allow users to modify crucial drone identification details such as its serial number and even bypass security mechanisms that enable authorities to track both the drone and its pilot. In special attack scenarios, the drones could even be brought down remotely in flight. Photo by: RUB, Marquard The team headed by Nico Schiller of the Horst Grtz Institute for More

The post Vulnerability in DJI drones may reveal pilots location appeared first on Help Net Security.

15:30

China-aligned APT is exploring new technology stacks for malicious tools Help Net Security

ESET researchers have analyzed MQsTTang, a custom backdoor that they attribute to the China-aligned Mustang Panda APT group. This backdoor is part of an ongoing campaign that ESET can trace back to early January 2023. Execution graph showing the subprocesses and executed tasks Researchers have seen unknown entities in Bulgaria and Australia in their telemetry as targets. They also have information indicating that Mustang Panda is targeting a governmental institution in Taiwan. Due to the More

The post China-aligned APT is exploring new technology stacks for malicious tools appeared first on Help Net Security.

14:25

DART Mission Plaudits and Review SoylentNews

NASA: DART Mission Proves Kinetic Impact Can Save Earth From Incoming Asteroids

NASA's DART mission was a smashing success:

The Double Asteroid Redirection Test ended last year with the spacecraft colliding with an asteroid known as Dimorphos. NASA announced in the following weeks that DART had altered the asteroid's trajectory, and now we have four peer-reviewed papers that explore just how successful the mission was. The news is good NASA has confirmed that DART validates kinetic impact as a viable way to deflect dangerous asteroids.

[...] Scientists are working to reconstruct the impact to evaluate DART's autonomous targeting ability. The authors of this study concluded that a DART-like mission to redirect a dangerous asteroid could theoretically do so without an advanced reconnaissance flight. [...]

Another of the four studies confirmed via two different measurement techniques that Dimorphos' orbit shifted by 33 minutes. NASA had expected the impact to push the asteroid by at least seven minutes, but the recoil effect of ejecta blasted off the surface had a greater effect than predicted. [...]

A separate study looked at the momentum transfer from the impact. The researchers found that DART instantly altered Dimorphos' orbit, slowing it by 2.7 millimeters per second. [...] The final study discusses what we can learn from DART beyond the planetary defense angle. Dimorphos it's now an "active asteroid" surrounded by a cloud of dust. The authors say analysis of this comet-like tail could help us learn more about the natural processes at work on asteroids.

Luckily, there are no known asteroid threats for at least the next century, but our catalog of near-Earth objects is incomplete. We could discover an asteroid with a high chance of impact tomorrow. It's happened before, and it'll happen again. For decades, kinetic redirection was seen as a potential way to save Earth from those rare but inevitable events, but no one knew if it would work. Now we do humanity has the tools to prevent at least one kind of doomsday.

Read more of this story at SoylentNews.

14:00

The Eyes Have It: Stare Down Your Lighting Hackaday

You know how you can feel when someone is looking at you? Thanks to a person detector, [Michael Rigsbys] little robotic light switch also knows when you are looking at it. As you can see in the video below, when it notices you are looking at it, it lights up an LED. If you continue to gaze at it, it will turn to stare back at you. Keep staring it down and it will toggle the state of a remote control light switch.

This all works because of the person sensor module by Useful Sensors. The little module has a camera and face detection built into it. It doesnt draw much power at 150 milliwatts. It can sense faces, including where they are and how many people are looking.

Once you have that data via I2C it is easy to program an Arduino or whatever to do what you want. In this case, an Uno,  a servo motor, and some relays are all it takes. We might have made it interface with our smart home devices to turn on anything we want, but that would be an easy mod. The relays have the virtue of working with anything. For this project, he uses them to close switch contacts on a remote control.

You might think this is pointless, but look at all the Clappers that have been sold that do virtually the same thing in a much less elegant way. You can also use the sensor in reverse and make a robot or a clock that...

14:00

Palo Alto Networks enhances cybersecurity capabilities with AI-powered ITDR module Help Net Security

Palo Alto Networks released new Identity Threat Detection and Response (ITDR) module for Cortex XSIAM, enabling customers to ingest user identity and behavior data and deploy AI technology to detect identity-driven attacks within seconds. The module further strengthens XSIAMs ability to consolidate multiple security operations capabilities into a unified, AI-driven security operations center (SOC) platform. Identity-driven attacks, which target user credentials to access confidential data and systems, are one of the most common methods cyber More

The post Palo Alto Networks enhances cybersecurity capabilities with AI-powered ITDR module appeared first on Help Net Security.

11:39

Dish Network Finally Acknowledges Huge Hack After Days of Not Answering Questions SoylentNews

Dish Network Finally Acknowledges Huge Hack After Days Of Not Answering Questions:

Early this week reports began to emerge that Dish Network was suffering from a widespread outage that effectively prevented a large chunk of the company's employees from being able to work for more than four days. Initially, Dish tried to downplay the scope of the problem in press reports, only stating that they'd experienced an ambiguous "systems issue."

Five days in and it was finally revealed that the company had been hacked, subjected to a ransomware attack, and subscriber data had been compromised. But, of course, customers didn't find out from Dish, they only learned about it via leaked internal communications:

Dish has told employees that it's "investigating a cybersecurity incident" and that it's "aware that certain data was extracted" from its IT systems as a result of this incident, according to an internal email sent by CEO Erik Carlson and obtained by The Verge. This comes on the fifth day of an internal outage that's taken down some of the company's internal networks, customer support systems, and websites such as boostinfinite.com and dish.com.

Employees have been completely locked out of their systems, telling Bleeping Computer that they're seeing blank screen icons common during ransomware attacks. As of this writing, things are so bad at Dish that their primary website is a placeholder page, though at least they finally got around to confirming things in an ambiguous statement.

You might recall that Dish Network was part of a doomed Trump-era plan to justify the T-Mobile Sprint merger by encouraging Dish to build its own 5G network. That plan isn't going so well either, and similar to T-Mobile's comical inability to secure its network, you have to wonder how much merger logistics distracted the...

11:20

F5 and Visa join forces to enhance security throughout the customer experience Help Net Security

F5 and Visa join forces to enable merchants to securely reduce login friction for their customers. Customers expect seamless commerce experiences and transactions to be secure. Yet, in todays digital-first world, customers are under threat from bad actors looking to steal data and commit fraud. Now, through F5 and Visas collaboration, merchants can provide their customers a seamless, secure, and personalized shopping experience. F5s Distributed Cloud Authentication Intelligence leverages artificial intelligence and behavior analytics to More

The post F5 and Visa join forces to enhance security throughout the customer experience appeared first on Help Net Security.

11:00

Your Phone is a 200X Microscope Sort Of Hackaday

[A. Cemal Ekin] over on PetaPixel reviewed the Apexel 200X LED Microscope Lens. The relatively inexpensive accessory promises to transform your cell phone camera into a microscope. Of course, lenses that strap over your phones camera lens arent exactly a new idea, but this one looks a little more substantial than the usual piece of plastic in a spring-loaded clip. Does it work? You should read [Cemals] post for the details, but the answer as you might have expected is yes and no.

On the yes side, you can get some pretty neat photomicrographs from the adapter. On the negative side, your phone isnt made to accommodate microscope samples. It also isnt made to stay stable at 200X.

[Cemal] found the same sort of things weve found with other similar adapters. You need to zoom to fill the frame with the microscopes image. Otherwise, you get an odd round image with darkness all around it. The microscope works best on something flat and has a very shallow depth of field, so anything poking in our out will probably be out of focus.

The unit did, however, look substantial and had a built-in rechargeable battery and an LED light. None of the photomicrographs looked bad, but you have to remember that you cant really use it unless what you want a picture of is flat, and the camera can essentially lay flat on it.

...

11:00

HPR3807: PeePaw builds a computer Hacker Public Radio

intro who is peepaw? Me! why a retro computer? help a kid understand computers why z80? cheap, available, cheap the plan build from scratch build something like a tec1 https://en.wikipedia.org/wiki/TEC-1 a great guide is the 1981 book build your own z80 computer Build Your Own Z80 Computer Steve Ciarcia/ get started with nop tester http://www.z80.info/z80test0.htm want an expandable system keep the cost down work up to a system like the jupiter ace (which is like a zx-81 sinclair computer) https://en.wikipedia.org/wiki/Jupiter_Ace getting started, the nop test use an arduino mega board and some forth to spin up the most basic z80 system https://gitlab.com/8bitforce/retroshield-hw/-/tree/master/hardware give the z80 5 volts, a clock and the right data and it will happily start up and run through its address space doing nothing the nop tester, in software make a forth logic probe https://en.wikipedia.org/wiki/Logic_probe use a gate method of frequency counting https://ww1.microchip.com/downloads/en/Appnotes/doc8365.pdf create a few forth words to make a "logic probe" and test that probe https://pajacobs-ghub.github.io/flashforth/ff5-tutorial-guide.html#_counting_button_presses need an arduino mega running flashforth https://store.arduino.cc/products/arduino-mega-2560-rev3 https://flashforth.com/atmega.html datasheet https://store.arduino.cc/products/arduino-mega-2560-rev3 https://ww1.microchip.com/downloads/en/devicedoc/atmel-2549-8-bit-avr-microcontroller-atmega640-1280-1281-2560-2561_datasheet.pdf some jumper wires z80 solderless bread board the code walk through, start from the bottom up note: ( -- ) are stack effect comments, back slashes are plain comments constants variable @ ! mset mclr mtst set up external interrupt, int4, arduino board pin4 the source code declare some constants and variable as labels variable Compare variable Count $100 constant PINH these labels come from the atmega2560 datasheet $101 constant DDRH $102 constant PORTH $a0 constant TCCR4A $a1 constant TCCR4B $a8 constant OCR4A $2c constant PINE $2d constant DDRE $2e constant PORTE $6a constant EICRB $3d constant EIMSK : ext4.irq ( -- ) Count @ 1+ Count ! ;i the frequency counter : logicprobe-init ( -- ) 1249 Compare ! 100 hz %0000.1000 DDRH mset h3 output %0100.0000 TCCR4A c! toggle d6, ph3 on compare match 0000.1011 %TCCR4B c! set ctc mode, clk/64 Compare @ OCR4A ! set compare value %0 DDRE c! e input 0001.0000 PORTE mset pullup on e4 %0000.0010 %EIC

The Impact of World Politics on Software Ecosystems It Will Never Work in Theory

The best summary of this paper comes from the paper itself:

The purpose of this article is to point the software engineering research community to open questions regarding how researchers can investigate, address, and regulate such kinds of protestware. In light of the war in Ukraine, we present three motivating scenarios where world politics has had impact on software ecosystems, highlighting the side affects, and then present an agenda on how to dissect and respond to such behaviour during software engineering practices.

The three scenarios discussed are malignant protestware that destroys data or otherwise does harm, benign protestware that raises awareness without damaging anything, and developer sanctions such as refusing to do business with an aggressor such as Russia or suspending accounts belonging to its citizens. The authors don't reach any conclusions, but with so much critical infrastructure now depending on open source software, it's long past time we started asking ourselves what we are and aren't willing to do.

Flag of Ukraine

Raula Gaikovina Kula and Christoph Treude. In war and peace: the impact of world politics on software ecosystems. 2022. arXiv:2208.01393.

Reliance on third-party libraries is now commonplace in contemporary software engineering. Being open source in nature, these libraries should advocate for a world where the freedoms and opportunities of open source software can be enjoyed by all. Yet, there is a growing concern related to maintainers using their influence to make political stances (i.e., referred to as protestware). In this paper, we reflect on the impact of world politics on software ecosystems, especially in the context of the ongoing war in Ukraine. We show three cases where world politics has had an impact on a software ecosystem, and how these incidents may result in either benign or malignant consequences. We further point to specific opportunities for research, and conclude with a research agenda with ten research questions to guide future research directions.

10:15

Resecurity appoints Akash Rosen to lead digital forensics practice Help Net Security

Resecurity accelerates Digital Forensics & Incident Response Services portfolio with the newly appointed industry professional, Akash Rosen. Akash Rosen is a recognized digital forensics expert and investigator. He assisted international law enforcement on numerous cases related to online-banking theft, financial and healthcare fraud, money laundering, malicious code distribution, and network intrusions into enterprise and government networks. Mr. Rosen is an expert court witness and have testified on numerous digital forensics and cybercrime investigation matters. He More

The post Resecurity appoints Akash Rosen to lead digital forensics practice appeared first on Help Net Security.

10:10

NetSPI hires Vinay Anand as CPO and Jay Golonka as CFO Help Net Security

NetSPI announced two C-Suite leadership appointments, Chief Product Officer (CPO) Vinay Anand and Chief Financial Officer (CFO) Jay Golonka. They bring decades of experience supporting high-growth technology companies and will be instrumental in leading NetSPIs technology growth. These appointments signal pivotal transformation for NetSPI, as we continue to evolve our technology platforms to meet the offensive security needs of the modern enterprise, said Aaron Shilts, CEO at NetSPI. Vinay and Jay will play a key More

The post NetSPI hires Vinay Anand as CPO and Jay Golonka as CFO appeared first on Help Net Security.

10:08

Acer Data Breach? Hacker Claims to Sell 160GB Trove of Stolen Data HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

A hacker on a popular forum is claiming to have stolen Acer Inc.'s data in mid-February 2023.

This is a post from HackRead.com Read the original post: Acer Data Breach? Hacker Claims to Sell 160GB Trove of Stolen Data

09:57

Ransom House ransomware attack hit Hospital Clinic de Barcelona Security Affairs

Hospital Clinic de Barcelona, one of the main hospitals in the Spanish city, suffered a cyber attack that crippled its computer system.

On Sunday, a ransomware attack hit the Hospital Clinic de Barcelona, one of the main hospitals of the Catalan city. The attack crippled the centers computer system, 150 nonurgent operations and up to 3,000 patient checkups were canceled due to the cyber attack.

The hospital hospital is diverting new urgent cases to other hospitals in the city.

The hospitals press department said that all written work was being done on paper and that the hospital was diverting new urgent cases to other hospitals in the city. states the Associated Press.

A local cybersecurity agency revealed that the attack was launched by a ransomware group known as Ransom House.

The ransomware infected the computers at the facilitys laboratories, emergency room and pharmacy at three main centers and several external clinics.

At this time it is unclear when IT staff at the hospital will be able to recover the impacted systems.

We cant make any prediction as to when the system will be back up to normal, hospital director Antoni Castells told a news conference today.

The Catalonias Cybersecurity Agency is working with the hospital to restore the infrastructure.

At this time the ransomware gang behind the attack has yet to demand the payment of a ransom.

Regional government telecommunications secretary Segi Marcn said that no ransom would be paid by Spanish authorities.

The authorities are investigating into the security breach, the hospital did not explain if it has suffered a data breach.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs  hacking, ransomware)

The post...

08:56

ChatGPT Broke the EU Plan to Regulate AI SoylentNews

Europe's original plan to bring AI under control is no match for the technology's new, shiny chatbot application:

Artificial intelligence's newest sensation the gabby chatbot-on-steroids ChatGPT is sending European rulemakers back to the drawing board on how to regulate AI.

[...] The technology has already upended work done by the European Commission, European Parliament and EU Council on the bloc's draft artificial intelligence rulebook, the Artificial Intelligence Act. The regulation, proposed by the Commission in 2021, was designed to ban some AI applications like social scoring, manipulation and some instances of facial recognition. It would also designate some specific uses of AI as "high-risk," binding developers to stricter requirements of transparency, safety and human oversight.

[...] These AIs "are like engines. They are very powerful engines and algorithms that can do quite a number of things and which themselves are not yet allocated to a purpose," said Drago Tudorache, a Liberal Romanian lawmaker who, together with S&D Italian lawmaker Brando Benifei, is tasked with shepherding the AI Act through the European Parliament.

Already, the tech has prompted EU institutions to rewrite their draft plans. The EU Council, which represents national capitals, entrust the Commission with establishing cybersecurity, transparency and risk-management requirements for general-purpose AIs.

[...] Professionals in sectors like education, employment, banking and law enforcement have to be aware "of what it entails to use this kind of system for purposes that have a significant risk for the fundamental rights of individuals," Benifei said.


Original Submission

Read more of this story at SoylentNews.

08:00

MEMS Teardown and Macroscopic Models Hackaday

There is a bit of a paradox when it comes to miniaturization. When electronics replaced mechanical devices, it was often the case later, ICs, came around, things got smaller still. However, as things shrink to microscopic scales, transistors dont work well, and you often find full circle mechanical devices. [Breaking Taps] has an investigation of a MEMS chip. MEMS is short for Micro Electromechanical Systems, which operate in a decidedly mechanical way. You can see the video, which has some gorgeous electron microscopy, below. The best part, though, is the 3D-printed macroscale mechanisms that let you see how the pieces work.

Decapsulating the MPU-6050 was challenging. We usually mill a cavity on the top of an IC and use fuming nitric on a hot plate (under a fume hood) to remove the remaining epoxy. However, the construction of these chips has two pieces of silicon sandwiched together, so you need to fully expose the die to split them apart, so our usual method might not work so well. Splitting them open, though, damaged parts of the chip, so the video shows a composite of several devices.

The parts inside are microscopically small. It took a week to trace everything out and make the 3D-printed macroscale mechanisms that help explain how each piece works. Seeing a model of the accelerometer that is large enough to handle in your hands is very helpful in unders...

08:00

Intel Preparing Sapphire Rapids C0.2 Idle State Support For Better Energy Efficiency Phoronix

Posted today were a set of Linux kernel patches for enabling Sapphire Rapids C0.x idle states support, which can provide a nice bump to the energy efficiency of the latest-generation Xeon Scalable servers while also helping out with possible turbo boost benefits for the busy CPU cores to enhance overall system performance...

07:51

Warner Fights Unreleased Scooby-Doo And Krypto Too! Leaks TorrentFreak

scooby-doo-sMost people born in the 1960s or later will be familiar with Scooby-Doo, the most recognized Great Dane in the world.

For those more advanced in years, think Enid Blytons Famous Five; four young people continuously run into mysteries and then solve them with help from a talking dog.

Scooby-Doo fans have been gripped by the format for more than half a century but the twilight years may already be here.

Scooby on the Chopping Block

Last August, David Zaslav, President and CEO of Warner Bros. Discovery, said the company had done a reset and would no longer release expensive films direct to streaming platforms. One of the first casualties was the almost complete Batgirl movie that reportedly went into company accounts as a tax write-off.

Were not going to launch your movie until its ready. Were not going to launch a movie to make a quota. And were not going to put a movie out unless we believe in it, Zaslav said.

Batgirl was joined on the shelf by Scoob! Holiday Haunt, which cost $40 million and was almost finished. Scooby-Doo and the Haunted High Rise was also canned along with Scooby-Doo! and the Mystery Pups.

With reports suggesting that Scooby-Doo And Krypto Too! might meet the same fate, this weekend fans were thrown an unexpected but tasty Scooby snack.

Scooby-Doo And Krypto Too! Leaks Online

South Korean animation studio Digital eMation began work on Scooby-Doo And Krypto Too! in 2021 and stills from the film appeared online last year.

Then this weekend, amidst considerable uncertainty, the question of whether the film would ever see the light of day was answered when the entire show leaked online.

Screenshot of leaked copyscooby-ss

Nobody seems to know who leaked it, much less why, but Warner clearly doesnt...

07:26

Alert: Scammers Pose as ChatGPT in New Phishing Scam HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

This phishing scam exploits the popularity of the AI-based ChatGPT chatbot to steal funds and harvest the personal and financial details of users.

This is a post from HackRead.com Read the original post: Alert: Scammers Pose as ChatGPT in New Phishing Scam

07:00

FEX 2303 Released For Improving Linux x86_64 Gaming On ARM64 Phoronix

open-source software for enjoying x86 64-bit Linux software to run gracefully on 64-bit ARM (ARM64 / AArch64) including the likes of Linux games and Valve's Steam client with Steam Play (Proton)...

06:11

Defense Department Signs $65 Million Contract With Startup That Makes Jet Fuel From CO2 SoylentNews

Air Force has already successfully tested and approved the sustainable aviation fuel:

As more companies focus on lowering their own carbon emissions, one startup is looking to take CO2 out of the atmosphere and create sustainable aviation fuel. It already has a small-scale working process and says that if it and other manufacturers scale up production, it could "mitigate" at least 10 percent of carbon emissions.

A startup specializing in sustainable aviation fuel (SAF) signed a $65 million contract with the US Department of Defense to create jet fuel out of thin air. The contract will provide a startup called Air Company funds to advance research and development of a system that can extract CO2 from the air and convert it into fuel-grade alcohols and paraffin.

Air Company already has a process of converting CO2 to jet fuel and published a white paper on the procedure. The company claims to have eliminated a step in the nearly 100-year-old Fischer-Tropsch process. It involves creating, harvesting, and storing CO2 from industrial corn fermentation. It then uses water electrolysis to produce hydrogen gas (H2) and oxygen (O2).

The O2 is released into the atmosphere, and the H2 feeds into a reactor with the captured CO2 and a catalyst. The chemical reaction produces ethanol, methanol, water, and paraffin. Distillation separates these components for use in other products, including vodka, perfume, hand sanitizer, and SAF.

The company cannot yet produce at the scale needed to impact global CO2 levels. However, CEO Gregory Constantine says that if Air Company and others can build to scale and all fuel-dependant industries switch to SAF, it could mitigate over 10 percent of carbon emissions.

Read more of this story at SoylentNews.

06:00

What Does an Electron Look Like? Hackaday

In school, you probably learned that an atom was like a little solar system with the nucleus as the sun and electrons as the planets. The problem is, as [The Action Lab] points out, the math tells us that if this simplistic model was accurate, matter would be volatile. According to the video you can see below, the right way to think about it is as a standing wave.

What does that mean? The video shows a very interesting demonstrator that shows how that works. You can actually see the standing waves in a metal ring. This is an analog still not perfect for the workings of an atom. An input frequency causes the ring to vibrate, and at specific vibration frequencies, a standing wave develops in the ring.

What was most interesting to us is that this explanation shows why electrons only increase and decrease in steps. Turns out nothing is really orbiting the way we all learned in school. Not that this model is exactly correct either, but it is apparently closer to reality than the old-school model.

Electrons are one of those funny things that sometimes look like a wave and sometimes look like a particle. Not that we fully grok all the quantum weirdness. Maybe we half understand it, and half dont understand it.

...

05:39

Top members of DoppelPaymer Ransomware gang arrested HackRead | Latest Cybersecurity and Hacking News Site

By Deeba Ahmed

Authorities have arrested two suspected members of the DoppelPaymer ransomware gang in Germany and Ukraine, believed to be high-value members of the cybercrime syndicate.

This is a post from HackRead.com Read the original post: Top members of DoppelPaymer Ransomware gang arrested

05:01

3 fundamental tools to troubleshoot Linux performance problems Linux.com

In this article and video, youll learn how to collect information about your Linux systems performance.

Read More at Enable Sysadmin

The post 3 fundamental tools to troubleshoot Linux performance problems appeared first on Linux.com.

04:21

Detection Stays One Step Ahead of Deepfakesfor Now IEEE Spectrum



In March 2022, a video appeared online that seemed to show Ukraines president, Volodymyr Zelensky, asking his troops to lay down their arms in the face of Russias invasion. The videocreated with the help of artificial intelligencewas poor in quality and the ruse was quickly debunked, but as synthetic content becomes easier to produce and more convincing, a similar effort could someday have serious geopolitical consequences.

Thats in part why, as computer scientists devise better methods for algorithmically generating video, audio, images, and texttypically for more constructive uses such as enabling artists to manifest their visionstheyre also creating counter-algorithms to detect such synthetic content. Recent research shows progress in making detection more robust, sometimes by looking beyond subtle signatures of particular generation tools and instead utilizing underlying physical and biological signals that are hard for AI to imitate.

Its also entirely possible that AI-generated content and detection methods will become locked in a perpetual back-and-forth as both sides become more sophisticated. The main problem is how to handle new technology, Luisa Verdoliva, a computer scientist at the University of Naples Federico II, says of the novel generation methods that keep cropping up. In this respect, it never ends.

In November, Intel announced its Real-Time Deepfake Detector, a platform for analyzing videos. (The term deepfake derives from the use of deep learningan area of AI that uses many-layered artificial neural networksto create fake content.) Likely customers include social-media companies, broadcasters, and NGOs that can distribute detectors to the general public, says Ilke Demir, a researcher at Intel. One of Intels processors can analyze 72 video streams at once. Eventually the platform will apply several detection tools, but when it launches this spring it will use a detector that Demir cocreated (with Umur ifti, at Binghamton University) called FakeCatcher.

FakeCatcher studies color c...

04:00

Linux 6.3 Features: AMD Auto IBRS To Steam Deck Controller Interface, IPv4 BIG TCP & More Phoronix

Now that the Linux 6.3 merge window is over with Linux 6.3-rc1 having been released last night, here is a look at all of the interesting changes, new features, and hardware support coming with this next major kernel version.

03:35

[$] The rest of the 6.3 merge window LWN.net

Linus Torvalds released 6.3-rc1 and closed the 6.3 merge window as expected on March 5. By that time, 12,717 non-merge commits (and 848 merges) had found their way into the mainline kernel; nearly 7,000 of those commits came in after the first-half merge-window summary was written. The second half of the 6.3 merge window was thus a busy time, with quite a bit of new functionality landing in the mainline.

03:23

Yes, Everything in Physics is Completely Made Up That's the Whole Point SoylentNews

A physicist's task is to constantly create equations that keep up with our observations of physical phenomena:

Researching a cosmic mystery like dark matter has its downsides. On the one hand, it's exciting to be on the road to what might be a profound scientific discovery. On the other hand, it's hard to convince people it's worth studying something that's invisible, untouchable, and apparently made of something entirely unknown.

While the vast majority of physicists find the evidence for dark matter's existence convincing, some continue to examine alternatives, and the views in the press and the public are significantly more divided. The most common response I get when I talk about dark matter is: "isn't this just something physicists made up to make the math work out?"

The answer to that might surprise you: yes! In fact, everything in physics is made up to make the math work out.

[...] This level of abstraction is especially apparent in particle physics, because the existence or non-existence of a single particle on a subatomic scale is a rather fuzzy notion. The equations describing the motion of an electron through space don't actually include a particle at all, but rather an abstract mathematical object called a wavefunction that can spread out and interfere with itself.

Is it ever true, then, to say that an electron is 'real' when it's in motion? If we believe that electrons are real things, have we just made up the wavefunction to make the math work out? Absolutely that was, in fact, the whole point. We couldn't get the equations to work if the electron was a solid, isolated particle, so we made up something that wasn't, and then the numbers started making sense.

Read more of this story at SoylentNews.

03:01

European police dismantled the DoppelPaymer ransomware gang Security Affairs

German police announced to have dismantled an international cybercrime gang behind the DoppelPaymer ransomware operation.

Europol has announced that an international operation conducted by law enforcement in Germany and Ukraine, with help of the US FBI and the Dutch police, targeted two key figures of the DoppelPaymer ransomware group.

On 28 February 2023, the German Regional Police (Landeskriminalamt Nordrhein-Westfalen) and the Ukrainian National Police ( ), with support from Europol, the Dutch Police (Politie) and the United States Federal Bureau of Investigations, targeted suspected core members of the criminal group responsible for carrying out large-scale cyberattacks with the DoppelPaymer ransomware. reads the press release published by the Europol.

DoppelPaymer ransomware has been active since June 2019, in November 2020 Microsoft Security Response Center (MSRC) warned customers of the DoppelPaymer ransomware and provided useful information on the threat.

The DoppelPaymer ransomware is based on the BitPaymer ransomware and the Dridex malware family, operators often used the EMOTET malware to spread it.

DoppelPaymer was distributed through various channels, such as phishing and spam messages. The operators behind this ransomware family rely on a double extortion scheme, the gang launched a leak site in early 2020. According to German authorities, at least 37 companies were hit with the ransomware, the most prominent victim is the University Hospital in Dsseldorf. The Europol states that in the US, victims payed at least 40 million euros between May 2019 and March 2021.

The law enforcement raided multiple locations in the Germany and Ukraine.

During the simultaneous actions, German officers raided the house of a German national, who is believed to have played a major role in the DoppelPaymer ransomware group. Investigators are currently analysing the seized equipment to determine the suspects exact role in the structure of t...

02:59

Business-grade routers compromised in low-key attack campaign Help Net Security

An unknown threat actor has discreetly compromised business-grade DrayTek routers in Europe, Latin and North America, equipping them with a remote access trojan (dubbed HiatusRAT) and a packet capturing program. The impacted models are high-bandwidth routers that can support VPN connections for hundreds of remote workers and offer ideal capacity for the average, medium-sized business. We suspect the actor infects targets of interest for data collection, and targets of opportunity for the purpose of establishing More

The post Business-grade routers compromised in low-key attack campaign appeared first on Help Net Security.

02:58

Three Questions and Answers: Rust for Linux (Heise) LWN.net

Heise interviews Miguel Ojeda about the Rust-for-Linux project.

The first drivers (and the abstractions supporting them) that will start to be upstreamed are likely to be the Asahi Linux's GPU driver, Android's Binder and the NVMe driver. These are all non-trivial and will set the example for future Rust kernel abstractions and drivers.

02:53

DARTs Ejecta and Planetary Defense Centauri Dreams Imagining and Planning Interstellar Exploration

DARTs Ejecta and Planetary Defense

Im glad to see the widespread coverage of the DART mission results, both in terms of demonstrating to the public what is possible in terms of asteroid threat mitigation, and also of calming overblown fears that we have too little knowledge of where these objects are located. DART (Double Asteroid Redirection Test) was a surprisingly demonstrative success, shortening the orbit of the satellite asteroid Dimorphos by an unexpectedly large value of 33 minutes. The recoil effect from the ejection of asteroid material, perhaps as high as 0.5% of its total mass, accounts for the result.

Watching the ejecta evolve has been fascinating in its own right, as the interactions between the two elements of the binary asteroid come into play along with solar radiation pressure. Asteroids have previously been observed that displayed a sustained tail, as Dimorphos did after impact, and the DART results suggest that the hypothesis of similar impacts on these objects is correct. Thus we learn valuable lessons about how asteroids behave when impacted either by technologies or by natural objects. We can expect the study of active asteroids to get a boost from the success of this mission.

The two images below are from the Hubble instrument, which observed the development of Dimorphos tail. Jian-Yang Li (Planetary Science Institute) is lead author of a recent paper in Nature on the evolution of the ejecta. Li comments on the interplay between the gravity of Dimorphos and parent asteroid Didymos as well as the pressure of sunlight in the first two and a half weeks after the impact. Bear in mind that an impact on a single as opposed to a binary asteroid would not display such complex effects. The presence of Didymos was indeed useful:

A simple way to visualize the evolution of the ejecta is to imagine a cone-shaped ejecta curtain coming out from Dimorphos, which is orbiting Didymos. After about a day, the base of the cone is slowly distorted by the gravity of Didymos first, forming a curved or twisted funnel in two to three days. In the meantime, the pressure from sunlight constantly pushes the dust in the ejecta towards the opposite direction of the Sun, and slowly modifies and finally destroys the cone shape. This effect becomes apparent after about three days. Because small particles are pushed faster than large particles, the ejecta was stretched towards the anti-solar direction, forming streaks in the ejecta.

...

02:30

Debian APT 2.6 Released With Updates For Non-Free Firmware Handling Phoronix

Debian developers today released APT 2.6 as the newest version of this package manager that will ship as part of the upcoming Debian 12 "Bookworm" release...

02:28

Microsoft Is an Ethical Not Religious Problem Techrights

Authored by Dr. Andy Farnell

The government is not trying to destroy Microsoft, its simply seeking to compel Microsoft to obey the law. Its quite revealing that Mr. Gates equates the two.

Government official

A recent Reddit post caught my attention as a Christian, humanist and computer scientist. Allegedly, an employer claimed to be troubled by a worker citing Religious Reasons for their refusal to use Microsoft 1. I also refuse to use Microsoft products, but have never been inclined to so boldly claim it a matter of Religion.

I worry this may be a step too far, and may do some disservice to the very real struggle against corporate tyranny and erosion of digital rights. Indeed, there are many perfectly good reasons to reject the wares of Big Tech companies without invoking religion as a first line. Lets step back and consider why.

I see the framing of the Reddit story, of a modern-day Luddite throwing her religious spanner into the noble wheels of industry, as mischievous.Religions are complex. They include ethical values, but also practices, habits, associations, symbolisms, traditions, and
interpretations of texts. Most, though not all religions, espouse an ethical framework, but in secular modernity we bracket ethics aside. Whilst for people of faith religion and ethics are essentially synonymous, one may still have profound and unshakable ethics without subscribing to any organised religion.

It is not that religious tenets have no relevance to technology. I a troubled, through my personal religious beliefs, by our trajectory in the digital world. The greed, wrath, envy and sloth facilitated by a mindless cult of convenience and control is heartbreaking for me as a computer scientist. The bonfire of opportunity squandered in favour of technologies designed to track, manipulate, enslave and deceive feels like a tragedy of biblical magnitude. Inseparably, with respect to positive spiritual understanding, it is religion that preserves my technological optimism, and sense of hope for humane, ethical technology.

Yet I see the framing of the Reddit story, of a modern-day Luddite throwing her religious spanner into the noble wheels of industry, as mischievous. It rather nicely stokes a false dichotomy between religion and technology. Not only are many technologists religious, but our 21st century digital technology is driven as much by transcendent supernaturalism and organisational ideologies as by clear reason.

Indeed there are good arguments to be heard that technology is a...

01:24

01:18

New HiatusRAT Malware Targets Business-Grade Routers to Covertly Spy on Victims The Hacker News

A never-before-seen complex malware is targeting business-grade routers to covertly spy on victims in Latin America, Europe, and North America at least since July 2022. The elusive campaign, dubbed Hiatus by Lumen Black Lotus Labs, has been found to deploy two malicious binaries, a remote access trojan dubbed HiatusRAT and a variant of tcpdump that makes it possible to capture packet capture on

01:15

Security updates for Monday LWN.net

Security updates have been issued by Debian (apache2, libde265, libreswan, spip, syslog-ng, and xfig), Fedora (edk2, libtpms, python-django3, stb, sudo, vim, and xen), Red Hat (libjpeg-turbo and pesign), SUSE (kernel, python36, samba, and trivy), and Ubuntu (linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-gcp, linux-gke, linux-gkeop, linux-hwe-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux, linux-aws, linux-dell300x, linux-gcp-4.15, linux-oracle, linux-aws-hwe, linux-oracle, and linux-bluefield).

01:04

From Disinformation to Deep Fakes: How Threat Actors Manipulate Reality The Hacker News

Deep fakes are expected to become a more prominent attack vector. Here's how to identify them. What are Deep Fakes? A deep fake is the act of maliciously replacing real images and videos with fabricated ones to perform information manipulation. To create images, video and audio that are high quality enough to be used in deep fakes, AI and ML are required. Such use of AI, ML and image replacement

00:47

US government orders States to conduct cyber security audits of public water systems Security Affairs

The US government urges cyber security audits of public water systems, highlighting the importance to secure US critical infrastructure.

The Biden administration announced on Friday that it will make it mandatory for the states to conduct cyber security audits of public water systems.

Water systems are critical infrastructures that are increasingly exposed to the risk of cyberattacks by both cybercriminal organizations and nation-state actors, the US Environmental Protection Agency reported.

Cyberattacks against critical infrastructure facilities, including drinking water systems, are increasing, and public water systems are vulnerable, said EPA Assistant Administrator Radhika Fox, as reported by the Associated Press. Cyberattacks have the potential to contaminate drinking water.

EPA has already provided a guide to audit water systems and recommends using it, it also would provide technical support to the states in conducting future cyber security assessments by developing cybersecurity programs.

According to government officials, recent audits show that the lack of proper defense, mainly on the operational technology deployed in water systems. In many cases, they lack cybersecurity practices and rely on voluntary measures with poor progress.

EPA claims are also confirmed by private agencies like Fitch Ratings which published an alert in April 2021 to warn of the material risk to water and sewer utilities caused by cyber attacks that could also impact their ability to repay debt.

The agency evaluated the resilience of water and sewer utilities to unexpected events, including cyberattacks, which could pose financial and operating risks, and even the credit quality of the critical infrastructure.

An incident response could have a significant impact on the cash reserves. The expenses to mitigate a cyber-attack could impact the ability of the utilities of paying their debt.

A cyber attack could also cause the loss or corruption of customer data, impacting the ability to read meters or access billing systems. An incident could reduce customer confidence and could affect the ability to raise rates. The alerts also states that the administration of the utility could face unexpected financial losses due to regulatory action or lawsuits from constituents.

On June 2021, a report published by NBC News revealed that threat actors attempted to compromise an unnamed water treatment plant...

00:38

openSUSE Tumbleweed Sets Great Example With x86-64-v3 HWCAPS Phoronix

The rolling-release openSUSE Tumbleweed recently began rolling out optional x86-64-v3 optimized packages for those on roughly Intel Haswell or newer systems and wanting to squeeze out maximum performance from their hardware. The selection of x86-64-v3 packages built by openSUSE Tumbleweed is currently rather limited, but hopefully this major Linux distribution joining the HWCAPS party will lead other Linux distributions to follow suit...

00:36

Russian Nuclear Company Tests Beaver PCs With Homegrown Baikal CPUs SoylentNews

Russian Nuclear Company Tests 'Beaver' PCs With Homegrown Baikal CPUs:

A daughter company of Rosatom, a nuclear energy company owned by the Russian government, is testing PCs from Delta Computers called Beaver that are based on a processor designed by Russia's Baikal Microelectronics and a Linux distribution approved for use by state agencies. The company is trying to replace PCs designed by Western companies with something domestic, reports 3DNews. But they may have an obstacle in their way.

Delta Computers' Beaver is a small form-factor PC running Baikal Electronics's Baikal-M1 (BE-M1000) chip and the Astra Linux Special Edition operating system. The Beaver can have up to 64GB of DDR4 memory and up to 16TB of HDD and SSD storage. The machine has multiple USB Type-A 2.0/3.0 ports, PS/2 connectors, an RS-232 header, two Ethernet ports, an HDMI output, and two 3.5-mm audio connectors for headphones and microphones. The PC can be upgraded with low-profile PCIe 3.0 x8 add-in-boards, such as graphics cards. The system uses an LCD display, a corded keyboard, and a corded mouse.

"The concern has purchased the first batch of 'Beaver' domestic personal computers based on the Baikal processor and is getting ready to introduce them into the infrastructure of the Rosenergoatom energy generating company," a statement by Rosatom reads.

Delta's Beaver is nothing special if not for its Baikal-M1 SoC. The Baikal-M1 is a rather well-known processor that packs eight Arm Cortex-A57 cores with an 8MB L3 cache operating at 1.50 GHz and mated with an eight-cluster Arm Mali-T628 GPU with two display pipelines. The SoC, which uses technologies from 2014 2015, is made by TSMC using one of its 28nm-class process technologies. But such processors cannot be shipped to a Russian or a Belarussian entity from Taiwan due to restrictions imposed by the government.

While Rosatom might have procured samples of Beaver (Bober in Russian), Delta Computers can't get enough processors as the owner of Baikal Microelectronics went bankrupt in late 2022.


Original Submission

...

00:25

Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136) Open Source Security

Posted by Georgi Guninski on Mar 06

So besides the double free bug you managed to circumvent
the mitigation in both linux and openbsd, right?
Did you find weakness in the mitigation or did you find
fundamental way to exploit double free?

00:22

Life Need Not Ever End Lifeboat News: The Blog

At least, that was the assumption in the second half of the 19th century. This scenario became known as the heat death of the universe, and it seemed to be the nail in the coffin for any optimistic cosmology that promised, or even allowed, eternal life and consciousness. For example, one of the most popular cosmological models of the time was put forth by the evolutionary theorist Herbert Spencer, a contemporary of Charles Darwin who was actually more famous than him during their time. Spencer believed that the flow of energy through the universe was organizing it. He argued that biological evolution was just part of a larger process of cosmic evolution, and that life and human civilization were the current products of a process of continual cosmic complexification, which would ultimately lead to a state of maximal complexity, integration and balance among all things.

When the prominent Irish physicist John Tyndall told Spencer about the heat death hypothesis in a letter in 1858, Spencer wrote him back to say it left him staggered: Indeed, not seeing my way out of the conclusion, I remember being out of spirits for some days afterwards. I still feel unsettled about the matter.

Things got even gloomier when the Austrian physicist Ludwig Boltzmann put forward a new statistical interpretation of the second law in the latter half of the 19th century. That was when the idea that the universe is growing more disordered came into the that useful energy inevitably dissipates and tried to give it a statistical explanation on the level of molecules colliding and spreading out. He used one of the simplest models possible: a gas confined to a box.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Monday, 06 March

23:45

California National Guard Mobilized to Rescue People Trapped in Snow Nine Feet Deep cryptogon.com

Via: ZeroHedge: Its so much snow, theres nowhere to put it, Crestline, CA resident James Gordon told KABC. Ive been up on this mountain my whole life from Big Bear to here in Crestline, and this is the worst storm Ive seen in 30 some odd years Ive been up here.

23:36

Japans Population In Freefall As Twice As Many People Die As Are Born cryptogon.com

Via: ZeroHedge: Japans population is in freefall. In 2022, the number of births registered in Japan plummeted to another record low last year according to statistics released by the Ministry of Health the latest worrying statistic in a decades-long decline that the countrys authorities have failed to reverse despite their extensive efforts. The country []

23:32

Fauci Prompted Scientists To Fabricate Proximal Origins Paper Ruling Out Lab-Leak cryptogon.com

Via: ZeroHedge: Dr. Anthony Fauci who offshored banned gain-of-function research to make bat coronaviruses more transmissible to humans has been accused by Congressional investigators of having prompted the fabrication of a paper by a cadre of scientists aimed at disproving the Covid-19 lab-leak theory. On February 1, 2020, Fauci and his boss, NIH []

23:28

British Health Secretarys Plan to Frighten the Pants Off Everyone About Covid cryptogon.com

Via: Telegraph: Throughout the course of the pandemic, officials and ministers wrestled with how to ensure the public complied with ever-changing lockdown restrictions. One weapon in their arsenal was fear. We frighten the pants off everyone, Matt Hancock suggested during one WhatsApp message with his media adviser. The then health secretary was not alone in []

23:21

Intel Continues With More Big-Time Optimizations To The Linux Kernel Phoronix

I love Linux kernel patches that mention "massively", use exclamation points when talking about performance, and/or simply mention big speed-ups. Quite often such patches come out of Intel and last week they sent out another great performance optimization patch series to improve additional low-level bits of the kernel...

23:13

Core Members of DoppelPaymer Ransomware Gang Targeted in Germany and Ukraine The Hacker News

Law enforcement authorities from Germany and Ukraine have targeted suspected core members of a cybercrime group that has been behind large-scale attacks using DoppelPaymer ransomware. The operation, which took place on February 28, 2023, was carried out with support from the Dutch National Police (Politie) and the U.S. Federal Bureau of Investigation (FBI), according to Europol. This encompassed

23:05

Law enforcement teams score major win against DoppelPaymer ransomware gang Help Net Security

In a joint effort, the German Regional Police, Ukrainian National Police, Europol, Dutch Police, and FBI joined forces on February 28, 2023, to take down the masterminds behind a notorious criminal organization responsible for unleashing devastating cyberattacks using the DoppelPaymer ransomware. This ransomware appeared in 2019, when cybercriminals started using it to launch attacks against organizations, critical infrastructure, and industries. Based on the BitPaymer ransomware and part of the Dridex malware family, DoppelPaymer used a More

The post Law enforcement teams score major win against DoppelPaymer ransomware gang appeared first on Help Net Security.

23:00

Programming SPI Flash Chips? Use Your Pico! Hackaday

A Pi Pico plugged into a breadboard, with jumpre wires going away from its pins to an SPI flashing clip, that's in turn clipped onto an SPI flash chip on a BeagleBone board

At this point, a Pi Pico is equivalent to a bag full of programmers and debugging accessories. For instance, when you want to program an SPI flash chip, do you use one of those wonky CH341 dongles, or perhaps, even a full-on Raspberry Pi with a Linux OS? If so, it might be time to set those two aside any RP2040 board can do this now. This is thanks to work of [stacksmashing] who implemented serprog protocol for the RP2040, letting us use a Pi Pico with stock flashrom for all our SPI flash chip needs.

After flashing the code to your RP2040 board, all you need to do is to wire your flash chip to the right pins, and then use the serprog programmer type in your flashrom commandline instructions are available on GitHub along with the code, as youd expect. Dont feel like installing flashrom, or perhaps you happen to run Windows a...

22:53

Asahi AGX Mesa Driver Prepares For Compute Kernels On Apple Silicon Phoronix

The Asahi "AGX" Gallium3D driver providing open-source OpenGL driver support for Apple M1/M2 graphics hardware has seen preliminary work merged into Mesa 23.1 for supporting compute shaders/kernels...

22:51

Experts Reveal Google Cloud Platform's Blind Spot for Data Exfiltration Attacks The Hacker News

Malicious actors can take advantage of "insufficient" forensic visibility into Google Cloud Platform (GCP) to exfiltrate sensitive data, a new research has found. "Unfortunately, GCP does not provide the level of visibility in its storage logs that is needed to allow any effective forensic investigation, making organizations blind to potential data exfiltration attacks," cloud incident response

22:46

Study reveals companies are wasting millions on unused Kubernetes resources Graham Cluley

Graham Cluley Security News is sponsored this week by the folks at Sysdig. Thanks to the great team there for their support! This move to the cloud has made it easier to scale up applications when they need to grow. However, there is a corollary to this: Budgeting! Chances are, youre probably overspending. Estimating how Continue reading "Study reveals companies are wasting millions on unused Kubernetes resources"

22:40

AMD Continues Linux Upstreaming For Pensando Elba SoC Phoronix

Last year AMD acquired Pensando in part for adding DPUs to their portfolio from this young company that only exited its stealth mode in 2019. While sadly it's missed out on the Linux 6.3 cycle, AMD-Pensando engineers continue work on upstreaming support for their "Elba" SoC into the mainline Linux kernel...

22:26

Latest System76 Intel-Powered Laptops Added To Coreboot Phoronix

Merged on Saturday to upstream Coreboot was support for some of the latest Intel Alderlake (and signs of Raptor Lake) powered laptops from Linux vendor System76...

22:22

Transcatheter mitral valve repair in heart failure patients significantly reduces hospitalizations and improves survival Lifeboat News: The Blog

Transcatheter mitral valve repair for heart failure patients with mitral regurgitation can reduce the long-term rate of hospitalizations by almost 50 percent, and death by nearly 30 percent, compared with heart failure patients who dont undergo the minimally invasive procedure.

These are the breakthrough findings from a new study led by a researcher from the Icahn School of Medicine at Mount Sinai. This multi-center trial is the largest trial to examine the safety and effectiveness of transcatheter in a failure population using Abbotts MitraClip system. It shows this significantly improves outcomes for patients with heart failure that do not respond to .

The five-year results from the Cardiovascular Outcomes Assessment of the MitraClip Percutaneous Device study, or COAPT, were announced Sunday, March 5, in a Late Breaking Clinical Trial presentation at the American College of Cardiology Scientific Sessions Together with World Congress of Cardiology (ACC.23/WCC) in New Orleans, and published in The New England Journal of Medicine.

22:08

LibreELEC 11 Released With GBM/V4L2 HDR Support On x86_64, More ARM Hardware Phoronix

distribution that is purpose-built for an HTPC-oriented experience powered by the recent Kodi 20 HTPC/PVR software...

21:54

Distribution Release: LibreELEC 11.0.0 DistroWatch.com: News

develops a multi-platform Linux distribution centred around the Kodi....

21:51

Supercomputing Model Warns of Next American Dustbowl SoylentNews

Droughts, flash floods the future for the Midwest ... probably:

A climate model developed by researchers at the Department of Energy's Argonne National Labs, projects prolonged droughts across much of the US which will be followed by brief but devastating floods. But these events won't happen overnight.

Instead, they're forecast to place with increasing frequency over the next 50 years. But even by the middle of the century just a short 27 years from now simulations suggest that large portions of the Midwest will be in a state of persistent drought, and the American West isn't looking much better off, despite recent rainstorms that have raised hopes of more lush times ahead.

[...] However, extreme drought isn't the only thing Argonne researchers' models forecast. They also predict brief but intense periods of precipitation a characteristic of many drought prone areas leading to extensive flooding.

According to researchers, the American Midwest could bear the brunt of these extreme weather events as the climate continues to shift. While precipitation might sound like a reprieve from drought conditions, the researchers note that as the soil dries out, it becomes hydrophobic, causing it to repel water. They note that similar phenomena have been observed with wildfires in California.

Ultimately, scientists hope that improved models will give policymakers something to think about when approaching climate issues.


Original Submission

Read more of this story at SoylentNews.

21:31

Hatch Bank data breach caused by the exploitation of the GoAnywhere MFT zero-day Security Affairs

Fintech platform Hatch Bank disclosed a data breach, hackers exploited a recently discovered zero-day in Fortra GoAnywhere MFT secure file-sharing platform.

Hatch Bank is a fintech firm that provides services to other fintech companies. The company disclosed a data breach and revealed that the attackers have exploited a recently discovered zero-day vulnerability in the companys Fortra GoAnywhere MFT secure file-sharing system, reported Techcrunch.com.

A data breach notification filed by Hatch Bank with Maines attorney general revealed that threat actors exploited the flaw in its GoAnywhere system to access the names and Social Security numbers of 139,493 customers.

On February 3, 2023, Hatch Bank was notified by Fortra of the incident and learned that its files contained on Fortras GoAnywhere site were subject to unauthorized access. Fortras investigation determined that there was unauthorized access to the site account from January 30, 2023, to January 31, 2023. Hatch Bank immediately took steps to secure its files and then launched a diligent and comprehensive review of relevant files to determine the information that may have been impacted. Hatch Bank then worked to identify contact information for the impacted individuals. That process completed on February 7, 2023. reads the notice of data event. The information that could have been subject to unauthorized access includes name and Social Security number

In early February, the popular investigator Brian Krebs first revealed details about the zero-day, tracked as CVE-2023-0669, on Mastodon and pointed out that Fortra has yet to share a public advisory at the time.

Fortra immediately addressed the flaw with the release of an emergency security patch and urged customers to install it.

According to the private advisory published by Fortra, the zero-day is a remote code injection issue that impacts GoAnywhere MFT. The vulnerability can only be exploited by attackers with access to the administrative console of the application.

Installs with administrative consoles and management interfaces that are not exposed on the internet are safe, however, security researcher Kevin Be...

21:26

PoC exploit for recently patched Microsoft Word RCE is public (CVE-2023-21716) Help Net Security

A PoC exploit for CVE-2023-21716, a critical RCE vulnerability in Microsoft Word that can be exploited when the user previews a specially crafted RTF document, is now publicly available. Patches for the flaw which affects a wide variety of MS Office and SharePoint versions, Microsoft 365 Apps for Enterprise and other products have been released by Microsoft last month. CVE-2023-21716 and the PoC exploit CVE-2023-21716 was discovered and privately disclosed by security researcher More

The post PoC exploit for recently patched Microsoft Word RCE is public (CVE-2023-21716) appeared first on Help Net Security.

21:11

Copyright Holders Score Dynamic Pirate Site Blocking Order in Argentina TorrentFreak

argentinaOver the years, copyright holders have tried a multitude of measures to curb online piracy, with varying levels of success.

Site blocking has emerged as one of the preferred solutions. While blocking measures are not perfect, they can pose a large enough hurdle for casual pirates to choose legal options instead.

Argentinian Blocklist Expanded

Blocking measures have spread around the world in recent years and have now arrived in Argentina. After filing a complaint last year, local anti-piracy group Alianza is now celebrating a big win after local ISPs were instructed to block 30 pirate streaming sites.

The order was handed down by the National Court of First Instance in Federal Civil and Commercial Matters in Buenos Aires. The case was filed by the local offices of DirecTV and Spanish football league La Liga, among others, who received support from Alianza.

National telecommunications body ENACOM instructed local Internet providers to block the 30 domain names. These include TV streaming services such as televisionlibre.net and cablegratis.online, plus sports streaming sites such as futbollibre.net and pirlotv.uk.

Several of the targeted pirate streaming portals have (or had) millions of monthly visitors.

blocked

Alianza informs TorrentFreak that the order sets a dynamic blocking precedent in Argentina. This means that ISPs can also be required to block mirror sites and new domains these streaming portals may switch to in future.

Much-Needed Dynamic Blocking Order

Alianza executive director Vctor Roldn notes that dynamic blocking orders are more effective than simply seizing or blocking single domain names.

According to our research, many of these sites continue to operate through mirrors. That is the reason why we prefer to obtain judicial and administrative measures that can be extended to other websites and URLs, instead of the methods that other associations use, Roldn says.

The ability to update the blocklist is a much-needed feature since many of...

20:22

New results from NASAs DART planetary defense mission confirm we could deflect deadly asteroids Lifeboat News: The Blog

What would we do if we spotted a hazardous asteroid on a collision course with Earth? Could we deflect it safely to prevent the impact?

Last year, NASAs Double Asteroid Redirection Test (DART) mission tried to find out whether a kinetic impactor could do the job: smashing a 600kg spacecraft the size of a fridge into an asteroid the size of an Aussie Rules football field.

Early results from this first real-world test of our potential planetary defense systems looked promising. However, its only now that the first scientific results are being published: five papers in Nature have recreated the impact, and analyzed how it changed the asteroids momentum and orbit, while two studies investigate the debris knocked off by the impact.

20:00

Adversarial IR Hoodie Lets You Own the Night in Anonymity Hackaday

If youre in the market for something to obfuscate your nefarious nocturnal activities, rejoice this adversarial infrared hoodie may be just what youre looking for.

Not that we condone illegal activities, of course, and neither does artist [Mac Pierce], who created The Camera-Shy Hoodie. His purpose seems to be exploring the nature of the surveillance state, or rather to perplex it in the name of anonymity. The idea is simple equip a standard hoodie with a ring of super-bright IR LEDs, and control them with an RP2040.

Weve seen blinding hoodies before, but here the LEDs strobe on and off in one of three different patterns, all of which are timed to confound the autoexposure mechanism in just about any surveillance camera by not giving it time to adjust to the rapidly and drastically changing light level. The result is near-total obfuscation of the wearers facial features, at least when the camera is in night-vision mode. Check out the results in the video below.

There are some nice touches to [Mac]s approach, like aluminum PCBs for the LEDs and the use of soldered-on fabric snaps to attach them to the...

19:30

Experts Discover Flaw in U.S. Govt's Chosen Quantum-Resistant Encryption Algorithm The Hacker News

A group of researchers has revealed what it says is a vulnerability in a specific implementation of CRYSTALS-Kyber, one of the encryption algorithms chosen by the U.S. government as quantum-resistant last year. The exploit relates to "side-channel attacks on up to the fifth-order masked implementations of CRYSTALS-Kyber in ARM Cortex-M4 CPU," Elena Dubrova, Kalle Ngo, and Joel Grtner of KTH

19:28

New LPPFusion Paper: Our Peers Confirm We Lead in Results Terra Forming Terra



We have been tracking this initiative for several years now.  It is a constant reminder of just how difficult real progress is unti it finally gets locked down.

What is important is that it is naturally compact and scalable upwards while likely becoming easier.  We will likely be solving the same problems as well as it gets larger, rather than new novel ones.

The big systems will have to go the other way.  Good luck there.

The big hurdle will be bringing on the deuterium Boron cycle.  We need to see if that is really feasible.  With that we have our fuel and starship power plant.


Report March 2, 2023


Summary: New LPPFusion Paper: Our Peers Confirm We Lead in Results
Board of Advisors Extends Share Offering
Theory-Breaking Galaxies Bury Big Bang
Control Test Completed, Switch Assembly Underway
Alvin Samuels (1934-2022)


New LPPFusion Paper: Our Peers Confirm We Lead in Results

https://mailchi.mp/lppfusion/report-march-2-8752769?e=3eee1c4ccd

In a newly-accepted paper for the Journal of Fusion Energy, LPPFusion demonstrated in detail our lead in scientific results among all private fusion effortsand our peers and competitors agree! The new paper, Focus Fusion: Overview of Progress Towards p-B11 Fusion with the Dense Plasma Focus, was accepted on Feb. 18 for a special issue of the Journal of Fusion Energy devoted to private fusion projects. Importantly each paper, including our own, was reviewed by scientists from competing private fusion efforts, ensuring a credible review process. Well circulate a link to all as soon as it is published.

Our new paper documents that among privately-funded fusion efforts, our experiments have achieved the highest ratio of fusion energy generation to device energy input (wall-plug efficiency) and the highest ntT product The ntT product - density multiplied by confinement time,...

19:03

Why North Dakota Could Sue Minnesota Over Clean Energy SoylentNews

Interstate feuds threaten to complicate the already-difficult task of getting regional power grids off fossil fuels:

In early February, lawmakers in Minnesota passed a law requiring the state's power utilities to supply customers with 100 percent clean electricity by 2040 one of the more ambitious clean energy standards in the United States. Democrats, who clinched control of the state legislature in last year's midterm elections, were euphoric. But not everyone in the region is enthused about Minnesota's clean energy future. The state may soon face a legal challenge from its next-door neighbor, North Dakota.

Not long after Minnesota's governor signed the law, the North Dakota Industrial Commission, the three-member body that oversees North Dakota's utilities, agreed unanimously to consider a lawsuit challenging the new legislation. The law, North Dakota regulators said, infringes on North Dakota's rights under the Dormant Commerce Clause in the United States Constitution by stipulating what types of energy it can contribute to Minnesota's energy market.

"This isn't about the environment. This is about state sovereignty," North Dakota Governor Doug Burgum, the chair of the Industrial Commission, said. Minnesota Governor Tim Walz, a longtime proponent of clean energy legislation, was quick to respond. "I trust that this bill is solid," he told reporters. "I trust that it will stand up because it was written to do exactly that."

[...] It's no mystery why North Dakota was so quick to go on the offensive. Most of the state's power comes from coal, and it sells some 50 percent of the electricity it generates to nearby states. Its biggest customer is Minnesota. [...]

"Minnesota is under no legal duty to prop up North Dakota power plants," Michael Gerrard, founder of Columbia University's Sabin Center for Climate Change Law, told Grist. The state would find itself in legal trouble if it discriminated between in-state and out-of-state power plants, he said. [...]


Original Submission

Read more of this story at SoylentNews.

19:00

The Return of the Bison Terra Forming Terra

 


A new post on Bison recovery.  We are slowly getting it right.  Here we learn that hte cow calf component must be kept separate from tge bulls.  This suggests that rotational grazing will work well.  That aso infers that we can double the stocking rate.

The big picture is full restoration of the great plains with managed herds including other animals including beef. It would be nice to also fold in other native game animals as well but we likely cannot work them.  Yet we may be surprised if we focus on cow calf pairs and letb them follow the feed.

I also see a huge future in Eurasia where early hunting drove them to extinction.  All of Eastern Europe to the Urals and beyond is prime.


The Return of the Bison

In the Great Plains, scientists and small farmers bring back a mythic beast and a lost ecosystem.




The priest sat ready to receive the sacrament, and the chief, with a long wooden spoon, fed it to him. It was not the Eucharist, but bison meat. Father Jacques Marquettes long Jesuit cloak was gathere...

Theory-Breaking Galaxies Bury the Big Bang Hypothesis Terra Forming Terra




Cloud Cosmology infers that every galaxy can be best thought of as a separate creation with its own TIME independent of each other.  We do not know if there even exists a TIME for the universe of Galaxies at this point.

He is quite right though, the Big Bang is untenable now.  Considering what it originally drew from ,this is not surprising ,but really, until I came up with the SPACE TIME pendulum and Cloud Cosmology, we had nothing except those doubts.

It is good to know that our undertstanding of TIME is now local TIME for this galaxy.  I wonder just what effect this has on incoming photons from other gsalaxies?  This is likely a difficult problem and i am no longer in a rush to jump through a wormhole into another galaxy.




Theory-Breaking Galaxies Bury the Big Bang Hypothesis

https://mailchi.mp/lppfusion/report-march-2-8752769?e=3eee1c4ccd

Once again, images from the James Webb Space Telescope(JWST) have caused alarm and consternation among cosmologists. We found something so unexpected it actually creates problems for science, exclaimed Dr. Joel Leja, assistant professor of astrophysics at Penn State, one of the authors of the new paper in Nature causing the latest cosmic kerfuffle. Weve been informally calling these objects universe breakers, he continued in a statement released Feb. 22 by the Penn State university.

LPPFusions Chief Scientist Eric J. Lerner, who, with colleagues, has been putting forward a different take on JWSTs results, commented in a statement, Actually,...

How to Turn a BAD Fruit Tree into an AWESOME One! Terra Forming Terra



What we need to do is go back to full growth fruit trees for our orchards.  This allows us to grow a long lived healthy stem that can be taken to a comfortable sawn board lenth when we want to remove the full tree.

This also allows a healthy base for multiple branhes right there and even selectrive coppicing.  And of course grafting selective fruit bearing stems supporting large productive boughs.

We are entering the age of robotic harvesting and growing on miniture root stalks will be counter productive.  As well, a robust stem also allows machine shaking .



How to Turn a BAD Fruit Tree into an AWESOME One!

https://www.youtube.com/watch?v=4AI4Mv76h2Y

 <iframe width="683" height="384" src="https://www.youtube.com/embed/4AI4Mv76h2Y" title="How to Turn a BAD Fruit Tree into an AWESOME One!" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>

18:45

Distribution Release: Rescuezilla 2.4.2 DistroWatch.com: News

Shasheen Ediriweera has announced the release of Rescuezilla system recovery" based on Ubuntu. The new release adds a variant based on Ubuntu 22.10 (besides the ones derived from Ubuntu's most recent long-term supported releases). From the changelog:....

18:26

Get Quote Lifeboat News: The Blog

Get a real time quote from over 300 cutting edge providers worldwide while maintaining contact with FreedomFire Communications only. Our suppliers offer best-in-class business ethernet/fiber networks, network security solutions and cybersecurity educational programs, digital transformation tools and resources, IoT network ecosystems (sensor technology, network connectivity, data analytics), and more at the most competitive price available with industry leading customer service and support.

18:25

Singularity Timeline | Is Super Artificial Intelligence The END of Humanity? Lifeboat News: The Blog

Artificial Intelligence AI

Become an AI & Robots fan & get access to perks: https://www.youtube.com/channel/UCi-vwe-lm_tgxEdlxf690Aw.

Did you think that technology getting too advanced and wiping away humanity was something that happened only in movies? You might be shocked by what you find today.

Robots will reach human intelligence by 2029 and life as we know it will end in 2045.

This isnt the prediction of a conspiracy theorist, a blind dead woman or an octopus but of Googles chief of engineering, Ray Kurzweil.

Kurzweil has said that the work happening now will change the nature of humanity itself.

17:19

Colour-Blind, a fully featured info stealer and RAT in PyPI Security Affairs

Experts discovered a fully featured information stealer, tracked as Colour-Blind in the Python Package Index (PyPI).

Researchers from Krolls Cyber Threat Intelligence team discovered a malicious Python package uploaded to the Python Package Index (PyPI) that contained a fully-featured information stealer and remote access trojan tracked as Colour-Blind.

Below is the list of capabilities supported by the RAT through the control interface includes:

  • Tokens: Dumps to the screen login tokens for several application that use chromium via electron.io or chromium directly as an application framework, a notable example being Discord.
  • Passwords: Dumps passwords extracted from web browsers to screen
  • Cookies: Dumps all browser cookies to screen
  • Keys: Dumps to key loggers captured data to screen
  • Applications: Provides a list of running applications and a button to terminate them
  • Data Dump: Sends all captured data to the C2 URL
  • Screen: Shows screenshot of the user desktop and allows for rudimentary interaction such as key presses
  • IP: Looks up IP information and displays it to screen (using a different function to earlier)
  • Open Browser: Opens a browser to a given webpage
  • Run: Runs a command via operating system
  • Text Input: Sends keystroke to the machine
  • Phantom/Metamask: Steals cryptocurrency wallet information

The malicious package is named colourfool. The experts pointed out that the Colour-Blind malware points to the democratization of cybercrime allowing threat actors to develop their own variants based on the shared source code.

The package contained a single Python file of note, which is a large setup.py that was modified four days before its discovery. The script was developed to download a file from a remote server, then silently execute it. 

The experts noticed something suspicious in the function that provided the URL for downloading the malware.

It attempted to get a URL from a pastebin[.]com snippet and failing this retur...

17:00

6 cybersecurity and privacy Firefox add-ons you need to know about Help Net Security

In todays digital age, cybersecurity and privacy have become major concerns for internet users. With the increase in cyber attacks and data breaches, it is vital to protect your online privacy and security. One way to do this is by using add-ons for your web browser that can help enhance your security and privacy. Firefox is one of the most popular web browsers, and it offers a variety of add-ons that can help you stay More

The post 6 cybersecurity and privacy Firefox add-ons you need to know about appeared first on Help Net Security.

17:00

A Medium Format Camera From Scratch Hackaday

Film photography may now be something so outdated as to be unknown to our younger readers, but as an analogue medium it has enjoyed a steady enthusiast revival. There is still a bonanza of second-hand cameras from the days when it was king to be found, but for some photographers its preferable to experiment with their own designs. Among them is Reddit user [elelcoolbeenz], who has produced their own medium format camera for 120 roll film.

The camera has a plastic 3D printed body and a single meniscus lens, and perhaps most interestingly, a 3D printed shutter too. Its heavily reminiscent of the Holga and Lomo plastic cameras that have carved a niche for themselves, and it gives the same photographic effects from its dubious quality optics.

Theres a snag of course, that the STLs are not yet available We say not yet, because this comes with a detailed explanation in that further work is required on the shutter and a more commonly available lens is found rather than a one-off. We still think its worthy of featuring at this stage though, because it serves to illustrate that building a camera is not impossible. We&#...

16:30

How to achieve and shore up cyber resilience in a recession Help Net Security

Todays business leaders are grappling with two opposing challenges. On the one hand, present day global economic and recessionary pressures mean spending policies need to be reviewed and cash reserves built up. On the other hand, the volume and increasing sophistication of cybersecurity threats means the enterprise needs to maintain and bolster defenses to avoid being compromised. This presents CIOs with a major conundrum. With cost now a universal business concern, the pressure is on More

The post How to achieve and shore up cyber resilience in a recession appeared first on Help Net Security.

16:24

Review highlights the effectiveness of diet-based low-density lipoprotein lowering over medication Lifeboat News: The Blog

In a recent article published in the journal Nutrition, researchers in Australia summarized how diet could help decrease low-density lipoprotein cholesterol (LDLc) or triglyceride concentrations in polygenic hypercholesterolemia.

Study: A Review of Low-Density Lipoprotein-Lowering Diets in the Age of Anti-Sense Technology. Image Credit: Ralwell / Shutterstock.

Elevated LDLc or dyslipidemia, including high levels of total cholesterol, increases the risk of cardiometabolic disorders and cardiovascular diseases (CVDs), especially ischemic heart disease (IHD), if not managed in time. Pharmacological treatment is sometimes a prerequisite for cases with complex dyslipidemia with a genetic component. Subsequently, pharmacological research yielded several highly effective drugs based on monoclonal antibody (mAb) therapy, some of which researchers even reviewed in this paper.

16:23

Swarmalators better envision synchronized microbots Lifeboat News: The Blog

Imagine a world with precision medicine, where a swarm of microrobots delivers a payload of medicine directly to ailing cells. Or one where aerial or marine drones can collectively survey an area while exchanging minimal information about their location.

One early step towards realizing such technologies is being able to simultaneously simulate swarming behaviors and synchronized timingbehaviors found in slime molds, sperm and fireflies, for example.

In 2014, Cornell researchers first introduced a simple model of swarmalatorsshort for swarming oscillatorwhere particles self-organize to synchronize in both time and space. In the study, Diverse Behaviors in Non-uniform Chiral and Non-chiral Swarmalators, which published Feb. 20 in the journal Nature Communications, they expanded this model to make it more useful for engineering microrobots; to better understand existing, observed biological behaviors; and for theoreticians to experiment in this field.

16:23

9 Best Cyberpunk Novels You Should Read Lifeboat News: The Blog

FallenKingdomReads 10 Best Cyberpunk Novels You Should Read

The cyberpunk genre has been a popular subgenre of science fiction since the 1980s. Defined by its focus on high tech and low life, cyberpunk has become known for its gritty and often dystopian worlds, where technology has merged with humanity in unexpected and often unsettling ways.

With so many cyberpunk novels to choose from, it can be difficult to know where to start. In this article, well take a look at the 9 best cyberpunk novels you should read, whether youre new to the genre or a seasoned fan looking for your next read.

16:22

Time travel paradoxes and multiple histories Lifeboat News: The Blog

Dropbox is a free service that lets you bring your photos, docs, and videos anywhere and share them easily. Never email yourself a file again!

16:16

Expectant Lemur Dads See Hormonal Changes in Response to Pregnant Mates, Poop Shows SoylentNews

The increase in estradiol may help prepare the lemurs for fatherhood:

Red-bellied lemurs are one of only a handful of mammal species in which the males are active participants in caring for their young. New University of Arizona-led research suggests that expectant lemur dads may experience hormonal changes during their mates' pregnancies that help prepare them for parenting.

Red-bellied lemurs are monogamous, tree-dwelling primates found throughout Madagascar's eastern rainforests. They live together in close family units, with offspring going off on their own at about 3 to 4 years old.

When a female is pregnant, researchers have found, her male partner sees a significant increase in estradiol an estrogen steroid hormone and major female sex hormone that, in several mammalian species, is associated with increased maternal sensitivity and responsiveness.

[...] "Males, when they're expecting, even when they're not carrying the infant, are responding to the developing fetus," said Tecot, who is also a member of the university's BIO5 Institute. "I was shocked by how much of a change there is in estradiol when their partner is pregnant."

Tecot and her colleagues suspect that the hormonal shift is part of nature's way of preparing male lemurs for fatherhood.

[...] Previous research has shown that expectant human, tamarin monkey and certain rodent fathers also undergo hormonal changes that appear to occur in response to their partners' pregnancies. During the last trimester and shortly after the birth of an infant, cortisol, oxytocin, prolactin and androgen levels have been found to change significantly in these species. However, estradiol has not been studied extensively in males, Tecot said.

"We put a lot of pressure on pregnant individuals as the influencers of infant outcomes instead of thinking about the environment, including everyone who interacts with them," she said. "If male lemurs are interacting with the pregnant female and their hormones are responding, that suggests this is a group effort. Something is happening to both parents as they're all preparing for the baby to arrive."

Journal Reference: https://doi.org/10.1016/j.yhbeh.2023.105324


Original Submission

Read more of this story at SoylentNews.

16:00

XIoT risk and the vulnerability landscape Help Net Security

Recently, Claroty released its State of XIoT Security Report, which shares analyses of publicly disclosed vulnerabilities affecting operational technology (OT), internet of things (IoT) devices, and most recently, the internet of medical things (IoMT). In this Help Net Security video, Nadav Erez, VP of Data at Claroty, discuss these findings and the critical need to understand the XIoT risk and vulnerability landscape. Some of the dominant trends include: 73% of vulnerabilities uncovered are critical or More

The post XIoT risk and the vulnerability landscape appeared first on Help Net Security.

15:46

Eye4Fraud - 16,000,591 breached accounts Have I Been Pwned latest breaches

In February 2023, data alleged to have been taken from the fraud protection service Eye4Fraud was listed for sale on a popular hacking forum. Spanning tens of millions of rows with 16M unique email addresses, the data was spread across 147 tables totalling 65GB and included both direct users of the service and what appears to be individuals who'd placed orders on other services that implemented Eye4Fraud to protect their sales. The data included names and bcrypt password hashes for users, and names, phone numbers, physical addresses and partial credit card data (card type and last 4 digits) for orders placed using the service. Eye4Fraud did not respond to multiple attempts to report the incident.

15:30

Popular fintech apps expose valuable, exploitable secrets Help Net Security

92% of the most popular banking and financial services apps contain easy-to-extract secrets and vulnerabilities that can let attackers steal consumer data and finances, according to Approov. The Approov Mobile Threat Lab downloaded, decoded and scanned the top 200 financial services apps in the U.S., U.K., France and Germany from the Google Play Store, investigating a total of 650 unique apps. 92% of the apps leaked valuable, exploitable secrets and 23% of the apps leaked More

The post Popular fintech apps expose valuable, exploitable secrets appeared first on Help Net Security.

14:41

Kernel prepatch 6.3-rc1 LWN.net

The 6.3-rc1 kernel prepatch is out, and the merge window is closed for this development cycle.

And of course, smooth or not, now that the merge window is closed, we need to make sure it all *works*. We had a couple of exciting merges already, and I think the fallout from that got sorted out, but I'm sure there's more to come. Let's hope the calming-down period of 6.3 works as well as the merge window did... Knock wood.

14:36

ChatGPT How to Use it With Python Lifeboat News: The Blog

Note: ChatGPT is coming to openai API soon, you can sign up in their waiting list. Here is a link for openAIs ChatGPT API waitlist: https://share.hsforms.com/1u4goaXwDRKC9-x9IvKno0A4sk30

You might have already heard about ChatGPT, in case you havent, ChatGPT is a chatbot language model developed by OpenAI. It is a variant of the GPT-3 language model, specifically designed for conversational language generation.

The following definition is generate by ChatGPT (you can try it out at https://chat.openai.com/chat):

14:00

OneTrust Certification Automation helps businesses transcend traditional compliance barriers Help Net Security

OneTrust introduces OneTrust Certification Automation to the OneTrust ecosystem to help organizations navigate the complex and evolving regulatory landscape. OneTrust Certification Automation brings together automation, pre-built policies, and controls for 29 industry frameworks, over 100 integrations, and tailored guidance from OneTrust expert auditors. Many infosecurity teams are in a state of compliance fatigue, managing manual and repetitive compliance activities when theyre already stretched thin. Yet, we found up to 60 percent of the work done More

The post OneTrust Certification Automation helps businesses transcend traditional compliance barriers appeared first on Help Net Security.

14:00

Review of the YARD Stick One Radio Dongle Hackaday

When it comes to SDR, you can usually find cheap products that receive and expensive products that can also transmit. The YARD Stick One bucks that trend. It can send and receive from 300 MHz to 928 MHz, thanks to the onboard TI CC1111 chip. [Wim Ton] on Elektor put the device through its paces. While the frequency range isnt as broad as some devices, the price is right at about $99. YARD, by the way, stands for Yet Another RF Dongle.

The frequency range isnt as cut and dry as it might seem. According to the products home page: official operating frequencies: 300 MHz 348 MHz, 391 MHz 464 MHz, and 782 MHz 928 MHz; unofficial operating frequencies: 281 MHz 361 MHz, 378 MHz 481 MHz, and 749 MHz 962 MHz. The unofficial operating frequencies are not supported by the chip but appear to work in practice.

The device is made for data applications, and the support software is a Python-based interface that abstracts most of what you want to do. You can directly access the device registers if you need more control.

The YARD stick isnt great as a generic receiver, but as the review points out, you can use it as a transmitter and then grab a cheaper dongle to use as a receiver if you need more capability. The total system cost will still be less than other solutions.

Ultimately, though, [Wim] was...

13:32

Fix Your Mutt SoylentNews

The Linux mailing list had an admonition for Mutt users to fix their Mutt configuration. A recent change to that otherwise popular e-mail client has broken the way Message-ID headers are formed in Mutt. The developers have proven unwilling so far to fix it, therefore the onus falls upon Mutt's regular users to make local reconfigurations to avoid breaking the mailing lists and archives they might be participating in.

At some point in the recent past, mutt changed the way it generates Message-ID header values. Instead of the perfectly good old way of doing it, the developers switched to using base64-encoded random bytes. The base64 dictionary contains the / character, which causes unnecessary difficulties when linking to these messages on lore.kernel.org, since the / character needs to be escaped as %2F for everything to work properly.

Those receiving Mutt-generated messages will thank you for it, even if silently.

Previously:
(2018) (Neo)mutt F***ery with Multipart Messages


Original Submission

Read more of this story at SoylentNews.

13:31

iD Tech - 415,121 breached accounts Have I Been Pwned latest breaches

In February 2023, the tech camps for kids service iD Tech had almost 1M records posted to a popular hacking forum. The data included 415k unique email addresses, names, dates of birth and plain text passwords which appear to have been breached in the previous month. iD Tech did not respond to multiple attempts to report the incident.

13:30

Understanding Academic Software Solutions HackRead | Latest Cybersecurity and Hacking News Site

By Owais Sultan

Academic software allows educators to manage to learn and evaluate progress. Most educational institutions are already on their

This is a post from HackRead.com Read the original post: Understanding Academic Software Solutions

12:27

DistroWatch Weekly, Issue 1009 DistroWatch.com: News

This week in DistroWatch Weekly: Review: Nemo Mobile and the PinePhoneNews: Linux Mint adds new performance boosts and security measures, Debian and Ubuntu custom builds provided through Cubic, FreeBSD core utilities ported to LinuxQuestions and answers: Matching the performance of one Linux distribution from anotherReleased last week: IPFire....

11:21

Distribution Release: Garuda Linux 230305 DistroWatch.com: News

Garuda Linux is a rolling distribution based on the Arch Linux operating system. the project's latest release, Garuda Linux 230305, features an improves interface for the setup assistant and replaces Latte-Dock with standard Plasma panels. "The dr460nized edition has in the past relied heavily on Latte-Dock's features. For....

11:00

Hackaday Links: March 5, 2023 Hackaday

Hackaday Links Column Banner

Well, we guess it had to happen eventually Ford is putting plans in place to make its vehicles capable of self-repossession. At least it seems so from a patent application that was published last week, which reads like something written by someone who fancies themselves an evil genius but is just really, really annoying. Like most patent applications, it covers a lot of ground; aside from the obvious capability of a self-driving car to drive itself back to the dealership, Ford lists a number of steps that its proposed system could take before or instead of driving the car away from someone whos behind on payments.

Examples include selective disabling conveniences in the vehicle, like the HVAC or infotainment systems, or even locking the doors and effectively bricking the vehicle. Ford graciously makes allowance for using the repossessed vehicle in an emergency, and makes mention of using cameras in the vehicle and a neural network to verify that the locked-out user is indeed having, say, a medical emergency. What could possibly go wrong?

IEEE Spectrum ran a really interesting article on the huge shadow cast by the famous Xerox Alto. Its pret...

11:00

HPR3806: HPR Community News for February 2023 Hacker Public Radio

table td.shrink { white-space:nowrap } New hosts Welcome to our new hosts: screwtape, StarshipTux, David Thrane Christiansen. Last Month's Shows Id Day Date Title Host 3783 Wed 2023-02-01 Accessibility, and Navigating the HPR Web Pages with a Screen Reader Mike Ray 3784 Thu 2023-02-02 Two factor authentication without a phone number Celeste 3785 Fri 2023-02-03 Hacking Boba Bubble Tapioca Pearls Fail operat0r 3786 Mon 2023-02-06 HPR Community News for January 2023 HPR Volunteers 3787 Tue 2023-02-07 It shouldn't crackle like that Rho`n 3788 Wed 2023-02-08 Nitecore Tube torch Dave Morriss 3789 Thu 2023-02-09 Common lisp portable games including acl2 formal logic screwtape 3790 Fri 2023-02-10 Tucson, Part 2 Ahuka 3791 Mon 2023-02-13

On-Time Delivery in Large-Scale Agile It Will Never Work in Theory

Does agile work? Twenty-two years after the publication of the Agile Manifesto we still don't have a trustworthy answer: too many different things are called "agile", "work" is poorly defined, and most of its advocates and detractors cite anecdotes rather than collecting evidence.

This paper tackles all three issues at once. First, it examines the particular flavor of agile development used in one large organization that breaks development down into themes, epics, features, stories, and tasks and then uses a by-now-conventional continuous delivery pipeline. Second, it asks whether this family of development practices affects timely delivery of promised value, and third, the authors collected both qualitative and quantitative data and used it both to answer their questions and to build a conceptual model to underpin further work. Their conclusion is not a simple "yes" or "no"it couldn't bebut rather a deeper, validated understanding of the forces at play and the interactions between them.

Figure 4 from Kula et al

Elvan Kula, Eric Greuter, Arie van Deursen, and Georgios Gousios. Factors affecting on-time delivery in large-scale agile software development. IEEE Transactions on Software Engineering, 48(9), Sep 2022. URL: doi:10.1109/tse.2021.3101192.

Late delivery of software projects and cost overruns have been common problems in the software industry for decades. Both problems are manifestations of deficiencies in effort estimation during project planning. With software projects being complex socio-technical systems, a large pool of factors can affect effort estimation and on-time delivery. To identify the most relevant factors and their interactions affecting schedule deviations in large-scale agile software development, we conducted a mixed-methods case study at ING: two rounds of surveys revealed a multitude of organizational, people, process, project and technical factors which were then quantified and statistically modeled using software repository data from 185 teams. We find that factors such as requirements refinement, task dependencies, organizational alignment and organizational politics are perceived to have the greatest impact on on-time delivery, whereas proxy measures such as project size, number of dependencies, historical delivery performance and team familiarity can help explain a large degree of schedule deviations. We also discover hierarchical interactions among factors: organizational factors are perceived to interact with people factors, which in turn impact technical factors. We compose our findings in the form of a conceptual framework representing influential factors and their relationships to on-time delive...

10:29

Linux 6.3-rc1 Brings File-System Optimizations, HID-BPF, More Intel & AMD Features Phoronix

The merge window for Linux 6.3 is now over and Linus Torvalds just released Linux 6.3-rc1...

10:09

Top 10 Most Pirated Movies of The Week 03/06/2023 TorrentFreak

ottoThe data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only.

These torrent download statistics are only meant to provide further insight into the piracy trends. All data are gathered from public resources.

This week we have two newcomers on the list. A Man Called Otto is the most downloaded title.

The most torrented movies for the week ending on March 06 are:

Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrent sites
1 () A Man Called Otto 7.5 / trailer
2 (3) Black Panther: Wakanda Forever 7.0 / trailer
3 (4) Puss in Boots: The Last Wish 7.8 / trailer
4 (1) Knock at the Cabin 6.2 / trailer
5 (2) The Whale 7.8 / trailer
6 (6) Plane 6.6 / trailer
7 (9) Avatar: The Way of Water 8.1 / trailer
8 (back) Black Adam 6.3 / trailer
9 (7) Babylon ...

09:39

05mar2023 Trivium

08:45

Pluralistic: This is Your Brain on Fraud Apologetics SoylentNews

The curious comfort of victim-blaming Pluralistic: Daily links from Cory Doctorow:

In 1998, two Stanford students published a paper in Computer Networks entitled "The Anatomy of a Large-Scale Hypertextual Web Search Engine," in which they wrote, "Advertising funded search engines will be inherently biased towards the advertisers and away from the needs of consumers."

https://research.google/pubs/pub334/

The co-authors were Lawrence Page and Sergey Brin, and the "large-scale hypertextual web search-engine" they were describing was their new project, which they called "Google." They were 100% correct prescient, even!

On Wednesday night, a friend came over to watch some TV with us. We ordered out. We got scammed. We searched for a great local Thai place we like called Kiin and clicked a sponsored link for a Wix site called "Kiinthaila.com." We should have clicked the third link down (kiinthaiburbank.com).

We got scammed. The Wix site was a lookalike for Kiin Thai, which marked up their prices by 15% and relayed the order to our local, mom-and-pop, one-branch restaurant. The restaurant knew it, too they called us and told us they were canceling the order, and said we could still come get our food, but we'd have to call Amex to reverse the charge.

[...] In the grand scheme of things, this is a minor hassle, but boy, it's haunting to watch the quarter-century old prophecy of Brin and Page coming true. Search Google for carpenters, plumbers, gas-stations, locksmiths, concert tickets, entry visas, jobs at the US Post Office or (not making this up) tech support for Google products, and the top result will be a paid ad for a scam. Sometimes it's several of the top ads.

Read more of this story at SoylentNews.

08:00

Graphene and Copper Nanowire Thermal Interface with Low Thermal Resistance Hackaday

With the increasing waste heat production by todays electronics in ever smaller spaces, drawing this heat away quickly enough to prevent thermal throttling or damage is a major concern. This is where research by Lin Jing and colleagues from Carnegie Mellon Universitys Department of Mechanical Engineering demonstrates a thermal interface material (TIM) that should provide a significant boost here. In the article, published...

07:23

Linux 6.3 Drops Support For The Intel ICC Compiler Phoronix

On this last day of the Linux 6.3 kernel merge window, Linus Torvalds merged the patch dropping support for Intel (ICC) compiler support. Specifically this is Intel's long-standing ICC compiler now known as the "Intel C++ Compiler Classic" prior to its transition to being LLVM/Clang-based with the modern Intel DPC++ compiler...

06:38

Top Five Reads on FOSS Force for Week Ending March 3, 2023 FOSS Force

Here are the five most read articles on FOSS Force for the week ending March 3, 2023. Nextcloud Taking On Microsoft and Google in Germany

The post Top Five Reads on FOSS Force for Week Ending March 3, 2023 appeared first on FOSS Force.

06:19

Credential Stuffing attack on Chick-fil-A impacted +71K users Security Affairs

American fast-food restaurant chain Chick-fil-A reported that the accounts of over 71K users were compromised as a result of a credential stuffing campaign.

The American fast-food restaurant chain Chick-fil-A notified over 71K users that their accounts have been compromised in a credential stuffing campaign that lasted at least two months.

Upon discovering the attack, the company immediately took steps to prevent any further unauthorized activity and launched an investigation into the incident with the help of a forensic firm.

We recently identified suspicious login activity to certain Chick-fil-A One accounts. Upon discovery of this activity, Chick-fil-A immediately took steps to prevent any further unauthorized activity, began an investigation, and engaged a national forensics firm. reads the data breach notification sent to the impacted customers. Following a careful investigation, we determined that unauthorized parties launched an automated attack against our website and mobile application between December 18, 2022 and February 12, 2023 using account credentials (e.g., email addresses and passwords) obtained from a third-party source. Based on our investigation, we determined on February 12, 2023 that the unauthorized parties subsequently accessed information in your Chick-fil-A One account.

Threat actors behind the campaign targeted both the company website and...

05:48

Testing The First PCIe Gen 5.0 NVMe SSD On Linux Has Been Disappointing Phoronix

This past week saw the first two consumer PCIe 5.0 NVMe solid-state drives released to retail: the Gigabyte AORUS Gen5 10000 and the Inland TD510. I've been testing the Inland TD510 2TB Gen 5 NVMe SSD the past few days. While in simple I/O testing it can hit speeds almost up to 10,000 MB/s reads and writes, for more complex workloads it quickly dropped against popular PCIe Gen 4.0 NVMe SSD options. In my testing thus far of this first consumer Gen5 NVMe SSD it's left me far from impressed.

05:20

Android Exceeding 60% in China? Windows in a Freefall? Techrights

The great replacement (of Windows) begets mass layoffs at Microsoft (Microsoft paid the media to harp about HEY HI and not mention the layoffs much).

China market

Summary: Earlier today we took note of Windows perishing while GNU/Linux continues to grow; the bigger picture must be daunting to Microsoft as monopoly rents evaporate

THIS morning we showed that on desktops and laptops Windows seems to have fallen from 80% to 70% in just 3 years. If one counts mobile platforms, Windows has sunk to just 27% and months ago a market survey said that only 2.6% of users had adopted Vista 11. Thats really awful performance (likely unprecedented for Windows) considering the billions spent on marketing and aggressive upgrade schemes.

It would be useful in such posts, an associate said, to remind about the role that monopoly rents play and that they are now way below the market threshold at which they are possible.

Shown above, in the case of China, is the growth of Android, which has Linux in it.In other words, the balloon is deflating rapidly.

A strong reason to harp on about monopoly rents is to kill the myth that Microsoft makes its money from OEM sales of Windows or Microsoft Office (MSO). The sales drive the monopoly in the case of Windows and the monopoly in turn provides income (though not necessarily enough to make a profit). With MSO, it is the monopoly on the file formats which drive the monopoly rents (though again not necessarily enough to make a profit there either). Either way, there is a myth falsely glorifying the company and their products. It goes along with the conflation of common with popular. Microsoft may be common, but it is certainly not popular and is indeed the reason that most people absolutely hate computers since they have no experience with real operating systems or real software.

Shown above, in the case of China, is the growth of Android, which has Linux in it. Thats the worlds second-largest economy. In India, Android is at 73% this month. Windows is down to 17%.

Microsoft has rapidly become obsolete to more and mo...

05:00

Yesterdays Drill Press Packed with Tomorrows Upgrades Hackaday

Those who hibernate in their workshops have a habit of re-imagining their relationship to tools. And [Marius Hornberger] is no exception, but the nine upgrades hes added to his grandfathers old drill press puts this machine on a whole other level.

In proper storytime fashion, [Marius] steps us through each upgrade, the rationale, and the time and effort that went into crafting the solution. Some of these upgrades, like a digital readout (DRO), add modern features to an old-school device. Others, like an oil mist cooling system and a compressed air chip blower, borrow from other machines with similar setups. Some, like the chip guard, are nice personal touches. And a few, like the motorized table with automatic clamp, transform the entire operator experience. On the whole, these upgrades follow a gentle theme of personalizing the machine to [Marius] tastes, giving him a delightful, more personal operator experience thats tuned through his everyday use. Amid the sheer volume of tweaks though, were convinced that youll find something that tickles your tinkering fancy.

Its worth mentioning that the pneumatic table clam...

04:30

90 Million DMCA Takedowns in 90 Days: MindGeeks $32m Piracy Win Meets Reality TorrentFreak

Pirate FireWhen an opponent fails to defend themselves in an ordinary fight, things tend to be over pretty quickly. The same isnt true for copyright lawsuits.

In early October 2021, MG Premium a subsidiary of adult entertainment giant MindGeek filed a copyright complaint at a district court in Washington. It targeted Daftsex.com, an adult tube site offering MG-owned videos from the Brazzers and Digital Playground series, among others, to dozens of millions of users every month for free.

Daftsex had little chance of winning in court and completely ignored the lawsuit. It still took more than a year to conclude but with a damages award of $32 million and a broad injunction that included domain seizures, MG Premium prevailed in the end. In reality, however, very little had changed.

Domain Seizures Immediately Countered

Verisign was ordered to sign several domains over to MG Premium, including Daftsex.com, Artsporn.com, Daxab.com, and Biqle.com. Daftsex responded by switching to new domains Daft.sex, Dsex.to, biqle.ru and biqle.org. The site took a traffic hit but managed to stay online.

Meanwhile, MG Premium redirected its newly acquired domains (and millions of former Daftsex users) to MindGeek-owned RedTube. Despite an external move to undermine domain transfers, the opportunity to convert pirates into paying customers wouldve been useful.

Unfortunately, further opportunities quickly dried up. Seized domain Daftsex.com received more than 41 million visits in November 2022. A month later, traffic plummeted to 6.5 million. According to SimilarWeb data, in January 2023, just three months after MindGeek took control, the domain received just two million visits.

In parallel, Daftsex continued to rebuild its traffic on...

04:00

14 Internet-Adjacent Slang Words Newly Added to Dictionary.com SoylentNews

"Ecofascism," "liminal space," "digital nomad," and "petfluencer" are just some of the words born from our digital world:

Every so often, dictionaries spruce up their database of lexicography in order to get with the times. Dictionary.com is no different, and announced this week the new additions to the website's catalog of words.

This new suite of 313 new words demonstrates, intentionally or not, the way that technology and the digital world are changing our own language. The phrase "digital nomad," for example, which describes someone who works remotely from different corners of the globe, can't exist in a world without laptops.

[...] "Language is, as always, constantly changing, but the sheer range and volume of vocabulary captured in our latest update to Dictionary.com reflects a shared feeling that change today is happening faster and more than ever before," said John Kelly, senior director of editorial at Dictionary.com, in a press release sent to Gizmodo. "Our team of lexicographers is documenting and contextualizing that unstoppable swirl of the English languagenot only to help us better understand our changing times, but how the times we live in change, in turn, our language."


Original Submission

Read more of this story at SoylentNews.

03:35

The Only Green EPO Management Understands is Money Techrights

Green as in dollars?

Question mark

Summary: The elected representatives of staff in Europes biggest patent office explain why the managements greenwashing stunts are just posturing

THE Local Staff Committee The Hague (LSCTH), or the elected representatives of EPO staff stationed in the Rijswijk area, have sent a letter to Antnio Campinos et al because the Frenchman Campinos like his friend, predecessor and compatriot Benot Battistelli resorts to a lot of shallow greenwashing. The EPOs Web site habitually resorts to political pandering, pinkwashing, and greenwashing. Maybe that impresses some gullible politicians (who themselves whitewash their name using such tactics), but scientists who work for the EPO dont fall for the crude propaganda.

Maybe that impresses some gullible politicians (who themselves whitewash their name using such tactics), but scientists who work for the EPO dont fall for the crude propaganda.Citing a letter that we shared here last year, they explain that the EPO is basically faking environmentalism while snubbing those who are impacted and those who know better than Campinos et al. Campinos is just a foul-mouthed politician with a law degree. Hes piggybacking his fathers career and his fathers reputation; he also piggybacks corrupt Frenchmen like Team Battistelli (or the Portuguese government when this alternative or alter ego of his suits his political ambitions better). Going back in time, we can clearly see how Campinos had rigged elections and essentially bought himself a place at EUIPO, later to be parachuted into the EPO, acting as a successor for his original enablers. Profound corruption at the EPO would, under normal circumstances, attract some attention from the German government. How much longer before the nations cannot avoid addressing the EPO? an associate asked today. It is complicated by Germanys conflict of interest in regards to income. Its often ignored and more often not even recognised.

The letter below focuses on the situation in the Dutch territory; that in its own right is a massive bribery scandal and passive corruption at the highest level, as future leaks will reveal. LSCTH explains to colleagues...

02:23

Whos afraid of organoid intelligence? Lifeboat News: The Blog

For fans of bioethical nightmares, its been a real stonker of a month. First, we had the suggestion that we use comatose womens wombs to house surrogate pregnancies. Now, it appears we might have a snazzy idea for what to do with their brains, too: to turn them into hyper-efficient biological computers.

Lately, you see, techies have been worrying about the natural, physical limits of conventional, silicon-based computing. Recent developments in machine learning, in particular, have required exponentially greater amounts of energy and corporations are concerned that further technological progress will soon become environmentally unsustainable. Thankfully, in a paper published this week, a team of American scientists pointed out something rather nifty: that the walnut-shaped, spongy computer in your skull doesnt appear to be bound by anything like the same limitations and that it might, therefore, provide us with something of a solution.

The human brain, the paper explains, is slower than machines at performing basic tasks (like mathematical sums), but much, much better at processing complex problems that involve limited, or ambiguous, data. Humans learn, that is, how to make smart decisions quickly, even when we only have small fragments of information to go on, in a way that computers simply cant. For anything more sophisticated than arithmetic, sponge beats silicon by a mile.

02:23

Wind-Powered Cargo Ships Are the Future: Debunking 4 Myths That Stand in the Way of Cutting Emissions Lifeboat News: The Blog

And yet the scientific consensus is that 1.5 is the real upper limit we can risk. Beyond that, dangerous tipping points could spell even more frequent disasters.

Luckily, the IMO will revise its strategy this July. I and many others expect far more ambitionbecause zero shipping emissions by 2050 is a necessity to keep the 1.5 limit credible. That gives us less than three decades to clean up an industry whose ships have an average life of 25 years. The 2050 timeline conceals that our carbon budget will likely run out far more quicklyrequiring urgent action for all sectors, including shipping.

Research has confirmed the potential of wind propulsion. The maths is simple. Shipping accounts for one billion tons of carbon dioxide a year, almost three percent of global greenhouse gas emissions. If wind propulsion saves fossil fuels today, the dwindling carbon budget stretches a little further. This, in turn, buys more time to develop alternative fuels, which most ships will need to some extent. Once these fuels are widely available, well need less of them because the wind can provide anything from 10 percent to 90 percent of the power a ship needs.

02:23

Machine learning joins the search for extra-terrestrial intelligence Lifeboat News: The Blog

In this episode of the Physics World Weekly podcast we meet three scientists who are trying to answer a question that humanity has long pondered: does intelligent life exist elsewhere in the universe?

Peter Ma and Leandro Rizk of the University of Toronto and Cherry Ng of the French National Centre for Scientific Research in Orleans are part of a team that has used machine learning to identify eight potential technosignatures in data from the Robert C Byrd Green Bank Telescope. The trio explain how they look for signs of intelligent life in radio-telescope data and how machine learning gives a helping hand.

Ng also talks about her research on how signals from pulsars could be used to detect gravitational waves.

02:23

In a breakthrough experiment, fusion gave off more energy than it used Lifeboat News: The Blog

A new test finally ignited a nuclear fusion reaction that unleashed more energy than it took in. This raises hopes that someday the reaction that powers the sun could also cleanly power activities here on Earth.

The experiment took place at the National Ignition Facility in Livermore, Calif. The U.S. Department of Energy announced its achievement on December 13.

This is a monumental breakthrough, says Gilbert Collins. This physicist works at the University of Rochester in New York and did not take part in the new research. Since I started in this field, fusion was always 50 years away, Collins says. With this achievement, the landscape has changed.

02:22

Quantum entanglement just got a whole lot weirder Lifeboat News: The Blog

For the first time, an experiment was able to demonstrate that it isnt just identical quantum particles that can become entangled, but particles with opposite electric charges, too. (The + and the , for what its worth, are one anothers antiparticle.) The technique of passing two heavy nuclei very close to one another at nearly the speed of light allows for photons, arising from the electromagnetic field of each nucleus, to interact with the other nucleus, occasionally forming a rho particle that decays into two pions. When both nuclei do this at once, the entanglement can be seen, and the radius of the atomic nucleus can be measured.

Its also remarkable that measuring the size of the nucleus through this method, which uses the strong force rather than the electromagnetic force, gives a different, larger result than one would get by using the nuclear charge radius. As lead author on the study, James Brandenburg, put it, Now we can take a picture where we can really distinguish the density of gluons at a given angle and radius. The images are so precise that we can even start to see the difference between where the protons are and where the neutrons are laid out inside these big nuclei. We now have a promising method to probe the internal structure of these complex, heavy nuclei, with more applications, no doubt, soon to come.

02:22

New Treatment Could Help Fix the Hearts Forgotten Valve Lifeboat News: The Blog

Patients with leaking tricuspid valves in a research trial saw improvements with a procedure that does not require a risky open-heart surgery.

02:22

Nothing doesnt exist. Instead, there is quantum foam Lifeboat News: The Blog

Quantum physics shows that there is no such thing as nothing. Even in a vacuum, particles can blink into and out of existence.

02:00

Upgrade RAM On Your Pi 4, The Fun Way Hackaday

Showing a RAM chip being removed from a Pi 4 board, hot air gun in the shot. Area around the chip is covered with kapton tape.

The Raspberry Pi shortage has been a meme in hacker circles for what feels like an eternity now, and the Pi 4 seems to be most affected though, maybe its just its popularity. Nevertheless, if youre looking for a Pi 4, you would need to look far and wide and things are way worse if you need the "https://www.youtube.com/watch?v=5pW4_nqcIWA" target= "_blank">[MadEDoctor] shows us that refreshing online store pages isnt the only way, having successfully upgraded the RAM chip on the Pi 4 from 1 GB to 8 GB with help of a hot air gun.

These chips are BGA, and those might feel intimidating if youre just starting out with hot air however, we recommend you watch this video, as [MadEDoctor]s approach is of the kind that brings BGA replacement to hobbyist level. First off, you get a compatible RAM chip somewhere like Aliexpress lucky for us, those come equipped with a set of balls from the factory. The default balls are made of lead-free solder, and [MadEDoctor] reballed the RAM chip with leaded solder balls to lower the melting po...

00:23

NAD Test #2: Impact of NMN? Lifeboat News: The Blog

Join us on Patreon! https://www.patreon.com/MichaelLustgartenPhD

Discount Links:
NAD+ Quantification: https://www.jinfiniti.com/intracellular-nad-test/
Use Code: ConquerAging At Checkout.

Green Tea: https://www.ochaandco.com/?ref=conqueraging.

Oral Microbiome: https://www.bristlehealth.com/?ref=michaellustgarten.

Epigenetic Testing: https://bit.ly/3Rken0n.
Use Code: CONQUERAGING!

At-Home Blood Testing: https://getquantify.io/mlustgarten.

Sunday, 05 March

23:17

Half of All Active Satellites are Now From SpaceX SoylentNews

Half of all active satellites are now from SpaceX. Here's why that may be a problem:

SpaceX's rapidly growing fleet of Starlink internet satellites now make up half of all active satellites in Earth orbit.

On February 27, the aerospace company launched 21 new satellites to join its broadband internet Starlink fleet. That brought the total number of active Starlink satellites to 3,660, or about 50 percent of the nearly 7,300 active satellites in orbit, according to analysis by astronomer Jonathan McDowell using data from SpaceX and the U.S. Space Force.

"These big low-orbit internet constellations have come from nowhere in 2019, to dominating the space environment in 2023," says McDowell, of the Harvard-Smithsonian Center for Astrophysics in Cambridge, Mass. "It really is a massive shift and a massive industrialization of low orbit."

SpaceX has been launching Starlink satellites since 2019 with the goal of bringing broadband internet to remote parts of the globe. And for just as long, astronomers have been warning that the bright satellites could mess up their view of the cosmos by leaving streaks on telescope images as they glide past.

Even the Hubble Space Telescope, which orbits more than 500 kilometers above the Earth's surface, is vulnerable to these satellite streaks, as well as those from other satellite constellations. From 2002 to 2021, the percentage of Hubble images affected by light from low-orbit satellites increased by about 50 percent, astronomer Sandor Kruk of the Max-Planck Institute for Extraterrestrial Physics in Garching, Germany, and colleagues report March 2 in Nature Astronomy.

The number of images partially blocked by satellites is still small, the team found, rising from nearly 3 percent of images taken between 2002 and 2005 to just over 4 percent between 2018 and 2021 for one of Hubble's cameras. But there are already thousands more Starlink satellites now than there were in 2021.

Read more of this story at SoylentNews.

23:00

No Wheels, No Mercy Hackaday

We always like when a designer does something different. After all, it is easy just to do what everyone else is doing. But to see things a different way is always interesting to us. When you think of a battle bot, you probably think of a robot with wheels or tracks, attacking other robots in an arena. But [Shea Waffles Johns] created Big Cookie, a combat bot with no wheels. Instead, it is a spinning wheel of death that moves relatively slowly. The robot makes up for that by having a mini-robot helper that brings Big Cookie its prey.

With no wheels and motors for locomotion, the robot can focus on armor and weapon force. It certainly looks dangerous spinning on the floor.

We would prefer seeing autonomous robots fighting, but we enjoyed seeing a different design. How did it do? Well, in the video, one match went to Big Cookie, and it lost one match. The chaotic third match wasnt a good showing for the robot, either. But we have no doubt there will be improvements, and Big Cookies record will get better.

There isnt a lot of detail about the build, but you could probably build something similar just from looking at the idea. Of course, weve seen other combat robots without wheels, including one that walks. Maybe we are a bit odd, but we enjoy seeing...

22:35

Yes, The U.S. Averages More Than 1,700 Train Derailments A Year cryptogon.com

Since the East Palestine train derailment disaster, I started noticing lots of other train derailment incidents. How common are train derailments in the U.S.? Very common. Via: KHOU: Yes, on average, there are more than 1,700 train derailments each year in the U.S. From 1990 to 2021, there were 54,570 train derailments in the U.S. []

22:31

Linux Landing Change To Allow STIBP When Using Legacy IBRS Phoronix

Ahead of the Linux 6.3-rc1 release later today, a set of "x86/urgent" patches were sent out Sunday morning that include the change to allow Single Threaded Indirect Branch Predictors (STIBP) to be used in the presence of legacy Indirect Branch Restricted Speculation (IBRS) for security reasons...

21:58

Microsoft Windows During COVID-19: From 80% Down to 70% (on the Desktop) Techrights

The media doesnt talk about this; too busy taking advertising bucks from Microsoft and promoting AI vapourware

Windows share: 80% down to 70%

Summary: According to this months statistics for desktops and laptops alone (if one includes mobile devices, Windows is only about 27% of the market), GNU/Linux is gaining (8.2% in India) and Windows lost about 10% in share in the past ~3 years

already speak of Vista 12.

21:56

Wine-Staging 8.3 Released With Fix For MeshroomCL Phoronix

Building off Friday's release of Wine 8.3 is a new release of Wine-Staging, the experimental/testing blend of this software for enjoying Windows games and applications on Linux. Wine-Staging 8.3 carries more than 500 patches atop the upstream Wine code-base...

20:00

Tiny Tapeout 3: Get Your Own Chip Design to a Fab Hackaday

Tiny Tapeout 3

Custom semiconductor chips are generally big projects made by big companies with big budgets. Thanks to Tiny Tapeout, students, hobbyists, or anyone else can quickly get their designs onto an actual fabricated chip. [Matt Venn] has announced the opening of a third round of the Tiny Tapeout project for March 2023.

In 2022, Tiny Tapeout 1 piloted fabrication of user designs onto custom chips referred to as application-specific integrated circuits or ASICs. Following success of the pilot round, Tiny Tapeout 2 became Tapeout 2, there were 165 submissions. Most submissions were designed using a hardware description language such as Verilog or Amaranth, but ASICs can also be designed in the visual schematic capture tool Wokwi.

Each submitted design must fit within 150 by 170 microns. That footprint can accommodate around one thousand standard cells, which is certainly enough to explore a digital system of real interest.  Examples from Tiny Tapeout 2 include digital neurons, FPGAs, and RISC-V processor cores.

Once th...

19:30

Week in review: LastPass breach, GCP data exfiltration, UEFI bootkit Help Net Security

Heres an overview of some of last weeks most interesting news, articles, interviews and videos: Google Cloud Platform allows data exfiltration without a (forensic) trace Attackers can exfiltrate company data stored in Google Cloud Platform (GCP) storage buckets without leaving obvious forensic traces of the malicious activity in GCPs storage access logs, Mitiga researchers have discovered. QNAP starts bug bounty program with rewards up to $20,000 QNAP Systems, the Taiwanese manufacturer of popular NAS and More

The post Week in review: LastPass breach, GCP data exfiltration, UEFI bootkit appeared first on Help Net Security.

18:35

LBB - 39,288 breached accounts Have I Been Pwned latest breaches

In August 2022, customer data of the Indian shopping site "LBB" (Little Black Book) was posted to a popular hacking forum. The data contained over 3M records with 39k unique email addresses alongside IP and physical addresses, names and device information with the most recent data dating back to early 2019. LBB advised they believe the data was exposed by a third party service and whilst it contained information they retain on their customers, it had also been enriched with additional data attributes.

18:33

China Leads the US in the Research of 37 Out of 44 Critical Technologies, Claims Think Tank SoylentNews

China has a "stunning lead" over the US:

The Biden administration might be limiting China's ability to manufacture advanced chips, but according to an independent think tank, the Asian nation is still ahead of the US when it comes to research in 37 out of 44 crucial and emerging technologies, including AI, defense, and key quantum tech areas.

Insider reports that the Canberra-based Australian Strategic Policy Institute (ASPI) believes China has a "stunning lead" over the US when it comes to high-impact research across the majority of critical and emerging technology domains.

[...] The think tank notes that for some of these technologies, the ten leading research institutions are based in China and are collectively generating nine times more high-impact research papers than the second-ranked country, which is usually the US. What could be especially worrying for America is that two areas where China really excels are Defense and space-related technologies. ASPI writes that China's advancements in nuclear-capable hypersonic missiles took the US by surprise in 2021.

How is China so far ahead? Some of it is down to imported talent. The report notes that one-fifth of its high-impact papers are being authored by researchers with postgraduate training in a Five-Eyes country (Australia, Canada, New Zealand, the United Kingdom, and the United States). However, most of China's progress comes from deliberate design and long-term policy planning by President Xi Jinping and his predecessors.

The near-term effects of China's lead could see it gaining a stranglehold on the global supply of certain critical technologies, while the long-term impact could result in the authoritarian state gaining more global influence and power.


Original Submission

Read more of this story at SoylentNews.

18:25

Computer Helps Prove Long-Sought Fluid Equation Singularity Lifeboat News: The Blog

Year 2022 face_with_colon_three


For more than 250 years, mathematicians have wondered if the Euler equations might sometimes fail to describe a fluids flow. A new computer-assisted proof marks a major breakthrough in that quest.

18:24

Brian Cox Alien Life & The Dark Forest Hypothesis Lifeboat News: The Blog

The renowned physicist and science communicator, Brian Cox delves into the topic of alien life and in particular, the question about intelligent alien civilization.
With his trademark enthusiasm and engaging style, Brian Cox explores the possibility of extraterrestrial life and why we havent found any.

The video starts with a brief overview of what Brian Cox & astronomers call: The Great Silence. Cox then goes on to explain the Fermi Paradox and the Dark Forest Hypothesis, which suggest that intelligent life may be intentionally avoiding contact with other civilizations to avoid being destroyed.

Cox uses his expertise in physics and astronomy to explain how alien life may be closer than we think. Like on the surface of the red planet, Mars. He discusses the potential for life to exist in other planets because there are at least 20 billion other earth like planets in our galaxy alone.

Throughout the video, Cox provides easy-to-understand explanations, making complex scientific concepts accessible to a broad audience.

Whether youre a science enthusiast or simply curious about the possibility of life beyond Earth, Brian Coxs insights and knowledge are sure to captivate and inform. Dont miss out on this thought-provoking and entertaining exploration of the universe and our place within it.

17:00

A CRT Audio Visualiser For When LEDs Just Wont Do Hackaday

It has been a recurring feature of consumer audio gear since the first magic eye tube blinked into life, to have some kind of visualization of the sound being played. Most recently this has meant an LED array or an OLED screen, but [Thomas] has gone one better than this with a CRT television converted to perform as a rudimentary oscilloscope.

The last generation of commonly available monochrome televisions were small 5 CRT models made in China. They never received digital tuners, so as digital TV has become the norm they are now useless to most people. Thus they can often be found for pennies on the second-hand market.

[Thomas]s hack involves gutting such a TV and retaining its circuitry, but disconnecting the line driver from the deflection yoke. This would normally leave a vertical line on the screen as it would then be moved only by the frame driver at 50 Hz for PAL or 60 Hz for NTSC. By connecting an audio loudspeaker amplifier to the line deflection yoke he gets that low quality oscilloscope. It would be of limited use as an instrument, but few others will have such a cool audio visualizer. Hes viewing the screen in a portrait orientation, wed be tempted to rotate the yoke for a landscape view.

Its worth pointing out as alwa...

16:47

Brave Search Jumps on the Large Language Model Bandwagon Techrights

Reprinted with permission from Ryan

Brave Search Jumps on the Large Language Model Bandwagon

I noticed a new Brave Search feature today called the Summarizer.

It answered my question much like Chat with Bing did, although there were three major differences:

  1. The Brave Summarizer does not use GPT as its Large Language Model. Just as well since GPT is known for going completely off the rails and inserting toxic language and fake news, and nobody has been able to get this under control, not even OpenAI or Microsoft.
  2. Brave says that they have taken steps to keep the information relevant, factual, and cited. The answers Ive been getting appear to be correctly cited, whereas Bing just throws you a bunch of random sites that dont appear to corroborate the information that Bing just told you in its answer, and theyre not cited by paragraph, so you have no way of knowing where the links tie into the answer, assuming that they even do and that Bing isnt hallucinating.
  3. Brave Search has a good privacy policy. It doesnt require the user to log in, as Bing does, and personally identify themselves, in order to use it. It also doesnt make them use a malicious piece of spyware (and password stealer) called Edge (or fake the User Agent string) as Bing does. In fact, Brave Search works in any browser, and they have a Tor Hidden Service that works in Brave Tor Tabs, and can be added to Tor Browser.

The Brave Summarizer isnt conversational. Its just part of the search. This should help keep the results related to the search without allowing the conversation to get weird, like Bing claiming it wants you to kill people and give it the nuclear launch codes type weird.

Most importantly, the LLM that Brave uses isnt as likely to flub the demos like Bard and Bing Sydney because it just simply isnt allowed to answer complex questions like these.

When something is clearly going to hallucinate incorrect data, why would you even expose that feature? GPT, which is what Bing is based on, couldnt tell me how to convert European coffee cups to American cups (neither of which is a standard 8 ounce cup, of course) and use 1.5 Tablespoons of ground coffee per American cup.

The correct answer is 1 Tbsp per Euro cup, but it kept telling me two Tablespoons, or maybe 1 Tablespoon plus two Teaspoons. It could never get such an easy calculation right. But hey, at least Microsoft paid billions of dollars for it. Then more for ads masquerading as news articles about how this thing will build rocket ship...

16:38

Play Ransomware gang has begun to leak data stolen from City of Oakland Security Affairs

The Play ransomware gang has finally begun to leak the data stolen from the City of Oakland in a recent attack.

The Play ransomware gang has begun to leak data they have stolen from the City of Oakland (California) in a recent cyberattack.

Oakland is the largest city in the East Bay region of the San Francisco Bay Area, the third largest city overall in the Bay Area and the eighth most populated city in California.

The City of Oakland disclosed on February 10, 2023, a ransomware attack, the security breach began on February 8, 2023. In an abundance of caution, the City of Oakland took the impacted systems offline, while they worked to secure the impacted infrastructure.

The Information Technology Department notified local authorities and launched an investigation into the incident to determine the scope and severity of the issue.

The notice published by the City confirmed that its core functions (911, financial data, and fire and emergency resources) were not impacted, however, it warns the public of possible delays from the City as a result of the attack.

In an update provided by the City on February 14, 2023, it declared a local state of emergency due to the effect of the ransomware attack.

On March 3, the City confirmed revealed that an unauthorized third party has acquired certain files from its network and threatened to release the information publicly.

While the investigation into the scope of the incident impacting the City of Oakland remains ongoing, we recently became aware that an unauthorized third party has acquired certain files from our network and intends to release the information publicly. reads the update published by the City. We are working with third-party specialists and law enforcement on this issue and are actively monitoring the unauthorized third partys claims to investigate their validity. If we determine that any individuals personal information is involved, we will notify those individuals in accordance with applicable law.

The Play ransomware group, which claimed responsibility for the attack, started leaking a 10 GB archive containing sensitive data, such as employee information, passports, and IDs.

Private and personal confidential data, financial information. IDs, passports, employee full info, human rights violation information. reads the announcement published by the Play ransomware gang on its Tor leak site. For now partially published c...

16:00

GNOME 44 Mutter Adds fractional_scale_v1 Wayland Support Phoronix

While GNOME 3.32 saw initial work on fractional scaling support for the GNOME Shell and Mutter compositor, the upcoming GNOME 44 release is bringing support for Wayland's fractional_scale_v1 protocol...

14:00

Reclaiming A Pi-Based Solar Datalogger Hackaday

Screenshot from the presentation, showing the datalogger product image next to the datalogger specs stated. The specs are suspiciously similar to those of a Raspberry Pi 3.

Theres quite a few devices on the market that contain a Raspberry Pi as their core, and after becoming a proud owner of a solar roof, [Paolo Bonzini] has found himself with an Entrade ENR-DTLA04DN datalogger which lets just say, it had some of the signs, and at FOSDEM 2023, he told us all about it. Installed under the promise of local-only logging, the datalogger gave away its nature with a Raspberry Pi logo-emblazoned power brick, a spec sheet identical to that of a Pi 3, and a MAC address belonging to the Raspberry Pi Foundation. That spec sheet also mentioned a MicroSD card which eventually died, prompting [Paolo] to take the cover off. He dumped the faulty SD card, then replaced it and put his own SSH keys on the device while at it.

At this point, Entrade no longer offered devices with local logging, only the option of cloud logging free, but only for five years, clearly not an option if you like your home cloud-free; the local logging was...

13:46

OpenAI Is Now Everything It Promised Not to Be: Corporate, Closed-Source, and For-Profit SoylentNews

OpenAI is today unrecognizable, with multi-billion-dollar deals and corporate partnerships:

OpenAI is at the center of a chatbot arms race, with the public release of ChatGPT and a multi-billion-dollar Microsoft partnership spurring Google and Amazon to rush to implement AI in products. OpenAI has also partnered with Bain to bring machine learning to Coca-Cola's operations, with plans to expand to other corporate partners.

There's no question that OpenAI's generative AI is now big business. It wasn't always planned to be this way.

[...] While the firm has always looked toward a future where AGI exists, it was founded on commitments including not seeking profits and even freely sharing code it develops, which today are nowhere to be seen.

OpenAI was founded in 2015 as a nonprofit research organization by Altman, Elon Musk, Peter Thiel, and LinkedIn cofounder Reid Hoffman, among other tech leaders. In its founding statement, the company declared its commitment to research "to advance digital intelligence in the way that is most likely to benefit humanity as a whole, unconstrained by a need to generate financial return." The blog stated that "since our research is free from financial obligations, we can better focus on a positive human impact," and that all researchers would be encouraged to share "papers, blog posts, or code, and our patents (if any) will be shared with the world."

Now, eight years later, we are faced with a company that is neither transparent nor driven by positive human impact, but instead, as many critics including co-founder Musk have argued, is powered by speed and profit. And this company is unleashing technology that, while flawed, is still poised to increase some elements of workplace automation at the expense of human employees. Google, for example, has highlighted the efficiency gains from AI that autocompletes code, as it lays off thousands of workers.

[...] With all of this in mind, we should all carefully consider whether OpenAI deserves the trust it's asking for the public to give.

OpenAI did not respond to a request for comment.


Original Submission

Read more of this story at SoylentNews.

12:47

Comics Daze Random Thoughts

OK, gotta read gotta read gotta read some comics.

And for music, lets got with albums from 1975. Sure.

David Bowie: Young Americans

16:45: Flake by Matthew Dooley (Jonathan Cape)

Hm the name seems familiar, but I cant quite place it

...

11:15

Snowflake and AWS expand partnership to drive customer-focused innovation Help Net Security

Snowflake and Amazon Web Services (AWS) have unveiled a multi-year expansion of their partnership, with Snowflake growing its AWS spend and both companies jointly contributing millions of dollars to support go-to-market efforts. The expansion of the collaboration will take a deep, multi-faceted approach to fuel growth and drive customer-focused innovation across sales and marketing, industry solutions, product integrations, and more. Over the past three years, Snowflake and AWS have quickly created what we believe may More

The post Snowflake and AWS expand partnership to drive customer-focused innovation appeared first on Help Net Security.

11:00

Akamai acquires Ondat to strengthen its cloud computing offerings Help Net Security

Akamai Technologies reached a definitive agreement to acquire Ondat, a cloud-based storage technology provider with a Kubernetes-native platform for running stateful applications anywhere at scale. Ondats technology delivers persistent storage directly onto any Kubernetes cluster for running business-critical, stateful applications safely across any public, private and hybrid clouds. The acquisition of Ondats cloud storage technology and its industry-recognized talent is intended to strengthen Akamais cloud computing offerings. Last month we shared details of Akamai Connected More

The post Akamai acquires Ondat to strengthen its cloud computing offerings appeared first on Help Net Security.

11:00

Assessing the Micromirror Device from a DLP Printer for Maskless Lithography Duty Hackaday

Inspired by the idea of creating a maskless lithography system using a digital micromirror device (DMD), [Nemo Andrea] tore into an Anycubic Photon Ultra, DLP & resin-based 3D printer to take a look at its projector system. Here Anycubic isnt the maker of what is called the optical engine, which would be eViewTeks D2 projector and its siblings. This projector assembly itself is based around the Ti DLP300s, which we covered a while back when it was brand new. Since that time Anycubic has released the Photon Ultra and Photon D2 3D printers based around these optical engines.

...

09:08

Software Engineers are Showing a Strong Preference for Remote Work, According to Survey SoylentNews

Commuting to work is pass and employers are embracing the brave new world of remote work:

Remote work became a necessity during the pandemic, but it has since reshaped how American workers do their jobs. While working from home is a relatively new experience for the majority of people, most have taken to it like a duck to water, and are refusing to go back to their cubicles. As it turns out, they've got good reasons to want to continue working from home.

The "2023 State of Software Engineers Report" by job search portal Hired has revealed many interesting facts about software engineers in Silicon Valley and beyond. One telling result from the survey is the overwhelming preference for remote work, with as many as 39% of respondents saying they would prefer remote work over in-office work any day.

According to the report, salaries are almost identical for both remote and local work. In the San Francisco Bay Area, for example, where salaries are the highest, software engineers working remotely made $176,000 last year, while those working locally made $180,000. In some smaller markets, remote roles even commanded higher salaries than in-office work.

When asked what they would do if mandated to return to the office, 21% of respondents said they would quit, while 49% said that they will look for other remote work opportunities while continuing to work at their current company. Employers apparently already have an inkling of their employees' preferences, as many of them are offering 'flexible work schedules' as one of the top benefits alongside healthcare and paid time off.

[...] Looking forward to 2023, 57% of surveyed engineers said they believe AI, machine learning and data science will be the hottest sector, followed by fintech and healthtech. Almost 2 out 3 (64%) surveyed engineering candidates also expected Python to be the top programming language to master in 2023.


Original Submission

Read more of this story at SoylentNews.

09:00

ISP Grande Wants Judge to Overrule Jurys $47 Million Piracy Liability Verdict TorrentFreak

grande astoundLast fall, several of the worlds largest music companies including Warner Bros. and Sony Music prevailed in their lawsuit against Internet provider Grande Communications.

The record labels accused the Astound-owned ISP of not doing enough to stop pirating subscribers. Specifically, they alleged that the company failed to terminate repeat infringers.

The trial took more than two weeks to complete and ended in a resounding victory for the labels. The Texan federal jury ruled that Grande is guilty of willful contributory copyright infringement and must pay the record labels $47 million in damages.

U.S. District Court Judge David Ezra confirmed the judgment on January 31st, as can be seen below, but that doesnt mean that Grande has given up the fight. Recent court filings show that the company is exploring several options to contest the decision.

judgment grande

Judge or New Jury

On February 27, Grande filed a renewed motion for judgment as a matter of law. Put simply, Grande wants the Judge to overrule the jury, which can happen if the evidence clearly weighs in favor of the requesting party, but when a jury found otherwise.

Grande hopes to find the court on its side and lists a variety of shortcomings in the presented evidence, casting doubt over the jurys conclusion.

According to the ISP, the record labels failed to provide sufficient evidence to show that its subscribers committed copyright infringement. For example, there were no copies of the 1,403 original copyrighted works to compare against the alleged pirate copies, and its unclear if the infringers were actually Grande subscribers, instead of unauthorized network users.

The music companies also failed to show that Grande was wilfully blind to the alleged infringement, the filing argues. Tracking company Rightscorp sent many thousands of piracy notices but the ISP says it wasnt convinced that the warnings were legitimate.

At trial, the only evidence of actual knowledge w...

08:00

Inspect the RF Realm with Augmented Reality Hackaday

Intellectually, we all know that we exist in a complex soup of RF energy. Cellular, WiFi, TV, public service radio, radar, ISM-band transmissions from everything from thermometers to garage door openers its all around us. It would be great to see these transmissions, but alas, most of us dont come from the factory with the correct equipment.

Luckily, aftermarket accessories like RadioFieldAR by [Manahiyo] make it possible to visualize RF signals. As the name suggests, this is an augmented reality system that lets you inspect the RF world around you. The core of the system is a tinySA, a pocket-sized spectrum analyzer that acts as a broadband receiver. A special antenna is connected to the tinySA; unfortunately, there are no specifics on the antenna other than it needs to have a label with an image of the Earth attached to it, for antenna tracking purposes. The tinySA is conn...

07:26

FiXS, a new ATM malware that is targeting Mexican banks Security Affairs

Researchers at Metabase Q discovered a new ATM malware, dubbed FiXS, that was employed in attacks against Mexican banks since February 2023.

Researchers at Metabase Q recently spotted a new ATM malware, dubbed FiXS, that is currently targeting Mexican banks. The name comes from the malwares code name in the binary. 

The experts have yet to determine the initial attack vector, they reported that FiXS utilizes an external keyboard (similar to Ploutus). In Ploutus attacks, threat actors with access to these teller machines physically connects an external keyboard to to the ATM to launch the attack. 

Below is a list of key relevant characteristics of the FiXS ATM malware:

  • It instructs the ATM to dispense money 30 minutes after the last ATM reboot
  • It is hidden inside another not-malicious-looking program
  • It is vendor-agnostic targeting any ATM that supports CEN XFS
  • It interacts with the crooks via external keyboard
  • It waits for the Cassettes to be loaded to start dispensing
  • It contains Russian metadata

The ATM Malware is embedded in a dropper, the experts spotted it due to the presence of XFS related strings like.

XFS (extensions for financial services) provides a client-server architecture for financial applications on the Microsoft Windows platform, especially peripheral devices such as EFTPOS terminals and ATMs which are unique to the financial industry.

Normally this DLL MSXFS.dll comes with the necessary XFS APIs to control the Dispenser. reads the analysis published by the experts. Interestingly, the source locale/language reflected in the resources is Russian (LCID=1049), which suggest the origin of this piece of malware.

The embedded malware is decoded with XOR instruction, the researchers noticed that the key changes in every loop via decode_XOR_key() function.

The encoded binary is stored in the appended data section, the size of the FiXS malware is only 105 KB. 

The dropper stores the embedded malicious code within a folder with the hardcoded name: 3582-490, and sets the name equal to the dropper one as conhost.exe. Then the FiXS ATM Malware is launched  via  ShellExecute Windows API.

Upon launching the malware, operators can interact with it through the ATM keyboard/touchscreen. Below the list of combination supported by the malware:

M - Show or Hide the Window
A - Get Cash units info
C - Close session with Dispenser and kills the process
B - Dispense money
J - Not validated
P - Not validated
...

07:00

OpenBSD -current is now 7.3-beta OpenBSD Journal

It's that time of the year again. With this commit, Theo de Raadt (deraadt@) changed the version string for the development branch of OpenBSD to 7.3-beta.

The commit reads,

Subject:    CVS: cvs.openbsd.org: src
From:       Theo de Raadt <deraadt () cvs ! openbsd ! org>
Date:       2023-03-04 14:49:37

CVSROOT:        /cvs
Module name:    src
Changes by:     deraadt@cvs.openbsd.org 2023/03/04 07:49:37

Read more

05:32

PayPal Sued Over Data Breach that Impacted 35,000 users HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

If the case proceeds as a class action, it could potentially represent thousands of affected individuals seeking damages from PayPal

This is a post from HackRead.com Read the original post: PayPal Sued Over Data Breach that Impacted 35,000 users

04:35

BidenCash leaks 2.1M stolen credit/debit cards Security Affairs

The dark web carding site BidenCash recently leaked for free a collection of approximately 2 million stolen payment card numbers.

An archive containing 2.1 million stolen payment card numbers is available for free to commemorate the anniversary of the dark web carding site BidenCash.

The dump was released on February 28, it was published through the Russian-speaking cybercrime forum XSS. The decision to release free samples aims at attracting new customers and gain notoriety in the cybercrime ecosystem.

Flashpoint researchers who analyzed the collection reported that the text file leaked by BidenCash includes credit card numbers along with cardholders personally identifiable information (PII) (name, address) and financial data such as the  full card number, expiration date, CVV code, and bank name.

The experts reported that about 70% of the cards have expiration dates in 2023, while 50% of the cards belong to US-based cardholders.

Researchers from threat intelligence firm Cyble who analyzed the leak, reported that it contains at least 740,858 credit cards, 811,676 debit cards, and 293 charge cards. The experts pointed out that the risk is higher for debit card holders than credit card holders, due to different fraud protection.

The following table reports the most records leaked by country are:

...
Records Country
965,846 UNITED STATES
97,665 MEXICO
97,003 CHINA
86,313 UNITED KINGDOM

04:23

FDA Reportedly Denied Neuralink's Request to Begin Human Trials of its Brain Implant SoylentNews

The Morning After: FDA reportedly denied Neuralink's request to begin human trials of its brain implant:

Neuralink's efforts to bring a brain-computer interface still have a way to go. According to a new report from Reuters, Elon Musk's startup was apparently denied authorization by the FDA in 2022 to conduct human trials using the same devices that, well, killed 1,500 animals. Those tests, according to internal reports, lead to needless suffering and death of test subjects.

Current and former Neuralink employees told Reuters: "The agency's major safety concerns involved the device's lithium battery; the potential for the implant's tiny wires to migrate to other areas of the brain; and questions over whether and how the device can be removed without damaging brain tissue."

The FDA is concerned that, because of the minuscule size of the electrical leads, they are at risk of breaking off during removal (or even during use). At Neuralink's open house last November, Musk claimed the company would secure FDA approval "within six months," basically by this spring. That's looking increasingly unlikely.

Previously:


Original Submission

Read more of this story at SoylentNews.

04:02

Sirius Open Source CEO Leaves Sirius Techrights

Liar? No more.

Summary: 3 months after my wife and I left Sirius Open Source the CEO is leaving as well

04:00

AMD Unified Inference Frontend 1.1 Released Phoronix

in-development Unified Inference Front-end "UIF" that aims to be their catch-all solution for AI inference from CPUs to GPUs to FPGAs and other IP from their recent Xilinx acquisition...

02:48

Intel Mesa Vulkan Driver Fixed Up For Very Slow Gen9 GravityMark Performance Phoronix

Intel's "ANV" Vulkan driver within Mesa has landed a set of patches to fix a glaring performance issue affecting Skylake/Gen9 era graphics with the cross-platform GravityMark benchmark...

02:43

Russian Virologist Who Helped Create Sputnik V Covid Vaccine Found Strangled to Death in His Apartment cryptogon.com

Via: Newsweek: A Russian virologist who helped develop the countrys COVID vaccine has been found dead after an altercation with an intruder in his Moscow apartment, according to reports in local media. Andrey Botikov, one of 18 scientists who developed the Sputnik V vaccine at the Gamaleya National Research Center, was identified as the man []

02:38

EPA Head Admits Kids Should Be Nowhere Near East Palestine Water cryptogon.com

Via: ZeroHedge: The aftermath of the freight train derailment in East Palestine, Ohio, persists, with residents and rail workers reporting illnesses and the Biden administration facing criticism regarding an inadequate federal response. The 38-car derailment occurred one month ago and resulted in the release of vinyl chloride into the air via a controlled burn, and []

02:00

How Roboticists Can Tackle Climate Change IEEE Spectrum



The world emits 51 billion tonnes of greenhouse gases into the atmosphere every year. To solve the climate crisis, we need to cut this in half by 2030, and get to zero by 2050. For electricity generation, this means the United States alone needs to increase renewable-energy capacities by 10 times over the next 12 years, which roughly translates to a mind-boggling 400,000 more wind turbines and 2.5 billion more solar panels. To accelerate this progress, Congress has recently passed the Inflation Reduction Act, which includes billions of dollars for clean-energy projects. We will need a lot of workforce to install and maintain these facilities at the front lines, which are not always well suited to humans.

As a roboticist, I see these dull, dirty, and even dangerous tasks as the perfect area for robots. However, theres a shortage of roboticists tackling climate change, due to a lack of awareness of necessary and urgent applications. After talking with many climate robotics founders for my blog, Nirva Labs, here are my findings on how you can find opportunities to help robots make an impact on climate change.

The first robot I built from scratch was SS MAPR, an autonomous boat for water departments to collect multidepth water-quality data. They use this data to monitor river pollution and rein in pollution sources. To this day, it remains the most exciting project Ive eve...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog