IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Friday, 21 April

02:11

02:05

Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules Open Source Security

Posted by Jeffrey Walton on Apr 20

According to the HTTP::Tiny docs:

Server identity verification is controversial and potentially tricky
because it depends on a (usually paid) third-party Certificate
Authority (CA) trust model to validate a certificate as legitimate.
This discriminates against servers with self-signed certificates or
certificates signed by free, community-driven CA's such as CAcert.org.

I think some of the premises no longer hold.

The...

02:04

Distribution Release: Kubuntu 23.04 DistroWatch.com: News

Version 23.04 of the Kubuntu distribution has been announced. The project's latest release includes the KDE Plasma 5.27 desktop and PulseAudio has been replaced by PipeWire as the default audio server. "The Kubuntu team is happy to announce that Kubuntu 23.04 has been released, featuring the 'beautiful' KDE....

01:40

RADV Optimized By Valve For An Upcoming Game - Nearly Matching The Windows Performance Phoronix

Valve's Linux graphics driver developers continue relentlessly optimizing the Mesa Radeon Vulkan driver "RADV" and today landed an optimization for an unnamed, upcoming game where now it's able to nearly match the performance enjoyed under Windows...

01:30

M5StickC Turned Wearable Morse Code Trainer Hackaday

An orange m5stickc plus strapped to a wrist in the foreground with the persons other hand pressing down on the top of an installed hat, communicating with another m5stickc plus in the background on the table.

Have you ever felt the options for Morse code communication were too limited? Well, look no further than [marsPRE]s open source WristMorse communicator that can connect over WiFi, can act as a Bluetooth keyboard or just be used as a Morse Code trainer.

...

01:30

Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules Open Source Security

Posted by David A. Wheeler on Apr 20

That's true, but irrelevant. The problem is that this function fails to
perform the security function implied by its name. If
HTTP::Tiny supports TLS (instead of rejecting it), it needs to verify TLS certs by default.

If there's function named "isodd()" where "isodd(4) === true", that's a bug,
even if the documentation said that's what it did. The function/method name
implies functionality. You could call...

01:09

Google TAG warns of Russia-linked APT groups targeting Ukraine Security Affairs

The researchers from Google TAG are warning of Russia-linked threat actors targeting Ukraine with phishing campaigns.

Russia-linked threat actors launched large-volume phishing campaigns against hundreds of users in Ukraine to gather intelligence and aimed at spreading disinformation, states Googles Threat Analysis Group (TAG).

In Q1 2023, threat actors linked to Russias military intelligence service focused their phishing campaigns on Ukraine, with the country accounting for over 60% of observed Russian targeting.

FROZENBARENTS (aka Sandworm), a group attributed to Russian Armed Forces Main Directorate of the General Staff (GRU) Unit 74455, continues to focus heavily on the war in Ukraine with campaigns spanning intelligence collection, IO, and leaking hacked data through Telegram. reads the report published by the Google TAG.

FROZENLAKE, aka Sandworm, has been active since 2000, it operates under the control of Unit 74455 of the Russian GRUs Main Center for Special Technologies (GTsST).

The group is also the author of the NotPetya ransomware that hit hundreds of companies worldwide in June 2017.

In 2022, the Russian APT used multiple wipers in attacks aimed at Ukraine, including AwfulShredCaddyWiperHermeticWiperIndustroyer2IsaacWiperWhisperGatePrestigeRansomBoggs, and ZeroWipe. 

On September 2022, the Sandworm group was observed impersonat...

01:07

US charges three men with six million dollar business email compromise plot Graham Cluley

Three Nigerian nationals face charges in a US federal court related to a business email compromise (BEC) scam that is said to have stolen more than US $6 million from victims. Read more in my article on the Tripwire State of Security blog.

01:01

LockBit ransomware for Mac coming soon? Graham Cluley

In the last couple of days it has become clear that the notorious LockBit ransomware gang has been exploring creating what could become a big headache for users of Mac computers.

00:59

CVE-2023-25601: Apache DolphinScheduler 3.0.0 to 3.1.1 python gateway has improper authentication Open Source Security

Posted by Arnout Engelen on Apr 20

Severity: important

Description:

gateway suffered from improper authentication: an
attacker could use a socket bytes attack without authentication. python-gateway function by changing the value
`python-gateway.enabled=false` in configuration file...

00:49

Links 20/04/2023: Ubuntu 23.04 Lunar Lobster Released Techrights

  • GNU/Linux

    • Audiocasts/Shows

      • Jupiter Broadcasting Linux Action News 289

        What we like about Fedora 38, why the Rust foundation is in hot water, and more.

    • Kernel Space

      • LWN Linux 6.2.12
        I'm announcing the release of the 6.2.12 kernel.
        
        
        All users of the 6.2 kernel series must upgrade.
        
        
        The updated 6.2.y git tree can be found at:
                git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-6.2.y
        and can be browsed at the normal kernel.org git web browser:
        
        https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...
        
        thanks,
        
        
        greg k-h
        
      • LWN Linux 6.1.25
      • LWN ...

00:31

[$] Disabling SELinux's runtime disable LWN.net

Distributors have been enabling the SELinux security module for nearly 20 years now, and many administrators have been disabling it on their systems for almost as long. There are a few ways in which SELinux can be disabled on any given system, including command-line options, a run-time switch, or simply not loading a policy after boot. One of those ways, however, is about to be disabled itself.

00:30

Ubuntu 23.04 "Lunar Lobster" Now Available For Download Phoronix

Ubuntu 23.04 "Lunar Lobster" release images are now available for download for those wanting to fetch the latest Ubuntu desktop or server builds or alternatively the various downstream flavors/spins...

00:10

Ubuntu 23.04 Lunar Lobster Desktop Released: Focuses on Enterprises and Everyday Linux Users FOSS Force

Ubuntu 23.04 not only brings many new features to the table for enterprise users, it has plenty of features to please its home-user base as well.

The post Ubuntu 23.04 Lunar Lobster Desktop Released: Focuses on Enterprises and Everyday Linux Users appeared first on FOSS Force.

00:08

Seven new stable kernels LWN.net

The latest crop of stable kernels is out; 6.2.12, 6.1.25, 5.15.108, 5.10.178, 5.4.241, 4.19.281, and 4.14.313 have been released. As is usual, they all contain important fixes throughout the kernel tree.

00:01

Use Redfish to manage servers automatically Linux.com

Learn the basics of using Redfish and how to set up the Redfish Mockup Server.

Read More at Enable Sysadmin

The post Use Redfish to manage servers automatically appeared first on Linux.com.

00:00

Keebin with Kristina: the One With the Music Typewriter Hackaday

Illustrated Kristina with an IBM Model M keyboard floating between her hands.

This editions community build comes from the Yes They Could, But Should They Have? file. Well, I ultimately say yes, this is intriguing. Redditor [dj_edit] looked at the venerable Model M and thought, this buckling-spring masterpiece can yet be improved upon. Yeah! Well, to each their own. I must say that it does sound great, especially with the solenoid feedback enabled via rotary encoder. Just check out the typing test.

...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Thursday, 20 April

23:55

Starship Flight Test cryptogon.com

Wow. It launched. 2X the thrust of Saturn 5. It cleared the tower, made it through max Q, but the first stage didnt separate. This does not appear to be a nominal situation. And then, Rapid unscheduled disassembly. Via: SpaceX:

23:54

Security updates for Thursday LWN.net

Security updates have been issued by Debian (golang-1.11), Fedora (chromium, golang-github-cenkalti-backoff, golang-github-cli-crypto, golang-github-cli-gh, golang-github-cli-oauth, golang-github-gabriel-vasile-mimetype, libpcap, lldpd, parcellite, tcpdump, thunderbird, and zchunk), Red Hat (java-11-openjdk, java-17-openjdk, and kernel), SUSE (chromium, dnsmasq, ImageMagick, nodejs16, openssl-1_0_0, openssl1, ovmf, and python-Flask), and Ubuntu (dnsmasq, libxml2, linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-gcp, linux-gcp-5.4, linux-gke, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4, linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-dell300x, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-oem-5.17, linux-oem-6.0, linux-oem-6.1, and linux-snapdragon).

23:53

Two Critical Flaws Found in Alibaba Cloud's PostgreSQL Databases The Hacker News

A chain of two critical flaws has been disclosed in Alibaba Cloud's ApsaraDB RDS for PostgreSQL and AnalyticDB for PostgreSQL that could be exploited to breach tenant isolation protections and access sensitive data belonging to other customers. "The vulnerabilities potentially allowed unauthorized access to Alibaba Cloud customers' PostgreSQL databases and the ability to perform a supply chain

23:45

MacStealer newly-discovered malware steals passwords and exfiltrates data from infected Macs Graham Cluley

I'm still encountering people who, even after all these years, believe that their Apple Mac computers are somehow magically invulnerable to ever being infected by malware. Maybe details of this new Mac malware will change their mind...

23:43

Building Telescopes on the Moon Could Transform Astronomy SoylentNews

The Moon still has much to tell us about the early solar system:

The Moon still has much to tell us about the early solar system. Encouragingly, it also has scientific value as a platform for observational astronomy.

Lunar exploration is undergoing a renaissance. Dozens of missions, organised by multiple space agenciesand increasingly by commercial companiesare set to visit the Moon by the end of this decade. Most of these will involve small robotic spacecraft, but NASA's ambitious Artemis program, aims to return humans to the lunar surface by the middle of the decade.

[...] The potential role for astronomy of Earth's natural satellite was discussed at a Royal Society meeting earlier this year. The meeting itself had, in part, been sparked by the enhanced access to the lunar surface now in prospect. Several types of astronomy would benefit. The most obvious is radio astronomy, which can be conducted from the side of the Moon that always faces away from Earththe far side.

The lunar far side is permanently shielded from the radio signals generated by humans on Earth. During the lunar night, it is also protected from the Sun. These characteristics make it probably the most "radio-quiet" location in the whole solar system as no other planet or moon has a side that permanently faces away from the Earth. It is therefore ideally suited for radio astronomy.

[...] Radio waves with wavelengths longer than about 15m are blocked by Earth's ionoshere. But radio waves at these wavelengths reach the Moon's surface unimpeded. For astronomy, this is the last unexplored region of the electromagnetic spectrum, and it is best studied from the lunar far side. Observations of the cosmos at these wavelengths come under the umbrella of "low frequency radio astronomy." These wavelengths are uniquely able to probe the structure of the early universe, especially the cosmic "dark ages," an era before the first galaxies formed.

Read more of this story at SoylentNews.

23:40

Distribution Release: Ubuntu MATE 23.04 DistroWatch.com: News

Martin Wimpress has announced the release of Ubuntu MATE 23.04. desktop. "Ubuntu MATE 23.04 is the least exciting Ubuntu MATE release ever. The good news is, if....

23:15

Re: Checking existence of firewalled web servers in Firefox via iframe.onload Open Source Security

Posted by Stefano Di Paola on Apr 20

Absolutely agreed!

What I actually see now as the most effective mitigation is the Chrome
decision to implement preflight on private network access:

https://developer.chrome.com/blog/private-network-access-preflight/

I hope to see that implemented by Firefox and other browsers as well.

As a side note, 3 years ago I released a proof of concept browser
extension that alerts the user when a website tries to perform port
scans or DNS Rebinding...

23:05

Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules Open Source Security

Posted by Steffen Nurpmeso on Apr 20

Hanno Bck wrote in
<20230420073459.003a5be2.hanno () hboeck de>:
|On Wed, 19 Apr 2023 23:53:40 +0200
|Steffen Nurpmeso <steffen () sdaoden eu> wrote:
|> IMO it is no vulnerability at all since it has "always" been _very
|> clearly_ (even very lengthily) documented in the manual page.
|
|A vulnerability does not go away if it's documented, and I find that a
|rather strange take.

Hm no, i do not, the...

23:00

Ubuntu 23.04 Laptop Performance Mixed Against Ubuntu 22.10 Phoronix

Today marks the release of Ubuntu 23.04 "Lunar Lobster" and I've already been trying it out on a number of test systems. Up today are some initial Ubuntu 23.04 vs. 22.10 laptop benchmarks. If you were hoping though for this release to improve performance, unfortunately that doesn't appear to be the case with overall across a range of workloads Ubuntu 23.04 is similar to -- or in some areas trailing -- Ubuntu 22.10 on both Intel and AMD hardware.

22:10

Wine 8.0.1 Released With Three Dozen Bugs Fixed Phoronix

Building off the Wine 8.0 stable release from January, out today is Wine 8.0.1 as the first maintenance point release to this open-source software for enjoying Windows games and applications under Linux, Chrome OS, macOS, and other platforms...

21:56

Beyond Traditional Security: NDR's Pivotal Role in Safeguarding OT Networks The Hacker News

Why is Visibility into OT Environments Crucial? The significance of Operational Technology (OT) for businesses is undeniable as the OT sector flourishes alongside the already thriving IT sector. OT includes industrial control systems, manufacturing equipment, and devices that oversee and manage industrial environments and critical infrastructures. In recent years, adversaries have recognized the

Lazarus Group Adds Linux Malware to Arsenal in Operation Dream Job The Hacker News

The notorious North Korea-aligned state-sponsored actor known as the Lazarus Group has been attributed to a new campaign aimed at Linux users. The attacks are part of a persistent and long-running activity tracked under the name Operation Dream Job, ESET said in a new report published today. The findings are crucial, not least because it marks the first publicly documented example of the

21:53

Re: Checking existence of firewalled URLs via javascript's script.onload Open Source Security

Posted by Jeremy Stanley on Apr 20

[...]

If the attacker controls the destination, they can simply record
whether the connection is successfully established at the remote
end. While this may not tell them much about what specific hosts the
victim has access to reach, it can easily leak general egress
filtering information.

21:30

Ex-CEO of hacked therapy clinic sentenced for failing to protect patients session notes Graham Cluley

A Finnish court has given the former CEO of a chain of psychotherapy clinics a suspended jail sentence after failing to adequately protect highly sensitive notes of patients' therapy sessions from falling into the hands of blackmailing hackers. Read more in my article on the Hot for Security blog.

21:22

Fortra Sheds Light on GoAnywhere MFT Zero-Day Exploit Used in Ransomware Attacks The Hacker News

Fortra, the company behind Cobalt Strike, shed light on a zero-day remote code execution (RCE) vulnerability in its GoAnywhere MFT tool that has come under active exploitation by ransomware actors to steal sensitive data. The high-severity flaw, tracked as CVE-2023-0669 (CVSS score: 7.2), concerns a case of pre-authenticated command injection that could be abused to achieve code execution. The

21:19

Re: Checking existence of firewalled web servers in Firefox via iframe.onload Open Source Security

Posted by Jan Klopper on Apr 20

Hi

The topic is still relevant.

Combining this attack with webservices that might be present behind a
NAT network, eg IOT or appliances can result in various serious issues.

There are loads of devices that do not require csrf, or even POST for
requests that update settings or even firmware.

Performing GET requests on those internal ip's, even though no content
will be returned is still plenty dangerous.
Knowing which ip to perform...

21:18

ChatGPT's Data Protection Blind Spots and How Security Teams Can Solve Them The Hacker News

In the short time since their inception, ChatGPT and other generative AI platforms have rightfully gained the reputation of ultimate productivity boosters. However, the very same technology that enables rapid production of high-quality text on demand, can at the same time expose sensitive corporate data. A recent incident, in which Samsung software engineers pasted proprietary code into ChatGPT,

21:08

Re: Checking existence of firewalled web servers in Firefox via iframe.onload Open Source Security

Posted by Stefano Di Paola on Apr 20

Hello George,

from time to time it happens to rediscover techniques issues.
This is one of those times :)

In 2006 there has been a lot of interest around browser based port
scans, in particular to pivot internal networks.

The following links are some of them:

http://web.archive.org/web/20060813034434/http://www.spidynamics.com/assets/documents/JSportscan.pdf

https://www.gnucitizen.org/blog/javascript-port-scanner/...

21:00

Read Comic Books on the Commodore 64 With StripStream Hackaday

Comic books are traditionally printed on paper, either as regular saddle-bound issues or in hardcover compilations. If you wanted to read them on a low-resolution screen run by an 8-bit computer, you were usually out of luck. Until now! Enter StripStream, the comic book reader for the Commodore 64.

...

20:56

Netflix Will Block Password Sharing Before July 2023 SoylentNews

Netflix Will Block Password Sharing Before July 2023

Netflix Will Block Password Sharing Before July 2023:

Netflix has been working on a way to block people from sharing their Netflix passwords. It was supposed to roll out in the United States already, but now it's coming to the US and other regions sometime soon.

Netflix confirmed in its recent earnings report that it will start rolling out the new account sharing limitations in the second quarter of 2023 meaning sometime between now and June 30. The company said in the report, "In Q1, we launched paid sharing in four countries and are pleased with the results. We are planning on a broad rollout, including in the US, in Q2."

In other countries where Netflix has already rolled out the changes, Netflix accounts have a "primary location" that is determined using your account history, home Wi-Fi network, and other data. Devices that aren't connected to that network and watching Netflix are automatically blocked after 31 days. The only way around the block is to add a paid "extra member" to your account, which costs less than an individual subscription, but isn't available for all types of Netflix plans.

Read more of this story at SoylentNews.

20:47

Libreboot Adds Support For An Old Dell Laptop That Can Be Found For ~$100 Used Phoronix

Libreboot as the downstream of Coreboot focused on providing fully open-source system firmware support has added support for the Dell Latitute E6400, a laptop from the Intel Core 2 Duo days that was popular with many businesses and can be found via various used channels for around $100...

20:31

Opus 1.4 Royalty-Free Audio Codec Released Phoronix

Opus 1.4 is available today as the first update in four years to this open-source, royalty-free versatile audio codec...

20:26

Daggerfly Cyberattack Campaign Hits African Telecom Services Providers The Hacker News

Telecommunication services providers in Africa are the target of a new campaign orchestrated by a China-linked threat actor at least since November 2022. The intrusions have been pinned on a hacking crew tracked by Symantec as Daggerfly, and which is also tracked by the broader cybersecurity community as Bronze Highland and Evasive Panda. The campaign makes use of "previously unseen plugins from

20:25

FTC accuses payments firm of knowingly assisting tech support scammers Graham Cluley

Multinational payment processing firm Nexway has been rapped across the knuckles by the US authorities, who claim that the firm knowingly processed fraudulent credit card payments on behalf of tech support scammers. Read more in my article on the Tripwire State of Security blog.

20:17

Lutris 0.5.13 Beta 2 Released For Managing Your Games On Linux Phoronix

Following the Lutris 0.5.13 beta from mid-February, a second beta of this open-source game manager is now available...

20:11

NSO Group Used 3 Zero-Click iPhone Exploits Against Human Rights Defenders The Hacker News

Israeli spyware maker NSO Group deployed at least three novel "zero-click" exploits against iPhones in 2022 to infiltrate defenses erected by Apple and deploy Pegasus, according to the latest findings from Citizen Lab. "NSO Group customers widely deployed at least three iOS 15 and iOS 16 zero-click exploit chains against civil society targets around the world," the interdisciplinary laboratory

20:06

KDE Gear 23.04 Released With Many UI Improvements, New Features Phoronix

this collection of KDE desktop applications...

19:35

Preventing Malware & Cyber Attacks: Simple Tips for Your Computer HackRead | Latest Cybersecurity and Hacking News Site

By Owais Sultan

Living without the Internet is hardly imaginable today. However, the anonymity of the internet has led to the

This is a post from HackRead.com Read the original post: Preventing Malware & Cyber Attacks: Simple Tips for Your Computer

19:05

Nintendos War With 1Fichier is Not Over But Could Be For $0.00 TorrentFreak

1fichierWhen a company like Nintendo puts out a press release, the entire world pays attention. This week was no different.

Nintendo has been locked in a legal battle with French file-hosting service 1fichier for the past five years. The basic facts dont appear to be in dispute; Nintendo informed 1fichier that it had found pirated copies of its games on the service, but 1fichier refused to take them down.

Nintendo responded with legal action in France and in 2021, won its case. By not taking the pirated content down, 1fichier became liable for damages, the court ruled.

Unhappy with the decision, 1fichier filed an appeal, but on April 12, 2023, the Paris Court of Appeal confirmed that 1fichiers owner, DStorage SAS, engaged its civil liability for failing to withdraw or block access to illicit copies of Nintendo games hosted on its platform, despite the notifications Nintendo had sent to it for such purposes.

Why Would 1fichier Deliberately Expose Itself?

Nintendos dispute with 1fichier sounds like a straightforward copyright case; hosting companies generally avoid liability for user-uploaded content but can pay the price if they refuse to take content down. The fundamental question not addressed by Nintendos release is why 1fichier would intentionally expose itself to so much risk and then keep digging.

For the sake of all parties involved and our own sanity, legal opinions in this matter are best left to the experts. However, were informed that this lawsuit is the product of a fundamental disagreement, not on the removal of content per se, but on the conditions laid out in French law for a notice to be considered valid.

DStorages Relationship With Customers and Content

As the operator of 1fichier, DStorage states that it provides file-hosting services for its customers and, as such, the company has a duty to ensure that their data is held securely.

The file-hoster says that the files on its servers are uploaded by users, and it is their choice whether to keep those files entirely private, or share them more widely with others. In any event, DStorage insists it has no way of knowing what files its users upload, or what decisions they make in terms of keeping files private or communicating them to the public. It does note, however, that independent court experts found that 80% of the data on its servers is never made public.

Complicating m...

18:38

Re: Checking existence of firewalled URLs via javascript's script.onload Open Source Security

Posted by Georgi Guninski on Apr 20

Hi, thanks for the info and for the compliment :)

I can't imagine how can you check for open port/URL
without javascript, can you give reference or explanation?
You can make request, but without javascript you can't read the result.

18:36

Re: ncurses fixes upstream Open Source Security

Posted by Tavis Ormandy on Apr 20

Sure - but the question is whether it's an ncurses bug, or an Apple bug?

It seems like you think it's an ncurses bug, and privileged programs
should be allowed to use attacker controlled terminfo, so long as they
don't query certain dangerous caps like rf?

I'm not so sure, although maybe ncurses should only search system paths
when getauxval(AT_SECURE).. is set? Even then, I think the common
pattern of system("tput...

18:34

Re: Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution Open Source Security

Posted by Steffen Nurpmeso on Apr 20

nightmare.yeah27 () aceecat org wrote in
<20230419055256.zhwa4okfxdbsc72z@beesty>:
|On Tue, Apr 18, 2023 at 02:57:41AM +0200, Solar Designer wrote:
|> On Sun, Apr 16, 2023 at 10:57:27PM +0200, Steffen Nurpmeso wrote:
|
|>> You have to do some things, and if you give up privileges
|>> thereafter, extended capabilities are gone.
|
|> POSIX saved IDs should help retain/regain the capabilities.
|
|Another (simpler?)...

18:13

Europe Will Invest 43 Billion to Make its Own Microchips SoylentNews

A European Chips Act to play catch-up with the US and Asia:

The European Union finally agreed on a new plan to boost its microchip industry. The multi-billion investment is focused on strengthening Europe's technological leadership, the EU said, but it could very well be an attempt to put the Old Continent on par with what market leaders are already doing right now.

After spending some months negotiating between the European Council and the European Parliament, the European Union has now officially approved a plentiful subsidy plan for its semiconductor industry. The European Chips Act will put 43 billion (roughly $47 billion) to bolster Europe's "competitiveness and resilience" in the microchip business, promoting an effective digital and green transition powered by hi-tech technology.

Right now, Europe has a 10% market share of global chip manufacturing; with the EU Chips Act, Brussels plans to double the EU's production capacity to 20% of the global market by 2030. The plan is also focused on strengthening Europe's research and technology capabilities over chip advancements, building innovation capacity in design manufacturing and packaging, developing an in-depth understanding of the global semiconductor supply chain, and addressing the skills shortage by attracting new talents and growing its own skilled workforce.

Microchips already are "strategic assets for key industrial value chains," the EU said, while the digital transformation opened new markets for the chip industry such as highly automated cars, cloud, IOT, connectivity, space, defense and supercomputers. The recent global semiconductor shortages also showed how the global supply chain has an "extreme" dependency on very few actors in a complex geopolitical context.

[...] As a matter of fact, the final EU Chips Act contains some additional provisions which were not included in the initial draft. Besides funding the manufacturing of cutting-edge semiconductor technology, the plan will also cover the entire value chain with older chips and research & design facilities. The EU Chips Act is coming after the world's powerhouses in the chip industry (USA, Taiwan, South Korea, Japan) have already approved or are in the process of approving their own subsidy initiatives. Therefore, Brussels' money to boost EU semiconductor output won't guarantee success.


Original Submission

...

18:00

Soft Robotic System for In Situ 3D Bioprinting and Endoscopic Surgery Hackaday

The progress of medical science has meant increasingly more sophisticated ways to inspect and repair the body, with a shift towards ever less invasive and more effective technologies. An exciting new field is that of in situ tissue replacement in a patient, which can be singular cells or even 3D printed tissues. This in vitro approach of culturing replacement tissues comes however with its share of issues, such as the need for a bioreactor. A more straightforward approach is printing the cells in vivo, meaning directly inside the patients body, as demonstrated by a team at the University of New South Wales Sydney with a soft robot that can print layers of living cells inside for example a GI tract.

In their paper, the team led by [Dr Thanh Nho Do] and PhD student [Mai Thanh Thai] describe the soft robot that is akin to a standard endoscope, but with a special head that has four soft microtubule artificial muscles (SMAM) for three degrees of freedom and fabric bellow actuators (FB...

17:03

Trigona Ransomware targets Microsoft SQL servers Security Affairs

Threat actors are hacking poorly secured and Interned-exposed Microsoft SQL servers to deploy the Trigona ransomware.

Threat actors are hacking into poorly secured and public-facing Microsoft SQL servers to deploy Trigona ransomware.

Trigona is a malware strain that was discovered in October 2022, and Palo Alto Unit 42 researchers reported similarities between Trigona and the CryLock ransomware.

Trigona is written in Delphi language, it encrypts files without distinguishing their extensions and appends the ._locked extension to the filename of encrypted files.

The attackers launch brute-force or dictionary attacks against the server in an attempt to guess account credentials.

Once gained access to the server, the threat actors deploy malware that is tracked by cybersecurity firm AhnLab as CLR Shell.

CLR Shell allows operators to harvest system information and escalate privileges to LocalSystem by exploiting a vulnerability in the Windows Secondary Logon Service.

In addition, this CLR Shell malware is confirmed to have a routine that exploits privilege escalation vulnerabilities, which is believed to be due to the high privileges required by Trigona as it operates as a service. reads the report published by AhnLab. CLR Shell is a type of CLR assembly malware that receives commands from threat actors and performs malicious behaviors, similarly to the WebShells of web servers.

The analysis of the log from AhnLabs ASD shows the MS-SQL process sqlservr.exe installing Trigona under the name svcservice.exe.

When svcservice.exe is executed as a service, it executes the Trigona ransomware and also creates and executes svchost.bat used to execute the ransomware. The svchost.bat registers the Trigona binary to the Run key to maintain persistence.

The svchost.bat also deletes volume shadow copies and disables the system recovery feature to prevent victims from recovering the encrypted files.

...

17:00

Budweiser Goes into Scoundrel Mode Terra Forming Terra



This is of course hilarious.  Sooner or later, the CEO will be giving us a demonstration of public groveling.

folks who are trapped mentally into the land of woke likely cannot grasp just how outside commonly held belief systems they are.  All perversions are called perversions because they are not ever biologically sanctioned and are in fact are strongly counter indicated.

Worse than that, a normal autonomic nervous system response for normal males is to instinctually beat the shit out of the individual displaying the perversion.  All perversions are thus under real threat of MOB suppression.

Folks, we need to tell these in danger.  Just understanding that can allow them to live their lives circumspectly.  We have proven we can live with homosexuality but actually little else and the public is quickly getting tired of all the bizarre posturing.

 

Budweiser is slammed for back-to-basics patriotic Clydesdale ad released two weeks after Bud Light debacle that cost it $6bn in market value - and following CEO's lukewarm apologyThe ad reads as a brand reset for the beer company currently embroiled in controversy over a progressive partnership with Dylan Mulvaney

The 'American Spirit' spot features the brand's iconic Clydesdales galloping across the great American plains and by historic landmarks
...

IPCC adjusts temperature data to create the impression of catastrophic global warming Terra Forming Terra



I queried the whole heat island problem when i first started writing on this subject over fifteen years ago.  Turns out you can separate rural data from urban data and guess what?  there is a significant difference.

The good news is that the rural data conforms to the big picture which also controls for solar variability.  That might matter.

We are in a warming period but not exceptional and surely refects the ongoing rebound from what we call the Little Ice Age toward the Medeval maxima.  That maxima opened the Northwest passage somewhat like today.  It was just more robust.

Again we appear to be shifting between the minus one degree to the plus one degree which has held during the whole Holocene.  The fact remains it is nothing to worry about and presently welcome as it has modestly expanded agriculture.

And yes, unnamed crooks are dicking with the data and telling lies.  THe association with co2 is nonsense and in fact we may well need to increase our CO2 to meet geolgical standards.  They also ignored the geological picture.  The whole point was to harness the weather for political purposes, if you can blieve that.  It is why they switched from GLOBAL WARMING to CLIMATE CHANGE in their talking points.


IPCC adjusts temperature data to create the impression of catastrophic global warming



https://expose-news.com/2023/04/17/data-adj-to-create-the-impression-of-global-warming/

...

Data can now be processed at the speed of light Terra Forming Terra


This is huge of course and we are bumping up against the final limits of Moore.s Law.  Yet this certainly made the Holodec much closer.  I still recall the problem we had with processor heat in all those old computers.  slowly but surely we are trending down there as well.

It took us seventy years to get to this point folks and it was an asspiration even in the beginning.  That is the power of directed research.  Just expect it to take years ,and yes the Holodec is much closer than imagined.

Our whole public today accepts the impossible by sunday, and miracles next week.  We are now so spoiled.  Telling folks any of this was possible fifty years ago was always impossible..



Data can now be processed at the speed of light

https://www.spacedaily.com/reports/Data_can_now_be_processed_at_the_speed_of_light_999.html

Yeonjeong Koo, one of the co-first authors of the research paper, said, "The nano-excitonic transistor is expected to play an integral role in realizing an optical computer, which will help process the huge amounts of data driven by AI technology.

Data can now be processed at the speed of light

by Staff Writers
Pohang, South Korea (SPX) Apr 16, 2023

How can Marvel movie character Ant-Man produce such strong energy out of his small body? The secret lies in the "transistors" on his suit that amplify weak signals for processing. Transistors that amplify electrical signals in the conventional way lose heat energy and limit the speed of signal transfer, which degrades performanc...

The entire western financial system has a fatal flaw that will spell its undoing Terra Forming Terra




Not quite true of course, although the real flaw is in managing it all and avoiding the temtation of giantism.  The reality is that management must be overhauled and my first choice is to send the whole apparatus down to the natural community level, the Rule of Twelve and allowing surpluses to be used to buy parts of larger debt.

this also allws the current structure to remain in place while all this vrolls out globally while maintaining strong limits on the multiple for the large banks. There will thhen be a steady shift from this local base into the larger lending market.

After all, you cannot lend out all your available credit internally, but the surpus can buy even government notes.

Yes we have a problem and it needs to be fixed the way i just described.  Othgerwise we weill have panics that shut of lending once in a while.  understand that every morning, a banker wakes up to discover he has to buy loans today.  Everyday, so quitting is not really an option.


The entire western financial system has a fatal flaw that will spell its undoing

Mike Adams

The entire western financial system is based on "fractional reserve" banking, which is all based on the assumption that people don't move very quickly -- nor simultaneously -- to withdraw their money from financial institutions.
...

15:37

Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules Open Source Security

Posted by Hanno Bck on Apr 19

A vulnerability does not go away if it's documented, and I find that a
rather strange take.

Also I think this discussion was had many times before, as plenty of
libraries in other language ecosystems defaulted to not checking certs
or doing incomplete checks, and over time they all defaulted to the
sane thing: To make the secure setting the default.
The fact that apparently noone has ever checked this for a major perl
library (I mean - CPAN...

15:24

GS1 Proposes Sunrise 2027 for 2D Barcodes on Products SoylentNews

GS1, the global standards organisation for barcodes, has started to advertise their Sunrise 2027 program for adding 2D barcodes to products.
https://www.gs1digital.link/sunrise-2027/
https://www.gs1us.org/industries-and-insights/by-topic/sunrise-2027

Long story short this adds an 2D barcode to product labels alongside the existing 1D barcode. The 2D barcode gives extra info to the retailer (assuming the manufacturer adds it to the barcode) like batch/lot #, expiry date etc and can also provide a URL for the product to the consumer where they can find out more info about the product. There's even a complete fake brand set up to show off the concept - https://dalgiardino.com/

Since most POS apps are likely going to be confused by 2 barcodes on 1 product and potentially double-charge you for your favourite box of cornflakes the scanner vendors are implementing a feature where they'll only send 1 barcode to the POS system; for legacy scanners that'll be the 1D barcode (like now), for new scanners that can read 2D barcodes it can either be specific GS1 tags or the entire barcode depending on what the POS application wants.

Note that this is already live for some manufacturers and geographies, 2027 is just when it's intended to be deployed globally.


Original Submission

Read more of this story at SoylentNews.

15:00

The biggest data security blind spot: Authorization Help Net Security

Too many people have access to company data they dont need. Also, too many companies focus on authentication (verifying identity) as a security measure and overlook the importance of authorization (verifying right to access). While its important to give employees access to the data they require to do their job, granting too much access increases the risk of data breaches. Maintaining proper authorization is particularly important when were facing the economic distress that comes with More

The post The biggest data security blind spot: Authorization appeared first on Help Net Security.

15:00

A Look at Segas 8-Bit 3D Glasses Hackaday

From around 2012 onwards, there was a 3D viewing and VR renaissance in the entertainment industry. That hardware has grown in popularity, even if its not yet mainstream. However, 3D tech goes back much further, as [Nicole] shows us with a look at Segas ancient 8-bit 3D glasses [via Adafruit].

[Nicole]s pair of Sega shutter glasses are battered and bruised, but she notes more modern versions are available using the same basic idea. The technology is based on liquid-crystal shutters, one for each eye. By showing the left and right eyes different images, its possible to create a 3D-vision effect even with very limited display hardware.

The glasses can be plugged directly into a Japanese Sega Master System, which hails from the mid-1980s. It sends out AC signals to trigger the liquid-crystal shutters via a humble 3.5mm TRS jack. Games like Space Harrier 3D, which were written to use the glasses, effectively run at a half-speed refresh rate. This is because of the 60 Hz NTSC or 50 Hz PAL screen refresh rate is split in half to se...

14:30

How companies are struggling to build and run effective cybersecurity programs Help Net Security

A recent Code42 report reveals a rapidly growing number of inside risk incidents and a concerning lack of training and technology, further exacerbated by increasing workforce turnover and cloud adoption. In this Help Net Security video, Joe Payne, President at CEO at Code42, discusses how data loss from insiders is not a new problem but has become more complex.

The post How companies are struggling to build and run effective cybersecurity programs appeared first on Help Net Security.

14:00

CISOs struggling to protect sensitive data records Help Net Security

Almost all IT and security leaders (96%) globally are concerned their organization will be unable to maintain business continuity following a cyberattack, according to Rubrik. Data security is becoming increasingly complex Data security is becoming increasingly complex and the datasets that require securing are growing rapidly. Rubrik internal data revealed that on average, the growth of data secured in 2022 was 25% (on premises grew 19%, cloud grew 61%, and SaaS data secured grew 236% More

The post CISOs struggling to protect sensitive data records appeared first on Help Net Security.

13:31

Microsoft Windows in Africa: From 98% to 17% in Just 14 Years Techrights

It was at 98% in January-March of 2019. Now:

Operating System Market Share Africa

Summary: Africa has already dumped Microsoft, but the winner is Google (with Android), and even though it means hundreds of millions of Linux users it does not mean digital liberation for users, so much advocacy work remains to be done

Google is slavery

13:30

Outdated cybersecurity practices leave door open for criminals Help Net Security

Organizations experienced a significant increase in ransomware from an average of four attacks over five years in 2021 versus four attacks over the course of one year in 2022, according to ExtraHop. Of those who fell victim, 83% admitted to paying the ransom at least once. As organizations increasingly find themselves under attack, the data discovered they are drowning in cybersecurity debt unaddressed security vulnerabilities like unpatched software, unmanaged devices, shadow IT, and More

The post Outdated cybersecurity practices leave door open for criminals appeared first on Help Net Security.

13:10

Last Months LibrePlanet Talk About Free/Libre Software in Africa Techrights

From the slides of Benson Muite:

Mobile-first

Summary: The above slide from last months LibrePlanet talk* by Benson Muite was uploaded by the FSF as part of these slides/deck; the talk itself isnt online yet (it was recommended to us), but the slides tell a good bunch of facts. A lot of people in Africa moved to Linux (Android), but not GNU/Linux (used a lot in Nigeria), hence they dont get emancipated by technology; it spies on them.

Licence: CC BY SA 4.0
________
* framatube.org (PeerTube platform for FSF) has this channel too, in case MediaGoblin is down. The FSF seriously under-provisioned MediaGoblin for these new videos. Now the site goes up and down (mostly down) and it makes MediaGoblin look bad. Not MediaGoblins fault.

13:00

IT and business services market shows resilience with positive growth outlook Help Net Security

Worldwide IT and business services revenue is expected to grow (in constant currency) from $1.13 trillion in 2022 to $1.2 trillion in 2023, or 5.7% year-over-year growth, according to IDC. In nominal dollar-denominated revenue based on todays exchange rate, the market will grow 3.5% due to exchange rates. This represents an increase of 110 basis points from IDCs previous forecast, which projected 2023 growth to be 4.6% and less than 5% in the following years More

The post IT and business services market shows resilience with positive growth outlook appeared first on Help Net Security.

12:50

Picus Security expands its CTEM solution with CAASM and CSPM capabilities Help Net Security

Picus Security has announced the expansion of its continuous threat exposure management (CTEM) solution to help CISOs better answer the question: what is our cyber risk?. The companys new capabilities Picus Cyber Asset Attack Surface Management (CAASM) and Picus Cloud Security Posture Management (CSPM) help organizations improve their visibility by providing them with a more unified view of their threat exposure. Now, security teams can simulate real-world threats, discover unknown assets, identify misconfigurations More

The post Picus Security expands its CTEM solution with CAASM and CSPM capabilities appeared first on Help Net Security.

12:40

NICE Actimize launches SAM-10 to detect suspicious activity while reducing false positives Help Net Security

NICE Actimize has launched its Suspicious Activity Monitoring (SAM-10) solution. Built to detect more suspicious activity while reducing false positives, NICE Actimizes SAM-10 introduces enhancements to its anti-money laundering solution, incorporating multiple layers of defense which strengthen the others and offer comprehensive coverage and detection of suspicious activity for financial institutions. Part of NICE Actimizes Anti-Money Laundering suite of solutions, the new SAM-10 solutions entity-centric AML approach delivers data to enrich profiles and multiple layers More

The post NICE Actimize launches SAM-10 to detect suspicious activity while reducing false positives appeared first on Help Net Security.

12:39

Whisper Aero Wants to Make Aviation, and the Rest of the World, Quieter SoylentNews

Whisper Aero wants to make aviation, and the rest of the world, quieter:

The world is loud. If delivery drones and air taxis also known as electric vertical take-off and landing (eVTOL) aircraft gain the level of market saturation investors are hoping for, cities and neighborhoods are only going to get noisier.

That's the assumption, anyway. But Whisper Aero does not seem to care much for assumptions.

The premise of the two-year-old startup is that there should not be a trade-off between technological progress and noise: You should be able to quietly rid your lawn of leaves, heat and cool buildings, and even take an air taxi ride. To get to that future, Whisper says it has developed a never-been-done-before electric propulsion device (to get really specific, an electric ducted fan) that's both quieter and more efficient than ones already on the market.

[...] Whisper has designed an electric-ducted fan that can be scaled up or down for different applications. Over the past two years, the company has designed, built and flown nine generations of this propulsor. They've settled on a product that both reduces the amplitude how loud something is and that shifts the tonal profile of the noise to something more pleasant. The company says they've even been able to move some of the tones into the ultrasonic, beyond what the human ear can detect.

[...] Following a well-trod path in aerospace, Whisper will focus its initial commercialization efforts with the U.S. Department of Defense, an agency that they've already been working with for testing. Whisper has scored a handful of small government contracts from the DOD, including the Air Force Research Lab, to validate their propulsor.

Read more of this story at SoylentNews.

12:30

Venafi Firefly enhances the security of machine identities for cloud-native applications Help Net Security

Venafi has introduced Venafi Firefly, the lightweight machine identity issuer that supports highly distributed, cloud native environments. Part of the Venafi Control Plane for Machine Identities, Firefly enables security teams to securely meet developer-driven machine identity management requirements for cloud native workloads by issuing machine identities, such as TLS and SPIFFE, locally at high speeds across any environment. By delivering added speed, reliability, and security for machine identities in modern architectures, it helps organizations ensure More

The post Venafi Firefly enhances the security of machine identities for cloud-native applications appeared first on Help Net Security.

12:20

Daon unveils TrustX platform for identity proofing and authentication Help Net Security

Daon has unveiled TrustX, its next-generation cloud-based platform for identity proofing and authentication to support the creation and deployment of user journeys across their entire digital identity lifecycle. Daon TrustX is optimized by artificial intelligence (AI) and machine learning (ML) in order to reduce fraud and minimize friction in the customer experience, thereby providing the foundation for identity continuity. TrustX provides businesses with the tools to build, deploy, assess, monitor, and modify the digital identity More

The post Daon unveils TrustX platform for identity proofing and authentication appeared first on Help Net Security.

12:10

VMware Cross-Cloud managed services helps customers secure multi-cloud environments Help Net Security

VMware has unveiled VMware Cross-Cloud managed services, a set of prescriptive offers with enhanced partner and customer benefits that will enable skilled partners to expand their managed services practices. Cross-Cloud managed services will make building managed services faster for partners and easier to consume by customers. This will improve partner profitability while opening new opportunities for growth and expansion. The adoption of multi-cloud is helping customers become digitally smart. Multi-cloud services enable faster development of More

The post VMware Cross-Cloud managed services helps customers secure multi-cloud environments appeared first on Help Net Security.

12:00

Water Solves Mazes, Why Not Electrons? Hackaday

A few weeks ago, we looked at a video showing water solving a maze. [AlphaPhoenix] saw the same video, and it made him think about electrons finding the path of least resistance. So can you solve a maze with foil, a laser cutter, a power supply, and some pepper? Apparently, as you can see in the video below.

At first, he duplicated the water maze, but without the effect of gravity. It was hard to see the water flow, so pepper flakes made the motion of the liquid quite obvious. The real fun, though, started when he cut the maze out of foil and started running electrons across it.

It isnt easy to visualize electrons, but you can see the heat they produce using a thermal camera. Of course, a physics guru will tell you that you really arent watching electrons flow, but rather you are seeing charge moving via charge carriers. Regardless, the effect is that electricity flows, and you can see how that works with the thermal camera and develop intuition about it using the water model. A cool demo.

If you want to watch the video that inspired this one, we covered it. If you didnt get a thermal camera for a gift last year, you can buy one for yourself, but be sure to check out the comments for some options the post didn&#821...

11:18

NEW 'Off The Hook' ONLINE 2600 - 2600: The Hacker Quarterly

NEW 'Off The Hook' ONLINE

Posted 20 Apr, 2023 1:18:05 UTC

The new edition of Off The Hook from 04/19/2023 has been archived and is now available online.

Skype problems, listener mail, upgrades are unavoidable, the Skype problems have been resolved, the problem with the federal judiciary.

11:10

[$] LWN.net Weekly Edition for April 20, 2023 LWN.net

The LWN.net Weekly Edition for April 20, 2023 is available.

10:00

HPR3839: Rip a CD in the terminal Hacker Public Radio

Wiki ABCDE Wiki Github ABCDE Github page Git ABCDE Git page Ask Ubuntu page abcde.conf "abcde CD ripping configuration file" Custom abcde configuration file For only ogg,mp3,flac and opus custom-abcde.conf "abcde CD ripping configuration file" freedb.freedb.org is dead; use gnudb.gnudb.org instead Bugzilla entry for freedb.org Updated CDDB location in .abcde.conf CDDBURL=&quot;http://gnudb.gnudb.org/~cddb/cddb.cgi&quot; Alias in BASH alias ripcd.mp3=&#39;abcde -o mp3&#39; alias ripcd.opus=&#39;abcde -o opus&#39; alias ripcd.ogg=&#39;abcde -o ogg&#39; alias ripcd.opus=&#39;abcde -o opus&#39; More Info https://askubuntu.com/questions/788327/use-abcde-to-produce-high-quality-flac-and-mp3-output-with-album-art-under-xenia#788757 abcde -o &#39;flac:-8,mp3:-b 320&#39; -G

09:52

Recycled Core Routers Exposed Sensitive Corporate Network Info SoylentNews

Researchers are warning about a dangerous wave of unwiped, secondhand core-routers:

Cameron Camp had purchased a Juniper SRX240H router last year on eBay to use in a honeypot network he was building to study remote desktop protocol (RDP) exploits and attacks on Microsoft Exchange and industrial control systems devices. When the longtime security researcher at Eset booted up the secondhand Juniper router, to his surprise it displayed a hostname.

After taking a closer look at the device, Camp contacted Tony Anscombe, Eset's chief security evangelist, to alert him what he found on the router. "This thing has a whole treasure trove of Silicon Valley A-list software company information on it," Camp recalls telling Anscombe.

"We got very, very concerned," Camp says.

Camp and Anscombe decided to test their theory that this could be the tip of the iceberg for other decommissioned routers still harboring information from their previous owners' networks. They purchased several more decommissioned core routers -- four Cisco Systems ASA 5500, three Fortinet FortiGate, and 11 Juniper Networks SRX Series Services Gateway routers.

After dropping a few from the mix after one failed to power up and another two were actually mirrored routers from a former cluster, they found that nine of the remaining 16 held sensitive core networking configuration information, corporate credentials, and data on corporate applications, customers, vendors, and partners. The applications exposed on the routers were big-name software used in many enterprises: Microsoft Exchange, Lync/Skype, PeopleSoft, Salesforce, Microsoft SharePoint, Spiceworks, SQL, VMWare Horizon View, voice over IP, File Transfer Protocol (FTP), and Lightweight Directory Access Protocol (LDAP) applications.

[...] The routers contained one or more IPSec or VPN credentials, or hashed root passwords, and each had sufficient data for the researchers to identify the actual previous owner/operator of the device. Nearly 90% included router-to-router authentication keys and details on applications connected to the networks; some 44% had network credentials to other networks (such as a supplier or partner); 33% included third-party connections to the network; and 22% harbored customer information.

Read more of this story at SoylentNews.

09:15

QEMU 8.0 Released With 32-bit x86 Host Support Deprecated Phoronix

QEMU 8.0 is out today as the newest feature release for this processor emulator that plays an important role in the open-source Linux virtualization stack...

09:01

Smashing Security podcast #318: Tesla workers spy on drivers, and Operation Fox Hunt scams Graham Cluley

Graham wonders what would happen if his bouncing buttocks were captured on camera by a Tesla employee, and we take a look at canny scams connected to China's Operation Fox Hunt. All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault.

09:00

Hacking An Apartment Garage Door With New Remotes Hackaday

[Old Alaska] had a problem. He needed a second remote for his apartment garage door, but was quoted a fee in the hundreds of dollars for the trouble of sourcing and programming another unit. Realizing this was a rip-off given the cheap hardware involved, he decided to whip up his own sneaky solution instead.

Its a simple hack, cheap and functional. An RF-activated relay with two remotes was sourced online for the princely sum of $8. [Old Alaska] then headed down to the equipment cabinet in the garage, opening the lock with the side of his own car key. He then wired the relay in parallel with the existing manual pushbutton for activating the garage door.

Sometimes, a hack doesnt have to be complicated to be useful. Many of...

08:00

NFSv4 Courteous Server Linux.com

Improvements to NFS for Linux users rela

Click to Read More at Oracle Linux Kernel Development

The post NFSv4 Courteous Server appeared first on Linux.com.

list_lru Optimizations for UEK7 U1 Linux.com

Some great memory saving implemented in

Click to Read More at Oracle Linux Kernel Development

The post list_lru Optimizations for UEK7 U1 appeared first on Linux.com.

Using Intel Advanced Matrix Extensions with Oracle Linux Linux.com

Improved large dataset matrix processing

Click to Read More at Oracle Linux Kernel Development

The post Using Intel Advanced Matrix Extensions with Oracle Linux appeared first on Linux.com.

07:56

Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules Open Source Security

Posted by Steffen Nurpmeso on Apr 19

Demi Marie Obenour wrote in
<ZD/4ODBjTesPMECg@itl-email>:
|On Tue, Apr 18, 2023 at 05:46:30PM +0200, Stig Palmquist wrote:
|> HTTP::Tiny v0.082, a Perl core module since v5.13.9 and available
|> standalone on CPAN, does not verify TLS certs by default. Users must
|> opt-in with the verify_SSL=>1 flag to verify certs when using HTTPS.
...
|IMO this is an HTTP::Tiny vulnerability.

IMO it is no vulnerability at all since it...

07:09

An Old NASA Spacecraft Will Crash to Earth on Wednesday SoylentNews

An old NASA spacecraft will crash to Earth on Wednesday:

A retired NASA spacecraft will reenter Earth's atmosphere on Wednesday, with some parts of the vehicle expected to crash to the planet's surface.

While most of the Reuven Ramaty High Energy Solar Spectroscopic Imager (RHESSI) spacecraft is expected to burn up as it enters the atmosphere at high speed, some parts of the 660-pound (300-kilogram) machine are likely to survive the descent.

The good news is that NASA says that the risk of harm coming to folks on terra firma is low at "approximately 1 in 2,467." Still, for anyone wishing to don a hard hat just in case, RHESSI is expected to reenter the atmosphere at about 9:30 p.m. ET on Wednesday, April 19, though the forecast comes with an uncertainty of plus/minus 16 hours.

[...] RHESSI entered service in 2002 and, until its retirement in 2018, it observed solar flares and coronal mass ejections from its low-Earth orbit. Its work enabled scientists to learn more about the underlying physics of how these powerful bursts of energy occur.

The spacecraft's activities included imaging the high-energy electrons that carry a large part of the energy released in solar flares. Using its imaging spectrometer, RHESSI became the first-ever mission to record gamma-ray images and high-energy X-ray images of solar flares.

[...] The mission also helped to improve measurements of the sun's shape, and demonstrated that terrestrial gamma ray flashes described by NASA as "bursts of gamma rays emitted from high in Earth's atmosphere" and which occur above some thunderstorms happen more frequently than first thought.

NASA said it retired RHESSI in 2018 after maintaining communications with it became difficult. After retaining its low-Earth orbit for the last five years, the spacecraft is about to meet a fiery end.


Original Submission

Read more of this story at SoylentNews.

07:04

Brazils Ministry of Justice Asks Google to Deindex Pirate Sites TorrentFreak

google brasilOver the past few years, Brazil has worked hard to combat online piracy from various angles.

The Operation 404 campaigns, in particular, have led to numerous takedowns and arrests with the most recent wave taking place last month.

Brazils Ministry of Justice and Public Security (MJSP) praised the international mobilization which resulted in 11 arrests. In addition, 63 music apps were taken down in the enforcement push, while 128 pirate site domains were blocked by ISPs.

The objective is the removal of audio and video content, such as games and music, blocking and suspension of illegal streaming websites and applications, de-indexing of content in search engines and removal of profiles and pages on social networks, the Ministry commented at the time.

Google Court Order

These anti-piracy actions have been widely covered in the press, also internationally. Noticeably absent from the many dozens of reports were the details of the sites and apps actually targeted. A few weeks on, we may be able to partially fill this gap.

The Ministry of Justice specifically mentioned that search engines would be required to deindex domain names. We hadnt seen any evidence of that but yesterday Google made note of a court order submitted by Brazilian authorities, which requested the removal of 167 domain names from its index.

These types of government-backed blocking requests are relatively rare. While we cant confirm that these are the exact same domains that were targeted in the latest Operation 404 wave, it certainly would make sense considering the information we have available.

Vizer.tv and Other Targets

Unlike a similar notice, sent by the Ministry of Justice two years ago, the recent complaint doesnt include a copy of the court order. After that time, Google was asked to remove over 200 domains from its search results in Brazil, including The Pirate Bay, 1337x, YTS and Fmovies.

The latest notice targets many lesser-known sit...

06:57

Russian national sentenced to time served for committing money laundering for the Ryuk ransomware operation Security Affairs

Russian national Denis Mihaqlovic Dubnikov has been sentenced to time served for committing money laundering for the Ryuk ransomware operation.

Russian national Denis Dubnikov (30) has been sentenced to time served for committing money laundering for the Ryuk ransomware group. The man was also ordered to pay $2,000 in restitution.  

On February 7, 2023, Dubnikov pleaded guilty in the U.S. to one count of conspiracy to commit money laundering for the Ryuk ransomware operation. The man was arrested in Amsterdam in November 2021 and was extradited to the US in August 2022.

According to the indictment, between at least August 2018 and August 2021, Dubnikov and his co-conspirators are alleged to have knowingly and intentionally laundered the proceeds of ransomware attacks on individuals and organizations throughout the United States and abroad. reads the press release published by DoJ in August. Specifically, Dubnikov and his accomplices laundered ransom payments extracted from victims of Ryuk ransomware attacks.

The Russian national received ransom payments from Ryuk operators and along with his co-conspirators used various financial transactions to conceal the ownership and the nature of the laundered proceeds.

According to the investigators, in July 2019, Dubnikov laundered more than $400,000 in Ryuk ransom proceeds. Individuals involved in the conspiracy laundered at least $70 million in ransom proceeds.

According to a joint report published in January 2021 by security firms Advanced-intel and HYAS, Ryuk operators earned, at the time of publishing the analysis, more than $150 million worth of Bitcoin from ransom paid by their victims.

Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 VOTE FOR YOUR WINNERS
Vote for me in the sections:

  • The Teacher Most Educational Blog
  • The Entertainer Most Entertaining Blog
  • The Tech Whizz Best Technical Blog
  • Best Social Media Account to Follow (@securityaffairs)

Please nominate Security Affairs as your favorite blog.

...

05:30

Mesa 23.1-rc2 Released With Initial Batch Of Fixes Phoronix

Eric Engestrom has released Mesa 23.1-rc2 right on time as the newest weekly test candidate for Mesa 23.1 as this quarter's feature update to this set of open-source OpenGL and Vulkan graphics drivers...

05:06

Take a tour of the Edgescan Cybersecurity Platform Graham Cluley

Graham Cluley Security News is sponsored this week by the folks at Edgescan. Thanks to the great team there for their support! Edgescan simplifies Vulnerability Management (VM) by delivering a single full-stack SaaS solution integrated with world-class security professionals. Edgescan helps enterprise companies consolidate managing multiple point scanning tools for each layer of the attack Continue reading "Take a tour of the Edgescan Cybersecurity Platform"

04:26

+45. If only most of us were so lucky. SoylentNews

So it says at The Register.

NASA's Ingenuity Mars Helicopter was designed to fly just five times, but last week the little rotorcraft that could clocked up its 50th flight in the red planet's thin atmosphere.

Flight 50 departed Airfield Lambda on April 13th and required 145.7 seconds to reach Airfield Mu, a 322-meter flight at a brisk 4.6 meters per second, cruising at a new height record of 18 meters above Martian soil.

On The Register's analysis of NASA's flight log Ingenuity's records are:

        Longest duration flight 169.5 seconds on August 16th, 2021, during flight 12
        Longest distance 704 meters on April 8th, 2022, during flight 25
        Fastest flight 6.5 meters per second on April 2nd, 2023, during flight 49
        Total flight time 5,349.9 seconds, or just over 89 minutes
        Total horizontal flight distance 11,546 meters

"When we first flew, we thought we would be incredibly lucky to eke out five flights," said Teddy Tzanetos, Ingenuity team lead at JPL, in a blog post celebrating the 50th flight . "We have exceeded our expected cumulative flight time since our technology demonstration wrapped by 1,250 percent and expected distance flown by 2,214 percent."

The Ingenuity team is now planning a 51st flight to bring the 'copter close to the "Fall River Pass" region of Jezero Crater. Future flights will head towards "Mount Julian," from where the craft will enjoy panoramic views of the nearby Belva Crater, an 800-metre dent in Mars' surface.


Original Submission

Read more of this story at SoylentNews.

03:45

[$] Vanilla OS shifting from Ubuntu to Debian LWN.net

Vanilla OS, a lightweight, immutable operating system designed for developers and advanced users, has been using Ubuntu as its base. However, a recent announcement has revealed that, in the upcoming Vanilla OS 2.0 Orchid release, the project will be shifting to Debian unstable (Sid) as its new base operating system. Vanilla OS is making "https://www.gnome.org/">GNOME desktop environment along with the distribution's reliance on the Snap packaging format. The decision has generated a fair amount of interest and discussion within the open-source community.

03:44

GTK3 Port Of GIMP Is "Officially Finished" Phoronix

The long-awaited port of the GIMP image manipulation program to the GTK3 toolkit is now declared "officially finished"...

03:33

Google fixed the second actively exploited Chrome zero-day of 2023 Security Affairs

Google rolled out emergency security patches to address another actively exploited high-severity zero-day flaw in the Chrome browser.

Google rolled out emergency fixes to address another actively exploited high-severity zero-day flaw, tracked as CVE-2023-2136, in its Chrome web browser.

The vulnerability is an Integer overflow in the Skia graphics library, the issue was reported by Clment Lecigne of Googles Threat Analysis Group on April 12, 2023.

A remote attackers who had compromised the renderer process can exploit the integer overflow in the Skia library to potentially perform a sandbox escape via a crafted HTML page.

Google also addressed other vulnerabilities in Chrome, below is the full list published by the company:

  • [$8000][1429197] High CVE-2023-2133: Out of bounds memory access in Service Worker API. Reported by Rong Jian of VRI on 2023-03-30
  • [$8000][1429201] High CVE-2023-2134: Out of bounds memory access in Service Worker API. Reported by Rong Jian of VRI on 2023-03-30
  • [$3000][1424337] High CVE-2023-2135: Use after free in DevTools. Reported by Cassidy Kim(@cassidy6564) on 2023-03-14
  • [$NA][1432603] High CVE-2023-2136: Integer overflow in Skia. Reported by Clment Lecigne of Googles Threat Analysis Group on 2023-04-12
  • [$1000][1430644] Medium CVE-2023-2137: Heap buffer overflow in sqlite. Reported by Nan Wang(@eternalsakura13) and Guang Gong of 360 Vulnerability Research Institute on 2023-04-05

The Stable and extended stable channel has been updated to 112.0.5615.137/138 for Windows and 112.0.5615.137 for Mac which will roll out over the coming days/weeks. Linux release coming soon. reads the advisory published by the company. Google is aware that an exploit for CVE-2023-2136 exists in the wild.

Last week, Google released an emergency security update to address the first Chrome zero-day vulnerability (CVE-2023-2033) in 2023, the company is aware of attacks in the wild exploiting the issue.

The vulnerability is a Type Confusion issue that resides in the JavaScript engine V8. The vuln...

03:27

Re: ncurses fixes upstream Open Source Security

Posted by Solar Designer on Apr 19

I'm attaching the 5 scripts from there to this message for archival,
as-is (text/plain) and in tar.gz (to avoid any mangling). There's also
Ncurses.pdf, but it's too large for the mailing list because of embedded
screenshots. SHA-256's of these all:

c3b981fad88f17cc201bfa7f4230a348e30b449238e3d3406852691770876eda cost_oob_read.sh
526cde9fc78cb0712c0b725ecea316913f0302194702ebccdf1a1a146f32dac9 gen_terminfo.py...

03:08

RE: [EXTERNAL] Re: [oss-security] ncurses fixes upstream Open Source Security

Posted by Jonathan Bar Or (JBO) on Apr 19

Yes, now that the cat is out of the bag there's no point - you can find some POCs here (not every find is covered by a
POC, FYI):
https://drive.google.com/drive/u/0/folders/1XZiHbH7W7is8cwTu7DKrpwBTYuYfRZqE

Note not all of them work on Linux - some are macOS focused too.

As for Taviso's remark - obviously using "iprog", "rf" or "if" capabilities can be used maliciously if an attacker is
able to affect...

01:43

For Cybercriminal Mischief, Its Dark Web Vs Deep Web SoylentNews

A new report sees threat actors swarming to digital bazaars to collaborate, buy and sell malware and credentials:

A new report from cyberthreat intelligence company Cybersixgill sees threat actors swarming to digital bazaars to collaborate, buy and sell malware and credentials.

Threat actors are consolidating their use of encrypted messaging platforms, initial access brokers and generative AI models, according to security firm Cybersixgill's new report, The State of the Cybercrime Underground 2023. This report notes this is lowering the barriers to entry into cybercrime and "streamlining the weaponization and execution of ransomware attacks."

The study is built upon 10 million posts on encrypted platforms and other kinds of data dredged up from the deep, dark and clear web. Brad Liggett, director of threat intel, North America, at Cybersixgill, defined those terms:

  • Clear web: Any site that is accessible via a regular browser and not needing special encryption to access (e.g., CNN.com, ESPN.com, WhiteHouse.gov).
  • Deep web: Sites that are unindexed by search engines, or sites that are gated and have restricted access.
  • Dark web: Sites that are only accessible using encrypted tunneling protocols such as Tor (the onion router browser), ZeroNet and I2P.

"What we're collecting in the channels across these platforms are messages," he said. "Much like if you are in a group text with friends/family, these channels are live chat groups."

Tor is popular among malefactors for the same reason: It gives people trapped in repressive regimes a way to get information to the outside world, said Daniel Thanos, vice president and head of Arctic Wolf Labs.

"Because it's a federated, peer-to-peer routing system, fully encrypted, you can have hidden websites, and unless you know the address, you're not going to get access," he said. "And the way it's routed, it's virtually impossible to track someone."

Cybercriminals use encrypted messaging platforms to collaborate, communicate and trade tools, stolen data and services partly because they offer automated functionalities that make them an ideal launchpad for cyberattacks. However, the Cybersixgill study suggests the number of threat actors is decreasing and concentrating on a handful of platforms.

Read more of this story at SoylentNews.

01:41

Google TAG Warns of Russian Hackers Conducting Phishing Attacks in Ukraine The Hacker News

Elite hackers associated with Russia's military intelligence service have been linked to large-volume phishing campaigns aimed at hundreds of users in Ukraine to extract intelligence and influence public discourse related to the war. Google's Threat Analysis Group (TAG), which is monitoring the activities of the actor under the name FROZENLAKE, said the attacks continue the "group's 2022 focus

01:33

Former Director Of National Intelligence Admits That Fauci Lied About Gain Of Function Research cryptogon.com

Via: ZeroHedge: The real reason for the campaign to silence discussion on the Wuhan lab becomes evident as the connections between Fauci, the NIH and the lab are revealed. Elements of the US government including Fauci were in fact bankrolling gain of function research on coronaviruses at Wuhan, and shielding it from government oversight. It []

01:28

01:26

Rep. Gaetz Resolution Would Make Biden Disclose Number of US Troops in Ukraine cryptogon.com

Via: Antiwar: Rep. Matt Gaetz (R-FL) on Monday introduced a resolution that would require President Biden to disclose the number of US troops inside Ukraine and share all documents outlining US military assistance for Kyiv with the House. If the resolution is passed, it would require President Biden and Secretary of Defense Lloyd Austin to []

01:16

U.S. Navy Tests Iron Man-Like Jetpacks cryptogon.com

Via: ZeroHedge: Gravity Industries showcased their Iron Man-like jetpacks at a field training exercise earlier this month in Virginia Beach, Virginia. Gravity worked with the Joint Prototyping and Experimentation Maritime program at Naval Surface Warfare Center to conduct multiple mock exercises with the jetpacks, including rapid transit from shore-to-sea and sea-to-shore missions.

01:15

Blind Eagle Cyber Espionage Group Strikes Again: New Attack Chain Uncovered The Hacker News

The cyber espionage actor tracked as Blind Eagle has been linked to a new multi-stage attack chain that leads to the deployment of the NjRAT remote access trojan on compromised systems. "The group is known for using a variety of sophisticated attack techniques, including custom malware, social engineering tactics, and spear-phishing attacks," ThreatMon said in a Tuesday report. Blind Eagle, also

01:07

Noorindoo Plasma UFO? Flashlight? cryptogon.com

I dont know, what do you think? Via: Chris Lehto:

01:00

NVIDIA GeForce RTX 4080/4090: Windows 11 vs. Ubuntu 23.04 Performance Phoronix

For those wondering how the NVIDIA Linux gaming/GPU performance is looking relative to Windows 11, here are some benchmarks using the GeForce RTX 4080 and RTX 4090 graphics cards. Both NVIDIA RTX 40 graphics cards were tested on Windows 11 Pro and Ubuntu 23.04 while primarily focusing on games making use of Valve's Steam Play to reflect current Linux gaming trends as well as featuring some other cross-platform GPU accelerated software.

00:58

Brain Images Just Got 64 Million Times Sharper cryptogon.com

Via: Duke: Magnetic resonance imaging (MRI) is how we visualize soft, watery tissue that is hard to image with X-rays. But while an MRI provides good enough resolution to spot a brain tumor, it needs to be a lot sharper to visualize microscopic details within the brain that reveal its organization. In a decades-long technical []

00:01

Test TCP ports with Python and Scapy Linux.com

Get greater control over TCP port checking with a DIY, customizable approach using Python and Scapy.

Read More at Enable Sysadmin

The post Test TCP ports with Python and Scapy appeared first on Linux.com.

00:00

Vintage Computer Festival East was a Retro Madhouse Hackaday

The Vintage Computer Festival East took place last weekend at the InfoAge Science and History Museum in New Jersey, and by any metric you care to use, it was a phenomenal success. Everyone you spoke with, from the the exhibitors and attendees, to the veteran volunteers who put this incredible show together, all said the same thing: theyd never seen a turnout like this before.

...

00:00

Saying Dumb Things, Turning Them Into Clickbait Techrights

Muggie van Staden

Like trusting Microsoft not to lock/shut GNU/Linux and BSD out (using, e.g., secure boot)

Invading poland

Summary: There was never a lack of gullible people saying terrible things, in spite of all evidence to the contrary

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Wednesday, 19 April

23:54

US and UK agencies warn of Russia-linked APT28 exploiting Cisco router flaws Security Affairs

UK and US agencies are warning of Russia-linked APT28 group exploiting vulnerabilities in Cisco networking equipment.

Russia-linked APT28 group accesses unpatched Cisco routers to deploy malware exploiting the not patched CVE-2017-6742 vulnerability (CVSS score: 8.8), states a joint report published by the UK National Cyber Security Centre (NCSC), the US National Security Agency (NSA), US Cybersecurity and Infrastructure Security Agency (CISA) and US Federal Bureau of Investigation (FBI).

The joint advisory provides detailed info on tactics, techniques, and procedures (TTPs) associated with APT28s attacks conducted in 2021 that exploited the flaw in Cisco routers.

The APT28 group (aka Fancy BearPawn StormSofacy GroupSednit, and STRONTIUM) has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide. The group was involved also in the string of attacks that targeted 2016 Presidential election.

The group operates out of military unity 26165 of the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS).

Most of the APT28s campaigns leveraged spear-phishing and malware-based attacks.

According to the joint report, APT28 exploited the known vulnerability to carry out reconnaissance and reploy malware on unpatched Cisco routers.

The Russia-linked APT28 conducted the attacks in 2021 and targeted a small number of entities in Europe, U.S. government institutions, and about 250...

23:47

Nigeria: GNU/Linux Market Share Up to 5%, Windows Down to 50% Techrights

Past 6 months (2023 estimates say 230,842,743 people live in Nigeria, the sixth biggest population on this planet):

Desktop Operating System Market Share Nigeria: GNU/Linux at 5%

Summary: As per these figures from this month, Nigeria is adopting GNU/Linux faster than some countries; is 1 in 20 desktops/laptops running GNU/Linux? Microsoft bribed Nigerian officials 15 years ago to prevent this from happening.

23:47

Google Chrome Hit by Second Zero-Day Attack - Urgent Patch Update Released The Hacker News

Google on Tuesday rolled out emergency fixes to address another actively exploited high-severity zero-day flaw in its Chrome web browser. The flaw, tracked as CVE-2023-2136, is described as a case of integer overflow in Skia, an open source 2D graphics library. Clment Lecigne of Google's Threat Analysis Group (TAG) has been credited with discovering and reporting the flaw on April 12, 2023. "

23:37

The rebooting of Solus Linux LWN.net

The desktop-oriented Solus distribution has been through a difficult period; this post describes the extensive changes that have been made in response.

Notably, innovation in the Linux ecosystem is presently centered around the use of application sandboxing, containers and the development of immutable operating systems with a well understood Software Bill of Materials. Each of these concepts allow for a degree of separation and stability when developing, testing and certifying software and products.

The current Solus tooling, as well as the resulting packaging and development experience, is somewhat ill-suited to this objective and would most likely need a wholesale re-engineering of the tools before this becomes feasible.

However, there is a more straightforward path for Solus: Rebasing onto Serpent OS.

23:30

Checking existence of firewalled URLs via javascript's script.onload Open Source Security

Posted by Georgi Guninski on Apr 19

There is minor information disclosure vulnerability similar
to nmap in browser.

It is possible to check the existence of firewalled URL U via
the following javascript in a browser:

<script src="U"
onload="alert('Exists')"
onerror="alert('Does not exist')">

This might have privacy implication on potentially
"semi-blind CSRF" (XXX does this makes sense?).

Works for me in...

23:26

Security updates for Wednesday LWN.net

Security updates have been issued by Debian (asterisk), Fedora (lldpd and openssh), Red Hat (curl, kernel, and openvswitch2.13), SUSE (compat-openssl098, glib2, grafana, helm, libgit2, openssl, and openssl-1_1), and Ubuntu (linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15, linux-azure-fde, linux-gcp, linux-gcp-5.15, linux-gke, linux-gke-5.15, linux-gkeop, linux-ibm, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-oracle, linux-oracle-5.15, linux-raspi, linux, linux-aws, linux-azure, linux-gcp, linux-hwe-5.19, linux-kvm, linux-lowlatency, linux-oracle, linux-raspi, and vim).

23:24

Axiom announces new government human spaceflight program Lifeboat News: The Blog

COLORADO SPRINGS Axiom Space has introduced a new program to allow countries to create human spaceflight programs without needing to develop their own infrastructure or other capabilities.

The Axiom Space Access Program, announced April 17, offers countries a tiered approach to conducting research on the International Space Station or Axioms future commercial space station, as well as flying their own astronauts.

The program is effectively a space program in a box, said Tejpaul Bhatia, chief revenue officer at Axiom, in an interview during the 38th Space Symposium. The real key is that turnkey access at affordable, sustainable and predictable rates.

23:23

Dr. Matthew MacDougall: Neuralink & Technologies to Enhance Human Brains | Huberman Lab Podcast Lifeboat News: The Blog

In this episode, my guest is Matthew MacDougall, MD, the head neurosurgeon at Neuralink. Dr. MacDougall trained at the University of California, San Diego and Stanford University School of Medicine and is a world expert in brain stimulation, repair and augmentation. He explains Neuralinks mission and projects to develop and use neural implant technologies and robotics to 1) restore normal movement to paralyzed patients and those with neurodegeneration-based movement disorders (e.g., Parkinsons, Huntingtons Disease) and to repair malfunctions of deep brain circuitry (e.g., those involved in addiction). He also discusses Neuralinks efforts to create novel brain-machine interfaces (BMI) that enhance human learning, cognition and communication as a means to accelerate human progress. Dr. MacDougall also explains other uses of bio-integrated machines in daily life; for instance, he implanted himself with a radio chip into his hand that allows him to open specific doors, collect and store data and communicate with machines and other objects in unique ways. Listeners will learn about brain health and function through the lens of neurosurgery, neurotechnology, clinical medicine and Neuralinks bold and unique mission. Anyone interested in how the brain works and can be made to work better ought to derive value from this discussion.

#HubermanLab #Neuroscience.

Thank you to our sponsors.
AG1 (Athletic Greens): https://athleticgreens.com/huberman.
HVMN: https://hvmn.com/huberman.
Levels: https://levels.link/huberman.
Thesis: https://takethesis.com/huberman.
InsideTracker: https://insidetracker.com/huberman.

Supplements from Momentous.
https://www.livemomentous.com/huberman.

Huberman Lab Social & Website.
Instagram: https://www.instagram.com/hubermanlab.
Twitter: https://twitter.com/hubermanlab.
Facebook: https://www.facebook.com/hubermanlab.
LinkedIn:...

23:23

Is Time Travel Possible In Our Universe? Lifeboat News: The Blog

The first 100 people to use code UNIVERSE at the link below will get 60% off of Incogni: https://incogni.com/universe.

Researched and Written by Colin Stuart.
Check out his superb Astrophysics for Beginners course here: https://www.colinstuart.net/astrophysics-course-for-beginneron-online/

Edited by Manuel Rubio.
Narrated and Script Edited by David Kelly.
Thumbnail art by Ettore Mazza, the GOAT: https://www.instagram.com/ettore.mazza/?hl=en.
Animations by Jero Squartini https://fiverr.com/freelancers/jerosq.
Stock footage taken from Videoblocks and Artgrid, music from Epidemic Sound, Artlist, Silver Maple and Yehezkel Raz.
Space imagery also used from NASA and ESO.

Specific image credits:
AT Service via Wikimedia for images of Kip Thorne and Bryce DeWitt.
Massachusetts Institute of Technology, via Wikimedia Commons for the image of Bruno Rossi.

00:00 Introduction.
06:00 The Block Universe.
16:25 Visiting The Future.
27:00 Visiting The Past.
37:59 Time Streams.

#wormhole #quantum

23:09

Melbet Casino Evaluation 2023 Get 20,000 Bonus In India h+ Media

Melbet Casino Evaluation 2023 Get 20,000 Bonus In India

The online gambling platform has developed quickly in the previous few years. MelBet is doubtless certainly one of the multi-platform websites that can provide you with different choices. Hence, punters could be confused as to the place to start out with their gambling journey. When it comes to esports betting, the playing site absolutely offers a novel experience. It provides more sports betting choices that youll ever find in different betting websites. Yes, Melbet accepts Indian players and Indian forex as properly.

In addition, it has extra spectacular guess sorts and decrease margins. This is probably the most admired sports self-discipline in India and that is why all high betting apps propose it of their catalogs. There are lots of prominent events to wager on such as the ICC Cricket World Cup, Ashes Series, T20 World cup as properly as a broad array of bet sorts. Melbet Casino takes buyer satisfaction critically, and you can also see this within the high quality of casino campaigns and promotions obtainable. Aside from the standard new buyer bonus, this website additionally runs weekly contests, free bets, and customer accumulators.

  • MELbet does not initially require gamers to prove their source of wealth if they need to place sports wagers such as in cricket betting.
  • You can make a bet in one click, theres a Multi-Live choice on the location, which lets you comply with several events without delay.
  • Log in to the app by clicking on the avatar and utilizing your telephone number/email and profile password.
  • Logging in to Melbet on line casino is simple even for inexperienced users.
  • With wonderful customer service and a user-friendly interface, 7Cric is the best online casino web site for Indian gamers whore in search of a top-notch gambling experience.

Nevertheless, Melbet on-line on line casino hits by its whacking nice number of video games where there are additionally conventional Indian ones. For participants to better enjoy igaming Melbet cell app is at hand. There are many excellent betting apps out there on the web which are completely protected and legal within the nation. If you wish to wager on Indian games, you should try those legal apps as a substitute of Melbet, whose legality is nonetheless in query. In such a situation, it is definitely better for a person to play and bet on an app that is legal in India. Although, lately Rajasthan Government declared interim reduction to an internet gaming web site saying that Online Gaming is not betting/gambling.

The minimal and most deposit amounts are also listed in the table. These numbers can change, primarily for the rationale that on line casino is https://bahisanalizleri.top/ the one that comes up with the figures and not the fee strategies themselves. T...

23:07

Melbet On Line Casino Evaluate h+ Media

Melbet On Line Casino Evaluate

The format of the app is in orange and black, which is quite soothing to the eyes. You can deposit the sport account utilizing your cellular gadget by way of the game account menu. [newline]Besides endless choices concerning video games, there are virtually countless bonus presents as well! Melbet accepts more than 60 fee options for users to make deposits. Some of the frequent ones include Visa, MasterCard, Bank Wire Transfer, Sticpay, Payeer, Bitcoin, Skrill, Cryptocurrencies, and many more. There is no discussion board or FAQ part provided by Melbet that can help the users get solutions to their questions. While Melbet is working onerous to rank as one of the best international casinos, its going to absolutely take a while for it to achieve that place.

Many on-line casinos run easily on cellular units and this playing web site is one of them. You can entry all MelBet on line casino on-line video games and sports betting options in your mobile browser. To ship 360-degree on line casino entertainment, MELbet hosts a variety oflive vendor casino games for Indian players. Streamed from an offsite location in HD, a live supplier on line casino offers the chance of playing your favorite slots andtable gamesin an actual reside on line casino setting.

  • The Slots section supplies for sorting slot machines by suppliers.
  • It takes considerable talent to win 15 WSOP bracelets and almost $23 million in match winnings.
  • This is a mandatory step that must be carried out to have the ability to then make a withdrawal.
  • The app presents advanced performance for users and makes sports betting quicker and simpler.
  • This ensures a totally fair recreation, which means that neither the location nor the sport can stop you from winning or losing something.

Poker is arguably one of the in style card games on the earth, not simply in India. Poker is now greater than just a strategically vital sport played in on-line casinos. It has gone by way of a quantity of phases of improvement, giving rise to its varied variations. Surprisingly, most Indian online casinos have most, if not all, variants of their games lobby. From the 2,000+ video games in our Melbet on line casino in India, there are several which are repeatedly played by our shoppers.

To begin betting in Parimatch out of your smartphone, you have to obtain our app. Two versions of the consumer for Android and iOS have been developed for mobile device customers. With these versions, you presumably can wager on cricket, kabaddi and other sports, get bonuses, use the money register and communicate with assist. And because of the user-friendly interface the app can be utilized even with one hand.

There are plenty of video games made by well-liked global suppliers. Here you can play slots of Novomatic, EGT, Pragmatic Play, Booongo, Playson, Endorphina, Microgaming, and so on. Thousands of s...

23:03

Melbet On Line Casino 2023 h+ Media

Melbet On Line Casino 2023

Register now to enjoy all the advantages of the playing home. One unique feature of Dragon Tiger is the power to play with live sellers, creating a sensible and genuine ambiance that adds an extra degree of excitement to the game. Melbet offers an exciting and fast-paced gaming expertise with its Dragon Tiger recreation, a well-liked Asian casino sport. With its simple gameplay and beautiful graphics, players can enjoy the thrill of the game from the comfort of their very own properties.

Choose a cost technique and deposit the minimal quantity required to activate the bonus. In addition, the location is licensed by the Curacao Gaming Commission (No. 8048/JAZ), which proves that every game or slot machine on the location undergoes rigorous quality control. This ensures a completely truthful sport, which implies that neither the site nor the game can stop you from profitable or dropping something. Everything is honest, and anyone who has ever tried to play at a casino is certain to win a tidy sum of cash.

  • The graphics and animations are top-notch, transporting players to a virtual casino the place the playing cards are handled precision and the stress within the air is palpable.
  • Additionally, gamers get access to VIP cashback, free spins, and jackpots.
  • Upon profitable registration and a guess with odds of at least 1.50, you will be rewarded with an thrilling Free Bet Welcome Bonus!

It is feasible for withdrawals to take wherever from 7 days to some minutes. It all is determined by how the monetary transaction is completed. Logging in to Melbet casino is straightforward even for inexperienced customers. You only need to enter your password and login to log in to your account. This data is required by the person on the time of making an account.

Terms and conditions could be barely long-winded to read via and they are often quite boring. However, there is some really important information that you should learn about it. Melbet has the most recent model of SSL encrypted software program which runs alongside the again finish of the website. It ensures that each one your private knowledge and funds are totally protected from anything dangerous online. MelBet understands the value of privateness and safety of consumer data and therefore uses robust measures to keep it protected from unauthorised access. If you are a beginner within the betting world, it is a good idea to start out with Melbet.

Melbet presents exclusive bonus provides, sportsbooks, esports, reside casino video games. Sign up at present at Melbet India and earn the opportunity to place stay bets and win real cash. Depositing money just isnt a problem anymore as Melbet additionally accepts Indian cost strategies like Paytm, UPI, and so forth. At Melbet Casino, we try to provide a first-class online gaming destination that delivers an distinctive expertise to players worldwide. Our...

23:03

Melbet India On Line Casino Evaluate h+ Media

Melbet India On Line Casino Evaluate

MPL Poker takes delight in being one of many largest and most dependable poker networks in India. We are a dedicated group of execs who put our gamers at the centre of every thing we do. As a end result, we attempt to create a poker platform that appeals to a plethora of poker players.

After that, you ought to use all the functions of Melbet bookmaker at any time and in any place. To obtain the app for Android, you want to go to the Mobile applications part on the official Melbet web site. The APK file is quite small, so it is not going to take up much space on your gadget.

To make your gambling expertise as enjoyable as possible, MelBet casino decided to work with varied software program suppliers. All on line casino recreation variations are sorted into completely different categories. You can view the out there choices by your most well-liked software or search the sport directly by typing its name.

However, to obtain this bonus its important that you just place the guess within 30 days of depositing cash into your account. Melbet is an online casino and sports activities betting platform that was founded in 2012. The company began out in the Russian market, but has since expanded to serve prospects in over 40 countries worldwide. Melbets journey to turning into a reputable on-line casino started with a focus on providing all kinds of sports betting options to customers.

  • Previously, anyone thinking about competing in giant poker tournaments had to commute to Goa.
  • It is totally legal to play poker video games for real money in India, offered that the state laws permit enjoying actual cash video games.
  • The platform also offers common promotions, including cashback bonuses and free spins.
  • It is important to review the poker classes at MPL Blog, but youll learn a lot extra should you mix this with precise enjoying time.
  • Temporary promotions are located within the section of the same name, everlasting ones are within the More section.

MelBet uses high-end know-how to protect its users information. It utilizes superior 128-bit SSL Encryption and firewall technology to supply complete safety to the customers. Yes, Melbet accepts players from India, regardless of the region you are residing in the nation. Customer assist for Melbet is obtainable both in the English language and in the Hindi language.

Payment Solutions For Deposits And Withdraw

India has been one of the most important rising markets in recent years, with a inhabitants of over 1.three billion folks, a lot of whom are active pc and smartphone users. It ought to be talked about that OFC poker is often played with four folks, although it might even be performed with as little as two or three gamers. Open-Face Chinese poker differs from different poker variations since it doesnt adhere to any of the usual sport patterns...

23:01

Melbet India Casino Review 2023 Bonus Eight, h+ Media

Melbet India Casino Review 2023 Bonus Eight,

Melbet offers a self-test questionnaire as well for patrons to evaluate if their spending goes out of hand. Please ensure to ask your self these questions once in a while to play safe and addiction-free. Melbet has its Customer Service doorways thrown open 24 hours a day for the convenience of the gamers. There is an online consultant service on the website itself to help users with issues. Like we already talked about, Melbet is the place for sports fanatics.

All personal and fee data you enter in the utility is encrypted and saved on safe databases. This ensures that theres nearly no risk of leakage. All actions through pages and sections in the software are carried out in a single window.

The same amount of withdrawal strategies can be found as there are for deposit methods. Once again, we extremely counsel that you just select a payment methodology that youve got got used earlier than and that youre conversant in. If youre not conversant in any, then we highly recommend you do some research and skim via the phrases and conditions first. Melbet claimed that their deposits are prompt from the second they go away your private bank account to the second that they hit your casino account. However, be sure to have a good Wi-Fi and sign connection, in any other case, this might slow down the process.

The progressive jackpot part is price exploring if youre on the lookout for bigger banks. This section features a variety of the largest payouts in on-line playing when you can hit a winning mixture, theres a good probability that your payout will be quite excessive. [newline]The basketball line at Melbet is one of the most exceptional. Here yow will discover bets on the matches of the NBA and Euroleague and more exotic championships. The listing of available markets can be spectacular it includes bets on the whole, handicaps, individual players performance, and far more.

Players can get of their cash and out of the on line casino quickly utilizing e-wallets, and there are not any costs by the on line casino. Also, the cost solutions are internationally recognized, with local options that are fast and suitable for Indian gamers. You can access the website on mobile by way of Android, Windows and iOS devices and run the games via an online browser without glitches. This choice needs no obtain, however an app can be utilized for quick gaming when you prefer a dedicated consumer. The casino has a 24/7 reside chat to attend to customer issues, and there is a telephone and e mail service as properly. Players love the casinos vast sports activities betting choice and its thriving live casino option.

  • You can even play other attention-grabbing video games like Killer Clubs and Card Odds, Solitaire or African Roulette.
  • Still, the browser-based model has a number of differences from the downloadable apps.
  • But the...

23:00

Melbet Casino Evaluate h+ Media

Melbet Casino Evaluate

In the Bingo game, players can choose their preferred variety of playing cards and adjust the guess size to suit their preferences. The sport options a big selection of completely different patterns and profitable combinations, with the potential for giant payouts and thrilling bonuses. With multiple variations out there, gamers can select their most popular type of gameplay. Overall, blackjack presents a thrilling and entertaining gaming experience with the potential for large wins. Its a must-try for anybody trying to enjoy the pleasure of the Melbet casino from the comfort of their very own house. The graphics and animations are top-notch, transporting players to a digital casino where the playing cards are handled precision and the tension in the air is palpable.

The app is free to download and you can log in and deposit with one click of a button and start taking half in your favorite video games no matter where you may be. No, the gaming options of the cellular and desktop variations of the software program are the identical. From a smartphone you can wager on the matches of the same sport, play the same on line casino slots and the same supplier video games as from a personal laptop. It may be troublesome for Indian gamers to discover a site where they really feel comfy inserting bets for live casino play. Although the MELbet live choice is on the small side, its still large sufficient for any person to enjoy.

If you created your account a minimum of a month before your birthday and paid a minimum of a hundred euros during this time, you could be rewarded with 20 free spins. Members solely offer Next, weve one other provide that you will certainly need to try. MELbet gives each consumer a special token of appreciation if they log into their account either on their birthday or within seven days. The casino presents you with 20 free spins that you have to use on any sport. This date coincides with the rising rise within the recognition of internet casinos. Since this time, MELbets game library has grown substantially.

  • The interface is minimalistic, laconic, and easy to use, even for beginners.
  • The design of the app is dominated by the colours grey, green and yellow.
  • At MPL Poker, you presumably can play all of your favourite poker video games with hundreds of other players 24/7.
  • MMA has turn into one of the most popular sports activities in latest times.
  • Complete your round and your free bets might be awarded 24 hours later.

Many online casinos run easily on cellular gadgets and this playing site is considered one of them. You can entry all MelBet casino on-line video games and sports activities betting choices on your cellular browser. To ship 360-degree on line casino leisure, MELbet hosts a variety oflive supplier casino video games for Indian players. Streamed from an offsite location in HD, a stay dealer...

22:56

Database Company MariaDB Makes Cuts to Headcount but Has Financial Concerns SoylentNews

New CFO sees interesting in-tray at 20 percent year-on-year growth database company:

Database vendor MariaDB has cut a number of jobs and reiterated a "going concern" warning over its medium-term financial viability.

In a statement to the stock market [PDF] late last month, the company, which floated on the New York Stock Exchange at the end of 2022, said it was reducing its headcount by 26 "to achieve cost reduction goals and to focus the Company on key initiatives and priorities."

In December, CEO Michael Howard told The Register the company was looking to hire more people following $104 million in funding and $18 million through private investment in public equity through the special purpose acquisition company that enabled the flotation.

Although the job losses may be a fraction of the reported 340 people the company employs, other details in the filing may highlight further cause for concern over its financial viability.

It includes a mention of MariaDB's February 10Q warning that the company's current cash and cash equivalents "would not be sufficient to fund our operations, including capital expenditure requirements for at least 12 months from... February 13, 2023, raising substantial doubt about our ability to continue as a going concern."

The March 24 statement said it anticipated that the money raised by database subscriptions and services would not be enough to meet its projected working capital and operating needs. "We are currently seeking additional capital to meet our projected working capital, operating, and debt repayment needs for periods after September 30, 2023 ... Going forward, we cannot be certain when or if our operations will generate sufficient cash to fully fund our ongoing operations or the growth of our business," it says.

Read more of this story at SoylentNews.

22:38

The Linux Kernel Preparing For An Upgrade To Its Rust Toolchain Phoronix

Linux kernel developers are preparing for the first upgrade to its Rust toolchain since the Rust code initially merged in Linux 6.1...

22:34

EFF Takes Money From US Nazis to Speak for Prostitutes and Frame Privacy (or Net Liability) as a Sex Issue Techrights

How is this man even remotely compatible with the EFFs original mission? Sciencewash as a revenue model?

Alfred Pritchard Sloan, Jr. history

Fixing the net for prostitution:

Fixing the net for sex

Thanking Alfred Pritchard Sloan, Jr.:

Fixing the net

Thanking Alfred Pritchard Sloan, Jr. yet again:

Thanking Alfred Pritchard Sloan, Jr.

Summary: The EFF is becoming more about sex than about digital rights, based on yesterdays podcast (two blog posts about it, with the episodes distributed through centralised, proprietary platforms with DRM). Does the EFF really want to frame privacy activism as fighting for prostitutes (Safer Sex Work Makes a Safer Internet)? The people who took control of the EFF canceled a co-founder because of an alleged sex scandal (he wasnt the first) and the EFF now produces shows with prostitutes as experts in them. This helps stigmatise privacy advocates. The EFF has been in the red (losses), probably for the first time in its history, for several years now. When the original founder ran it they fought against power and raised money from members. Now its run by billionaires, gives awards to Microsofters, and gives a voice to people who promote prostitution. The above shows the EFF repeatedly thanking Alfred P. Sloan Foundation (Lets take a quick moment to say thank you to our sponsor. How to Fix the Internet is supported by The Alfred P. Sloan Foundation and then again towards the end; screenshots above). Does the EFF know or care that General Motors under Alfred P. Sloan helped the Nazis? This isnt the first example of EFF acting as a front for billionaires, or the powerful ins...

22:22

Nouveau Using The NVIDIA GSP Will Lead To More Firmware Bloat Phoronix

The upstream, open-source Nouveau DRM kernel driver working to make use of the NVIDIA GPU System Processor "GSP" will ideally lead to more punctual new hardware support, hopefully overcome the power management / re-clocking challenges that have plagued the driver for years with very low performance, and other current limitations. But it will also lead to more NVIDIA GPU firmware files in the linux-firmware tree and increased bloat...

21:29

Uncovering (and Understanding) the Hidden Risks of SaaS Apps The Hacker News

Recent data breaches across CircleCI, LastPass, and Okta underscore a common theme: The enterprise SaaS stacks connected to these industry-leading apps can be at serious risk for compromise. CircleCI, for example, plays an integral, SaaS-to-SaaS role for SaaS app development. Similarly, tens of thousands of organizations rely on Okta and LastPass security roles for SaaS identity and access

21:28

Pakistani Hackers Use Linux Malware Poseidon to Target Indian Government Agencies The Hacker News

The Pakistan-based advanced persistent threat (APT) actor known as Transparent Tribe used a two-factor authentication (2FA) tool used by Indian government agencies as a ruse to deliver a new Linux backdoor called Poseidon. "Poseidon is a second-stage payload malware associated with Transparent Tribe," Uptycs security researcher Tejaswini Sandapolla said in a technical report published this week.

21:24

Whats really going on with Ghostwriter and the AI Drake song? Lifeboat News: The Blog

Either the great copyright battle pitting the record industry against generative artificial intelligence has begun or someones clout-chasing AI headlines.

The generative AI music hype train only needed about 48 hours to go from oh, thats interesting to full Balenciaga pope territory, and while its clear someone is using the technology to run a scheme, were still not sure who it is.

Heres the short version:


Something doesnt make sense.

21:24

Forty years in the making: Advanced MRI scan reveals brain images 64 million times sharper Lifeboat News: The Blog

After four long decades of persistence, scientists have improved the resolution of the humble magnetic resonance imaging (MRI) scan.

Using the advanced MRI version, they created the most detailed image of a mouse brain, revealing microscopic details of the biological structure.

21:23

New chip on the block: Broadcoms Jericho3-AI can connect up to 32,000 GPU chips Lifeboat News: The Blog

The new chip can wire together supercomputers for artificial intelligence networks.

American semiconductor manufacturing company Broadcom Inc. has released a new chip Jericho3-AI, which is being touted by the company as the highest-performance fabric for artificial intelligence (AI) networks. The new chip will wire together supercomputers.


G0d4ather/iStock.

Jericho3-AI is packed with features like improved load balancing which ensures maximum network utilization under the highest network loads, congestion-free operation which implies no flow collisions and no jitter, high radix which allows Jericho3-AI to connect to 32,000 GPUs collectively, and Zero-Impact Failover ensuring sub-10ns automatic path convergence. All of this would lead to cutting down on the job completion times for AI workload.

21:23

Critical Flaws in vm2 JavaScript Library Can Lead to Remote Code Execution Lifeboat News: The Blog

A fresh round of patches has been made available for the vm2 JavaScript library to address two critical flaws that could be exploited to break out of the sandbox protections.

Both the flaws CVE-202329199 and CVE-202330547 are rated 9.8 out of 10 on the CVSS scoring system and have been addressed in versions 3.9.16 and 3.9.17, respectively.

Successful exploitation of the bugs, which allow an attacker to raise an unsanitized host exception, could be weaponized to escape the sandbox and run arbitrary code in the host context.

21:22

OpenAIs CEO Says the Age of Giant AI Models Is Already Over Lifeboat News: The Blog

Sam Altman says the research strategy that birthed ChatGPT is played out and future strides in artificial intelligence will require new ideas.

21:22

Google says its AI developed unexpected skills Lifeboat News: The Blog

Google CEO Sundar Pichai said the companys experts call this aspect of AI a black box.

21:22

A defence of human uniqueness against AI encroachment, with Kenn Cukier Lifeboat News: The Blog

Despite the impressive recent progress in AI capabilities, there are reasons why AI may be incapable of possessing a full general intelligence. And although AI will continue to transform the workplace, some important jobs will remain outside the reach of AI. In other words, the Economic Singularity may not happen, and AGI may be impossible.

These are views defended by our guest in this episode, Kenneth Cukier, the Deputy Executive Editor of The Economist newspaper.

For the past decade, Kenn was the host of its weekly tech podcast Babbage. He is co-author of the 2013 book Big Data, a New York Times best-seller that has been translated into over 20 languages. He is a regular commentator in the media, and a popular keynote speaker, from TED to the World Economic Forum.

21:00

That Drone Up in the Sky? It Might be Built Out of a Dead Bird Hackaday

In a lot of ways, it seems like were in the plateau of productivity part of the hype cycle when it comes to drones. UAVs have pretty much been reduced to practice and have become mostly an off-the-shelf purchase these days, with a dwindling number of experimenters pushing the envelope with custom builds, like building drones out of dead birds.

These ornithopomorphic UAVs come to us from the New Mexico Insitute of Mining and Technology, where [Mostafa Hassanalian] runs the Autonomous Flight and Aquatic Systems lab. While looking into biomimetics, [Dr. Hassanalian] hit upon the idea of using taxidermy birds as an airframe for drones. He and his team essentially reverse-engineered the birds to figure out how much payload theyd be able to handle, and added back the necessary components to make them fly again.

From the brief video in the tweet embedded below, its clear that theyve come up with a huge variety of feathered drones. Some are clearly intended for testing the aerodynamics of taxidermy wings in makeshift wind tunnels, while others are designed to actually fly. Propulsion seems to run the gamut from bird-shaped RC airplanes with a propeller m...

20:45

AMDVLK 2023.Q2.1 Brings Mesh Shaders, Several New Vulkan Extensions Phoronix

AMD has published AMDVLK 2023.Q2.1 as their first official open-source Vulkan driver update for the quarter that for Linux users serves as an alternative to the Mesa RADV driver or the code bundled up into their Radeon Software packaged driver...

20:29

Godot 4.1 Planning For More Renderer Improvements, AMD FSR 2.2 Phoronix

While the Godot 4.0 open-source game engine only shipped at the start of March, there are already plans underway for some renderer upgrades that will be part of the upcoming Godot 4.1 engine upgrade...

20:17

GCC 13.1 RC1 Released For Testing Out New CPU Targets, Modula-2, Early Rust Code Phoronix

As expected following the GCC 13 release branching this week, the first release candidate of what will be the premiere GCC 13.1 stable release is now available...

20:13

SpaceX Starship Launch Countdown to Thursday SoylentNews

SpaceX Starship launch countdown: all of the news on its first test flight:

Elon Musk's stated goal of putting humans on Mars relies heavily on the development of a next-generation reusable spacecraft, and Starship (formerly known as Big Falcon Rocket or BFR) is ready for its first orbital test flight. It's not the "six months" goal Musk projected in 2019, but after a number of suborbital tests that included some terrific successes and fantastic, fiery failures, the big day is finally almost here.

With just over five minutes to go before its first scheduled launch attempt Monday morning, SpaceX announced that due to a pressurization issue with the first stage, the attempt became a "wet dress rehearsal," and the countdown ended with 10 seconds to go. SpaceX now says it's targeting April 20th for another attempt, with a launch window between  8:28AM CT (9:28AM ET) and 9:30 AM CT (10:30AM ET).

If all goes according to plan, the Starship will fly to orbital velocity after separating from its Super Heavy booster rocket about three minutes into the trip, then splashdown in the Pacific Ocean near Hawaii.

The entire trip should take about 90 minutes to complete, and SpaceX is livestreaming the events on its YouTube channel.

Previously: SpaceX's First Orbital Test Flight of Starship Imminent [Scrubbed]


Original Submission

Read more of this story at SoylentNews.

20:01

HCC Wants To Make It Easy To Run C11 Code On GPUs Phoronix

The Hero C Compiler "HCC" wants to make it easy to compile C code to run on GPUs by compiling common C11 code and turning it into SPIR-V modules that can then be consumed by GPUs with Vulkan support...

20:00

Modeling Electric Motors and Drivetrains IEEE Spectrum



There has been an exponential increase in the demand for electric vehicles, with hybrid and electric cars expected to account for a considerable portion of car sales in the near future. Designing efficient motors is critical for increasing range, reducing battery capacity requirements, and improving power density and costs.

Register now to attend this free webinar.


To accomplish such design, using multiphysics modeling and simulation is essential. COMSOL Multiphysics and the add-on AC/DC Module and Battery Design Module provide various features for modeling different types of electric motors and drivetrain components. The software has the capability to capture the multiple interacting physics involved in motors, such as electromagnetics, thermal effects, fluid mechanics, and structural mechanics. COMSOL Multiphysics also offers powerful optimization techniques that help to accelerate product development time.

We invite you to attend this webinar. You will learn more about these topics and see how COMSOL Multiphysics can be used in electric motor and drivetrain R&D.

19:52

Iran-linked Mint Sandstorm APT targeted US critical infrastructure Security Affairs

An Iran-linked APT group tracked as Mint Sandstorm is behind a string of attacks aimed at US critical infrastructure between late 2021 to mid-2022.

Microsoft has linked the Iranian Mint Sandstorm APT (previously tracked by Microsoft as PHOSPHORUS) to a series of attacks aimed at US critical infrastructure between late 2021 to mid-2022.

The IT giant reported Mint Sandstorm is refining its tactics, techniques, and procedures (TTPs). The group rapidly weaponized N-day vulnerabilities in popular enterprise applications by using publicly disclosed POCs. Mint Sandstorm also used custom tools in selected targets, notably organizations in the energy and transportation sectors.

Mint Sandstorm targets both private and public organizations, including political dissidents, journalists, activists, the Defense Industrial Base (DIB), and employees from multiple government agencies, including individuals protesting oppressive regimes in the Middle East.  The activity associated with the Mint Sandstorm group overlaps with public reporting on groups known as APT35, APT42, Charming Kitten, and TA453.

Microsoft assesses that Mint Sandstorm is associated with an intelligence arm of Irans military, the Islamic Revolutionary Guard Corps (IRGC), an assessment that has been corroborated by multiple credible sources including MandiantProofpoint, and SecureWorks. reads the report published by Microsoft. In 2022, the US Department of Treasury sanctioned elements of Mint Sandstorm for past cyberattacks citing sponsorship from the IRGC.

Microsoft states that from late 2021 to mid-2022, the Mint Sandstorm subgroup launched a series of attacks against US critical infrastructure, including seaports, energy companies, transit systems, and a major US utility and gas entity. The attacks were conducted as a retal...

19:48

Re: CVE-2022-47501: Apache OFBiz: Arbitrary file reading vulnerability Open Source Security

Posted by Jacques Le Roux on Apr 19

Hi Seth,

As I guess you know, the ASF has many (350+) projects: https://projects.apache.org/
OFBiz is only one of these projects. An "old" one, IIRW it was the 26th to get in.

I say that because we have our own security team.
Yet, all projects are overseen and especially helped by the ASF security team for security matter.
In other words we (projects) all share the experience and expertise of the ASF security team.

So I must add that...

19:45

Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution Open Source Security

Posted by nightmare . yeah27 on Apr 19

Another (simpler?) way is to fork before giving up privilege.

19:43

[kubernetes] CVE-2023-1174, CVE-2023-1944: Network port exposure and ssh access using default password Open Source Security

Posted by Vellore Rajakumar, Sri Saran Balaji on Apr 19

Hello Kubernetes Community,

We have released minikube v1.30.0<https://github.com/kubernetes/minikube/releases/tag/v1.30.0> to address two security
issues in minikube. We recommend all to upgrade minikube to the created with an affected version. Minikube is a utility tool that sets up a Kubernetes environment on a local machine
for developing and testing Kubernetes applications. Minikube...

19:41

Re: CVE-2023-27602: Apache Linkis publicsercice module unrestricted upload of file Open Source Security

Posted by peacewong on Apr 19

Hi Seth Arnold,
Thank you for your reply, I will modify the content according to the
process

Best Regards,
Peace Wong

Seth Arnold <seth.arnold () canonical com> 2023418 09:27

19:30

U.S. and U.K. Warn of Russian Hackers Exploiting Cisco Router Flaws for Espionage The Hacker News

U.K. and U.S. cybersecurity and intelligence agencies have warned of Russian nation-state actors exploiting now-patched flaws in networking equipment from Cisco to conduct reconnaissance and deploy malware against select targets. The intrusions, per the authorities, took place in 2021 and targeted a small number of entities in Europe, U.S. government institutions, and about 250 Ukrainian victims

18:05

Researchers discover sensitive corporate data on decommissioned routers Help Net Security

Looking at configuration data, 56% of decommissioned routers disposed of and sold on the secondary market contained sensitive corporate data, according to ESET. Of the networks that had complete configuration data available: 22% contained customer data 33% exposed data allowing third-party connections to the network 44% had credentials for connecting to other networks as a trusted party 89% itemized connection details for specific applications 89% contained router-to-router authentication keys 100% contained one or more of More

The post Researchers discover sensitive corporate data on decommissioned routers appeared first on Help Net Security.

18:00

Little Twitter Game Boy Wont Work Now the API Is Dead Hackaday

Twitter, like many social networks, used to feature a useful API. This let people do fun things like create toasters that could automatically post breaderly updates, or even load Twitter posts on machines that couldnt handle full-fat websites. That API is now history, but [NEKOPLA] used it for a cute Game Boy-like Twitter device in its dying days earlier this year.

...

17:32

Upgrade Your LUKS Key Derivation Function SoylentNews

mjg59 | PSA: upgrade your LUKS key derivation function:

Many Linux users rely on LUKS for their disk encryption but perhaps they need to pay a bit more attention to it. If the disk was encrypted more than a few years ago (LUKS Version 1) it appears that it might not be secure enough to withstand a concerted attack. It is time to check whether you are using Version 2, and if not the fix takes a few minutes. [JR]

Here's an article from a French anarchist describing how his (encrypted) laptop was seized after he was arrested, and material from the encrypted partition has since been entered as evidence against him. His encryption password was supposedly greater than 20 characters and included a mixture of cases, numbers, and punctuation, so in the absence of any sort of opsec failures this implies that even relatively complex passwords can now be brute forced, and we should be transitioning to even more secure passphrases.

Or does it? Let's go into what LUKS is doing in the first place. The actual data is typically encrypted with AES, an extremely popular and well-tested encryption algorithm. AES has no known major weaknesses and is not considered to be practically brute-forceable - at least, assuming you have a random key. Unfortunately it's not really practical to ask a user to type in 128 bits of binary every time they want to unlock their drive, so another approach has to be taken.

This is handled using something called a "key derivation function", or KDF. A KDF is a function that takes some input (in this case the user's password) and generates a key. As an extremely simple example, think of MD5 - it takes an input and generates a 128-bit output, so we could simply MD5 the user's password and use the output as an AES key. While this could technically be considered a KDF, it would be an extremely bad one! MD5s can be calculated extremely quickly, so someone attempting to brute-force a disk encryption key could simply generate the MD5 of every plausible password (probably on a lot of machines in parallel, likely using GPUs) and test each of them to see whether it decrypts the drive.

Read more of this story at SoylentNews.

17:08

Movie & TV Show Piracy Sites Disappear in Wake of ACE/MPA DMCA Subpoenas TorrentFreak

mystery-sWhile some anti-piracy groups focus on taking content down, others prefer to take entire sites down.

The benefits of the latter approach are obvious; when a site no longer exists, the need to send future takedown notices is eliminated. Its also much more easily said than done but certainly not impossible.

The Alliance for Creativity and Entertainment has taken down hundreds of sites, and its often possible to predict which sites are about to feel the heat. DMCA subpoenas obtained at courts in the United States compel intermediaries to hand over details of pirate site operators, and since the applications are public, the names of sites are public too.

A series of recent applications revealed ACE attempting to gain information on The Pirate Bays operators but other sites were mentioned too. Despite having millions of monthly visitors, two of them have just disappeared into thin air.

Bulgarian Exodus

Over the past several days, at least four pirate sites with a focus on Bulgaria disappeared without warning. According to SimilarWeb data, Filmisub.com was the largest with around 7.8 million visits per month.

filmisub-ss1

Filmisub specialized in streaming movies and TV shows. From its apparently large selection, ACE/MPA complained about just one (Shaft) but that was enough to get Cloudflare to hand over the operators details. Of the four sites confirmed to have gone offline, Filmisub is the only one to have left any kind of message.

The site is permanently closed. It will never work again in any form whatsoever, it announced before disappearing offline.

17:00

Serfs, Sluts, the BIG Man and governance Terra Forming Terra

 


This is a snapshot of the antique world that we all came from in which Big Man rules made things up as they went along.  This is deeply supressed in the developed world, but is still out there wherever muscle can be used to force folks to cooperate.

It is also the fundamental source of all poverty.  It is why we push the natural community of 150 individuals and the rule of twelve.  A community is unlikely to allow a single individual to rule the roost.

This can be all around you and you can remain oblivious.

Serfs, Sluts, the BIG Man and governance


 Slaves and Serfs: Guatemala's 'Occupied' Bodies

GUATEMALA/25 OCT 2012 BY ALEJANDRA GUTIERREZ VALDIZAN*EN




Organized crime networks dedicated to human trafficking have had a great deal of time to perfect their system and ally themselves with new players in Guatemala, including drug traffickers. Small criminal structures exploit indigenous women, trafficking them from rural areas to the capital. Dozens, maybe even hundreds, of women are trafficked from other countries to Guatemala by larger criminal organizations. Sexual exploitation -- in a country with high crime rates, a woeful human rights record and a judicial system that is only just starting to recognize it as a crime -- is flourishing.

[See the complete special report by Plaza Publica in Spanish here.]
Her Body is Her Body

In the nameless bar everything is a little grim, a little dirty, a little sad. A little like a funeral. One of...

No One Can Explain Why Planes Stay in the Air Terra Forming Terra



Turns out that our theory, although quite handy is just a place to hang our data on and fails all over.  The mere fact that we can flip a plane over and maintain lift is impossible.  Or close enough to hang bernoilli anyway.

What we now bring to the table is our robust concept of a three staged ether made up on Neutal Neutron pairs, neutral electrons pairs and really neutral neutrino pairs.  These can all be packed far better than expected and otherwise dragless.  this is a diffderent working fluid unlike any we have ever encountered.

This does mean that our airfoils are also current guides.

Add in that around 200 MPH, just about everything develops positive lift.  Most of our advanced planes today are flying bricks.  Real mechanical gliding is a thing well under 200 MPH.

Is it possible that at high speeds that our surface induces a high frequency triggering a change in gravitational effect?  We certainly have current flow exterior to the foil.  A standing wave inside the foil could shift the contained gravity containing NNPs.

This is novel but we already have the phenomina to think about.  It actually makes sense that it would show up here and be confused as an extension of mechanical gluide action.


No One Can Explain Why Planes Stay in the Air


Do recent explanations solve the mysteries of aerodynamic lift?



Ed Regis



Photo by CSA Images/Getty Images

...

Possession Is Nine Tenths of Your Soul Terra Forming Terra



Nice tale here, but it is not really true. Everything we think we own is true only until our deaths and that is the rub.  Owning any asset class except human labor has a negative cash flow until a human being is vested in its successful operation.

We have several protocols that allow capitalization and potential successful operation.  We actually need to sort out othgers as well.

not least the real natural community supported by fiat credit and managed with the Rule of Twelve.

Possession Is Nine Tenths of Your Soul

Global Research, April 06, 2023
Theme: History
https://www.globalresearch.ca/possession-nine-tenths-your-soul/5815062


***

The entire Earth is haunted by a specter, the specter of the complete possession of the human and the natural worlds by a band of unaccountable overlords. Those self-appointed global rulers, the billionaires, supported by the politicians and public intellectuals that they play with for sport, have carved out for themselves a separate reality where within they make up new rules for governance, local, national, and global, and then pass those rules down to us.

Central to this project is the radical alteration of the concept of possession....

No Hope for Ukraine: Losing Artillery = Losing the War Terra Forming Terra


After all is said and done, i do think  that mys original take is turning out correctly.  The russian grand strategy was to walk in and establish the new borders first and then reinforce until the lines became vsecure while wearing down Ukraine capability and resolve.

There is obviously no creditable Ukrainian arms industry producing shells.  russia can and will and have decades of warehoused shells as well.  This is still a small drain for them.

This means continuing losses of Ukranian material on the line and a real end to their war making capability.  what is certain is that NATO will not ever dip into their real war stocks as that would put NATO at risk.

We are now seeing the cracks form while Russia stands still and slowly forces Bahmut.  Russia achieved their strategic war aims almost immediately.  what is left is forcing the Ukranian government to actually accept what is on the table for them.
...

No Hope for Ukraine: Losing Artillery = Losing the War

Ukraine is running out of tanks, Russia has fortified its frontline and has got plenty of troops to hold every centimeter.


Global Research, April 10, 2023

...

16:47

CVE-2023-2124: OOB access in the Linux kernel's XFS subsystem Open Source Security

Posted by Kyle Zeng on Apr 18

Hi there,

We recently found a slab OOB access bug in the Linux kernel's XFS
subsystem. It can cause denial-of-service and potentially privilege
escalation.

The root cause of the bug is a missing metadata validation when
mounting a user-supplied XFS disk image. More specifically, in a
corner case where there is a dirty log with a buffer log item for an
AGF and the on-disk buffer appears to be newer, XFS will discard the
old dirty log and...

16:42

Iranian Government-Backed Hackers Targeting U.S. Energy and Transit Systems The Hacker News

An Iranian government-backed actor known as Mint Sandstorm has been linked to attacks aimed at critical infrastructure in the U.S. between late 2021 to mid-2022. "This Mint Sandstorm subgroup is technically and operationally mature, capable of developing bespoke tooling and quickly weaponizing N-day vulnerabilities, and has demonstrated agility in its operational focus, which appears to align

15:45

Just Because Fox News Lost (or Settled) Doesnt Mean Voting Machines Are Safe or Acceptable Techrights

Straw man arguments can undermine democracy, too

President_John_F._Kennedy_Visits_with_Rupert_Murdoch,_Publisher_of_News_Ltd._of_Australia
Murdoch (right) with President John F. Kennedy and Zell Rabin in the Oval Office in 1961

Summary: Straw man arguments for voting machines or against critics of these will become ubiquitous in days to come; its important to distinguish between the disinformation from Rupert Murdochs media apparatus and the actual science (many distinguished scientists have long warned against voting machines, more so proprietary ones)

So, as noted in Daily Links (much more on this later), Dominion won a case against a very soft target (Rupert Murdoch, serial fabricator), but voting machines must still be avoided, criticised, and generally protested against. Pseudo-liberal media will be missing the point, as usual, instead stigmatising critics and sceptics of voting machines as "Nazis".

We are seeing many cautionary tales right now in Russia and in China.We kindly ask people not to fall for it. There are many perfectly legitimise reasons to avoid voting machines. When I vote here a few days from now itll involve only paper, a pencil, and a physical box with a hole in it. That works. No reason/s to give a large contract to some tech company. Many other things in modern society are being turned into a computer for no good, pragmatic/practical reasons. They use buzzwords like digitalisation, but the agenda is multi-faceted and potentially very dangerous. It gives very few people far too much control (top-down control by centralisation and consolidation of authority). Thats potentially devastating to democracy. We are seeing many cautionary tales right now in Russia and in China.

15:24

PWNYOURHOME, FINDMYPWN, LATENTIMAGE: 3 iOS Zero-Click exploits used by NSO Group in 2022 Security Affairs

Citizen Lab reported that Israeli surveillance firm NSO Group used at least three iOS zero-click exploits in 2022.

A new report from Citizen Lab states that the Israeli surveillance firm NSO Group used at least three zero-click zero-day exploits to deliver its Pegasus spyware.

In 2022, the Citizen Lab analyzed the NSO Group activity after finding evidence of attacks on members of Mexicos civil society, including two human rights defenders from Centro PRODH, which represents victims of military abuses in Mexico.

The researchers discovered that in 2022, NSO Group customers used at least three iOS 15 and iOS 16 zero-click exploit chains against civil society targets worldwide.

One of the iOS zero-click used in 2022, called by Citizen Lab PWNYOURHOME, was used against iPhones running iOS 15 and iOS 16 starting in October 2022. The researchers believe PWNYOURHOME is a novel two-step zero-click exploit. The first step targets the HomeKit process, while the second step targets iMessage.

Another zero-click exploit dubbed FINDMYPWN was used by the surveillance firm against iOS 15 since June 2022. FINDMYPWN is a two-step exploit that targets the iPhones Find My feature and the step targets iMessage.

Another two-step exploit, which targets the Find My feature and iMessage, has been dubbed FindMyPwn. This zero-click exploit has been used against iPhones running iOS 15 since at least June 2022. 

The third zero-click exploit discovered by Citizen Lab is LATENTIMAGE, it was found on a single targets phone and experts believe it was the first new exploit used by NSO Group in 2022.

Further analysis yielded additional indicators, which were then applied to analyze additional devices in the global pool of 2022 Pegasus victims to uncover more details about NSO Groups 2022 exploits. reads the report. These indicator overlaps allow us to attribute the 2022 zero-click chains to NSO Groups Pegasus spyware with high confidence. Overall, we believe NSO Group deployed at least three zero-click chains in 2022 (Figure 2), exploiting a variety of apps and features on the iPhone. We have observed cases of some of the chains deployed as zero-days against iOS versions 15.5 and 15.6 (FINDMYPWN), and 16.0.3 (PWNYOURHOME).

...

15:00

Old Czech Telephone Teardown Is Beautiful Purposeful Art Hackaday

The 20th century saw everything from telephones to computers become mainstream. Many of these devices were beautifully designed in the mid-century period, something thats hard to say about a lot of todays cheaper technology. [John Graham-Cumming] has shown us one exquisite example, with his teardown of a simple Czech telephone.

...

Horror Stories Looking for Jobs as a Free Software Programmer/Advocate (Recruiters Who Force Free Software and FSF People to Create a Microsoft Account) Techrights

Video download link

Summary: The above LibrePlanet talk is a physical presence/panel talk* about [f]inding a job while caring about free software; it was uploaded by the FSF** 8 hours ago; From the official page: A panel of people who care about software freedom, and have have somewhat recently gone through a job search. They will discuss and share their experience, offer some advice, and involve the audience. There is a vast array of ways to advance free software while looking after your finances, but in this talk, our focus will be on finding employment doing technical work and issues encountered there. For example: How much conflict with free software values do you accept in a company and for what price? What about ethical differences between your individual work vs the employers overall business model?

Licence: CC BY SA 4.0
________
* framatube.org (PeerTube platform for FSF) has this channel too, in case MediaGoblin is down. The FSF seriously under-provisioned MediaGoblin for these new videos. Now the site goes up and down (mostly down) and it makes MediaGoblin look bad.

** Talk by Ian Kelling, Rubn Rodrguez Prez, and Amin Bandali.

15:00

5 free online cybersecurity resources for small businesses Help Net Security

As cyberattacks increase in frequency and sophistication, small and medium-sized businesses (SMBs) become more vulnerable to cyber threats. Unlike larger enterprises, SMBs often lack the financial and technical resources to secure their networks and data against malicious actors effectively. With limited budgets and IT staff, many small companies are forced to make difficult decisions about where to allocate their resources. Fortunately, several free online cybersecurity resources can help small businesses protect themselves from cyber attacks. More

The post 5 free online cybersecurity resources for small businesses appeared first on Help Net Security.

14:53

Critical Flaws in vm2 JavaScript Library Can Lead to Remote Code Execution The Hacker News

A fresh round of patches has been made available for the vm2 JavaScript library to address two critical flaws that could be exploited to break out of sandbox protections and achieve code execution. Both the flaws  CVE-2023-29199 and CVE-2023-30547  are rated 9.8 out of 10 on the CVSS scoring system and have been addressed in versions 3.9.16 and 3.9.17, respectively. Successful exploitation of

14:44

Open Source Bodies Say to EU that Cyber Resilience Act Could Have 'Chilling Effect' on Software SoylentNews

The proposed legislation also poses 'an unnecessary economic and technological risk to the EU':

More than a dozen open source industry bodies have published an open letter asking the European Commission (EC) to reconsider aspects of its proposed Cyber Resilience Act (CRA), saying it will have a "chilling effect" on open source software development if implemented in its current form.

Thirteen organizations, including the Eclipse Foundation, Linux Foundation Europe, and the Open Source Initiative (OSI), also note that the Cyber Resilience Act as its written "poses an unnecessary economic and technological risk to the EU."

The purpose of the letter, it seems, is for the open source community to garner a bigger say in the evolution of the CRA as it progresses through the European Parliament.

The letter reads:

We write to express our concern that the greater open source community has been underrepresented during the development of the Cyber Resilience Act to date, and wish to ensure this is remedied throughout the co-legislative process by lending our support. Open source software represents more than 70% of the software present in products with digital elements in Europe. Yet, our community does not have the benefit of an established relationship with the co-legislators.

The software and other technical artefacts produced by us are unprecedented in their contribution to the technology industry along with our digital sovereignty and associated economic benefits on many levels. With the CRA, more than 70% of the software in Europe is about to be regulated without an in-depth consultation.

[...] Penalties for non-compliance may include fines of up to 15M, or 2.5% of global turnover.

Read more of this story at SoylentNews.

14:30

Security beyond software: The open source hardware security evolution Help Net Security

Mention IT security, and most people immediately think of software-based protections against software-based threats: ransomware, viruses, and other forms of malware. But recognition of the importance of hardware securityupon which all software security is builtis (thankfully) also growing. Established hardware security standards such as Secure Boot and Trusted Platform Module (TPM) ensure that computer systems arent tampered with or get compromised during bootup. Hardware-based encryption is widely used to protect data on hard drives and More

The post Security beyond software: The open source hardware security evolution appeared first on Help Net Security.

14:14

[Meme] We May Never Know What Bill Gates Paid Sirius Boss to Do in 2019 (Under a Strict Non-Disclosure Agreement) Techrights

Be my babe, Sirius

Mark Anthony Taylor: I love you, Bill; Bill Gates Don't mention this to anybody. You signed an NDA.

Summary: As last explained yesterday, Sirius signed a secret deal with the Gates Foundation and never mentioned what it was for or what it was all about (an NDA had been signed); as far as workers can tell, no actual work was done

14:00

Ransomware reinfection and its impact on businesses Help Net Security

Destructive ransomware attacks impact enterprises, governments, airlines, hospitals, hotels, and individuals, causing widespread system downtime, economic loss, and reputational damage. In this Help Net Security video, AnnMarie Nayiga, Lead MDR Analyst at Malwarebytes, talks about the dangers of ransomware reinfection.

The post Ransomware reinfection and its impact on businesses appeared first on Help Net Security.

13:40

[Meme] Scamming and Stealing From Your Staff Using the Name Standard Life and Fixers/Arrangers Techrights

Dont let this happen to you; it happened to many at Sirius Open Source, which claims to be most respected but is in fact governed like a third world country by a bunch of imposters and liars

Standard Life faking perceived authority; Integrity Financial Management Ltd. arranging the scam; All the payslips they sent me for 5+ years were lies

Summary: The crimes of Sirius Open Source werent done alone; a network of facilitators helped the company secretly plunder its staff for years and the culprits must be named

13:30

Quantifying cyber risk vital for business survival Help Net Security

Healthcare, manufacturing, and utilities are suffering long-term financial impact of major cyber attacks, according to ThreatConnect. With the National Cyber Strategy coming out of the White House focusing on decreasing cyber risk from critical infrastructure and the new SEC Cyber Proposals, organizations across industries are now being tasked with reporting on cyber risk, said Jerry Caponera, GM of Risk Quantification, ThreatConnect. Organizations are finally waking up to the fact that the impact of ransomware and More

The post Quantifying cyber risk vital for business survival appeared first on Help Net Security.

13:16

Integrity Financial Management Ltd. Also Helped Facilitate Fraud schestowitz.com

Plunder on behalf of Sirius is Planning for tomorrow? Using the name of Standard Life and fake/false payslips?

Integrity Financial Management Ltd. page 1

Summary: The facilitator of a scam was contacted the other day (Integrity Financial Management Ltd.); their staff too seems to have played a role in the pension fraud, so weve contacted Integrity Financial Management directly, however it chose not to respond and instead pretended not to be aware of anything a major blunder and an actual crime against GNU/Linux administrators and programmers

INITIAL CONTACT was made the other day with Integrity Financial Management Ltd. That firm may have facilitated the crimes of Sirius Open Source and it needs to know about it. We have the names of the people who managed these accounts.

You may not be aware of this, but your firm facilitated fraud at Standard Life

http://techrights.org/2023/04/17/fraud-at-sirius-open-source-with-integrity-financial-management/

Myself and former colleagues are still trying to hold accountable the culprits

http://techrights.org/wiki/Crimes_of_Sirius_Open_Source#Fraud_Investigation

Why did you issue all this material to us? Why did you facilitate theft of pension funds?

Please contact us as soon as possible to clarify the matter.

Just because theyre not replying does not mean theyre off the hook. This is a typical business strategy; they try to ignore anything thats not convenient to them, hoping it would miraculously go away.

As we also noted earlier this week, Sirius had engaged in financial fraud and it is now registered at the address of the accountant, so thats another potential legal liability for them.

So far Ive spent about 10 hours on the phone all in all. And even when each time you phone you know exactly what needs to be achieved and try to get to that as fast as possible, they delay and obstruct. Its an actual method, tiring down the complainant or bleeding people to death with phone bills (like legal bills/lawyer fees as barrier). Its a bit like a network of organised crime made to over up its own doing. It is well coordinated to dodge accountability. Business as usual.

...

13:00

Tight budgets and burnout push enterprises to outsource cybersecurity Help Net Security

With cybersecurity teams struggling to manage the remediation process and monitor for vulnerabilities, organizations are at a higher risk for security breaches, according to Cobalt. As enterprises prioritize efficiencies, security leaders increasingly turn to third-party vendors to alleviate the pressures of consistent testing and to fill in talent gaps. The report identifies how macroeconomic shifts are affecting organizations security standards across the U.S. and EMEA, revealing how security teams can extract more value from their More

The post Tight budgets and burnout push enterprises to outsource cybersecurity appeared first on Help Net Security.

12:50

Financial Advisers of Sirius Open Source Decline to Comment on Fraud at Sirius Open Source (Defrauding GNU/Linux Specialists) Techrights

Plunder on behalf of Sirius is Planning for tomorrow? Using the name of Standard Life and fake/false payslips?

Integrity Financial Management Ltd. page 1

Summary: The facilitator of a scam was contacted the other day (Integrity Financial Management Ltd.); their staff too seems to have played a role in the pension fraud, so weve contacted Integrity Financial Management directly, however it chose not to respond and instead pretended not to be aware of anything a major blunder and an actual crime against GNU/Linux administrators and programmers

INITIAL CONTACT was made the other day with Integrity Financial Management Ltd. That firm may have facilitated the crimes of Sirius Open Source and it needs to know about it. We have the names of the people who managed these accounts.

You may not be aware of this, but your firm facilitated fraud at Standard Life

http://techrights.org/2023/04/17/fraud-at-sirius-open-source-with-integrity-financial-management/

Myself and former colleagues are still trying to hold accountable the culprits

http://techrights.org/wiki/Crimes_of_Sirius_Open_Source#Fraud_Investigation

Why did you issue all this material to us? Why did you facilitate theft of pension funds?

Please contact us as soon as possible to clarify the matter.

Just because theyre not replying does not mean theyre off the hook. This is a typical business strategy; they try to ignore anything thats not convenient to them, hoping it would miraculously go away.

As we also noted earlier this week, Sirius had engaged in financial...

12:30

Versa Zero Trust Everywhere strengthens security posture for onsite, remote and hybrid workers Help Net Security

Versa Networks launched Versa Zero Trust Everywhere, delivering zero trust security for both remote and on-premises users, with optimized user-to-application performance. Hybrid cloud and hybrid work have changed where and how users work, challenging organizations to find ways to secure the enterprise while delivering the best user experience. Cloud-delivered Zero Trust Network Access (ZTNA) solutions are widely adopted to secure remote work, but cannot deliver the application performance and inline policy enforcement needed for workers More

The post Versa Zero Trust Everywhere strengthens security posture for onsite, remote and hybrid workers appeared first on Help Net Security.

12:20

Edgio Advanced Bot Management protects users against bot attacks Help Net Security

Edgio has released Advanced Bot Management solution that proactively mitigates a wide range of evolving malicious bots while providing observability into good bots. Leveraging massive amounts of data continuously drawn from the platforms extensive global deployment, Advanced Bot Manager applies machine learning to detect bots based on both signature and behavioral fingerprinting. The solution runs natively on every server across the entire Edgio global network to inspect all traffic for bots in real time. Analyst More

The post Edgio Advanced Bot Management protects users against bot attacks appeared first on Help Net Security.

12:15

LastPass University improves password management habits Help Net Security

LastPass has unveiled LastPass University, a training platform featuring live and on-demand coursework to help business administrators, their end users and partners deepen their LastPass product knowledge and password management skills. LastPass University training modules range from basic to comprehensive, providing customers with an easy-to-use, single destination to learn how to get the most from their LastPass accounts and improve password security behavior. Each month, LastPass University will conduct live training sessions on new topics. More

The post LastPass University improves password management habits appeared first on Help Net Security.

12:10

Armis enables enterprises to identify gaps in security controls with CAASM enhancements Help Net Security

Armis enhanced its Cybersecurity Asset Attack Surface Management (CAASM) Solution giving security teams abilities to overcome asset visibility and exposure challenges. Security teams will be able to improve their overall security position by ensuring security controls, security posture, and asset exposure are understood and remediated. The proliferation of assets across organizations has increased the need for better visibility but unfortunately, management of those assets is usually performed using multiple IT and security solutions. The great More

The post Armis enables enterprises to identify gaps in security controls with CAASM enhancements appeared first on Help Net Security.

12:01

Parler's New Owner Immediately Took the Social Network Offline SoylentNews

Parler's new owner immediately took the social network offline:

Months after Ye dropped his bid, Parler has a new owner... and is out of commission for the time being. Starboard, the owner of pro-conservative news outlets like American Wire News, has shut down Parler on a temporary but indefinite basis after completing its acquisition of the social network from Parlement Technologies. The buyer says it will conduct a "strategic assessment" of the platform during the downtime, and hopes to integrate Parler's audience into all its existing channels.

Starboard isn't shy about its strategy. While it still sees a market for communities that believe they've been censored or marginalized, it considers a Parler revamp virtually necessary. "No reasonable person believes that a Twitter clone just for conservatives is a viable business any more," the company says.

Parler launched in 2018 as a self-proclaimed free speech alternative to Twitter, which some conservatives claim is biased against right-wing views. It had few rules or moderation controls. Like Gab, though, it also became a haven for people with extreme views. Parler drew flak in January 2021 after word that people involved in the Capitol attack used the social platform to coordinate. Apple and Google kicked Parler off their respective app stores until it improved moderation and kept out users inciting violence.

[...] In an interview with The Wall Street Journal, Starboard chief Ryan Coyne says he expects to keep users on Parler despite rivalries with other sites, such as former President Trump's Truth Social. However, the absence of a revival date doesn't leave members many options. For now, they'll have to use other platforms to express themselves.

Previously: Parler Has Reportedly Cut 'Majority' of Staff in Recent Weeks


Original Sub...

12:00

Native Alaskan Language Reshapes Mathematics Hackaday

The languages we speak influence the way that we see the world, in ways most of us may never recognize. For example, researchers report seeing higher savings rates among people whose native language has limited capacity for a future tense, and one Aboriginal Australian language requires precise knowledge of cardinal directions in order to speak at all. And one Alaskan Inuit language called Iupiaq is using its inherent visual nature to reshape the way children learn and use mathematics, among other things.

Arabic numerals are widespread and near universal in the modern world, but except perhaps for the number 1, are simply symbols representing ideas. They require users to understand these quantities before being able to engage with the underlying mathematical structure of this base-10 system. But not only are there other bases, but other ways of writing numbers. In the case of the Iupiaq language, which is a base-20 system, the characters for the numbers are expressed in a way in which information about the numbers themselves can be extracted from their visual representation.

This leads to some surprising consequences, largely that certain operations like addition and subtraction and even long division can be strikingly...

11:31

Re: CVE-2022-47501: Apache OFBiz: Arbitrary file reading vulnerability Open Source Security

Posted by Seth Arnold on Apr 18

Hello Jacques, thanks for the reply. I'd like to suggest that this policy
should receive a review, as other list members have found the Apache
defaults a bit wanting:

https://www.openwall.com/lists/oss-security/2023/01/31/7
https://www.openwall.com/lists/oss-security/2022/10/12/2
https://www.openwall.com/lists/oss-security/2022/08/26/4
https://www.openwall.com/lists/oss-security/2022/01/25/15

This is nice, and friendly.

This is also nice...

11:24

Goldoson Android Malware Found in 60 Apps with 100M Downloads HackRead | Latest Cybersecurity and Hacking News Site

By Deeba Ahmed

The malware was identified by cybersecurity researchers at McAfee.

This is a post from HackRead.com Read the original post: Goldoson Android Malware Found in 60 Apps with 100M Downloads

10:41

BlackCat (ALPHV) Gang Claims Ransomware Attack on NCR Data Center HackRead | Latest Cybersecurity and Hacking News Site

By Deeba Ahmed

BlackCat ransomware initially claimed responsibility for the ransomware attack on its dark web blog but later removed its post, indicating negotiations between the two parties.

This is a post from HackRead.com Read the original post: BlackCat (ALPHV) Gang Claims Ransomware Attack on NCR Data Center

10:13

NEW 'Off The Wall' ONLINE 2600 - 2600: The Hacker Quarterly

NEW 'Off The Wall' ONLINE

Posted 19 Apr, 2023 0:13:14 UTC

The new edition of Off The Wall from 04/18/2023 has been archived and is now available online.

10:00

HPR3838: Biking to Work Hacker Public Radio

Biking to Work In this episode I record while I'm riding my bicycle to work, using my new audio adapter to plug my $2 microphone into my phone. To make the recording I used the Hi-Q mp3 recorder app on my Android device. In the end I didn't do anything in post-production to adjust the volume or compression of the audio. It turned out pretty well &quot;as is.&quot; Links SuperWhole 3.5mm 1/8&quot; Earphone Headset + Microphone Adapter to Stereo Audio Male: on Amazon HI-Q mp3 Voice Recorder Credits Music bumpers are from Kimiko Ishizaka's The Open Goldberg Variations: http://www.opengoldbergvariations.org, used by permission of their CC0 1.0 Universal (CC0 1.0) Public Domain Dedication license.

A Plea from Mike Hoye It Will Never Work in Theory

It's a difficult and vaguely antisocial thing to be dogmatic about but when I ask if there's any research about something I'm asking for actual research. As in, do you know if someone has dedicated months or years of their lives in some empirical pursuit of this question, and what they wrote down. As distinct from the first thing your imagination burped into your inner monologue when your eyes hit the "?".

Trust me, I can make up my own imaginary, uninformed opinions faster than you can type.

Mike Hoye, April 19, 2023

09:19

The Great Salt Lake is Shrinking. What Can We Do to Stop It? SoylentNews

The Great Salt Lake is shrinking. What can we do to stop it?:

At Antelope Island State Park near Salt Lake City in the fall of 2022, three duck hunters dragged a sled across cracked desert sand in search of the water's edge. The birds they sought were bunched in meager puddles far in the distance. Just to the west, the docks of an abandoned marina caved into the dust and a lone sailboat sat beached amid sagebrush.

"Biologists are worried that we're on the brink of ecological collapse of the lake," says Chad Yamane, the regional director of Ducks Unlimited, a nonprofit that conserves, restores and manages habitats for North America's waterfowl, and a waterfowl hunter himself.

Last fall, the Great Salt Lake hit its lowest level since record keeping began. The lake's elevation sank to nearly six meters below the long-term average, shriveling the Western Hemisphere's largest saline lake to half its historic surface area. The lake's shrinking threatens to upend the ecosystem, disrupting the migration and survival of 10 million birds, including ducks and geese.

[...] And the Great Salt Lake isn't unique. Many of the world's saline lakes are facing a double whammy: People are taking more water from the tributaries that feed the lakes, while a hotter, drier climate means it takes longer to refill them.

Read more of this story at SoylentNews.

09:00

RoboGaggia Makes Espresso Coffee On Its Own Hackaday

[Nicholas DiPatri] very much loves his Gaggia Pro. Its an amazing espresso machine, but its also kind of fussy and requires a lot of manual attention to brew a cup. As an engineer, he set about fettling the machine to run with a little less oversight. Enter RoboGaggia.

Stock, the Gaggia Pro requires regular water refills. The coffee-thirsty user must also wait for the brew heater to reach temperature before clicking the go button. Knowing the weight of coffee in the machine is key to getting the brew right, too. Steaming must also be done by hand. Overall, its a lot of work.

[Nicholas]s goal was to get the machine to a point where he could load it with fresh ground coffee, hit a button, and walk away. On his return, the machine should be ready for steam. To achieve this, he went ham on outfitting the Gaggia Pro with fancy modern equipment. It scored a scale that sits in the drip tray, PID temperature controllers, a flow rate controller to manage the extraction profile, and an auto-fill water reservoir. The entire...

08:41

Linux Plumbers Conference CFP announcements LWN.net

The 2023 Linux Plumbers Conference (November 13-15, Richmond VA, USA) has put out its calls for proposals for the refereed track (due August 6) and the microconference track (June 1). Proposals are also being accepted for the kernel-summit track.

08:33

Wasmer 3.2 Released With WebAssembly On RISC-V Support, New WCGI Feature Phoronix

Wasmer as the open-source project focused on providing a "universal WebAssembly runtime" that supports a variety of platforms and architectures is out today with a new feature release...

07:31

Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution Open Source Security

Posted by Steffen Nurpmeso on Apr 18

0xef967c36 () gmail com wrote in
<5e92a8d676a0ddfb5c426f3412bd7aa6.1ab4a9b2@ignited.turnovers>:
|On Tue, Apr 18, 2023 at 09:28:22PM +0200, Solar Designer wrote:
|> On Tue, Apr 18, 2023 at 08:13:24PM +0300, 0xef967c36 () gmail com wrote:
...
|Here is (possibly partial) list of collisions, obtained with uniq -D
|from src/ioctlent0.h (a file autogenerated when building strace).
...

In that case even the FreeBSD rights(4)...

07:20

1xbet Promo Codes April 2023 h+ Media

1xbet Promo Codes April 2023

A 1xBet its a bookmaker that provides good promotions and fair odds. However, there are other bookmakers pretty a lot as good as and value knowing. Finally, 1xBet has the model of stay online casino for these who wish to play in real time. 1xBet New Zealand provides numerous bonuses and promotions. Some are seasonal or focused on sure tournaments or teams.

Moreover, for novices, the bookmaker offers ample instructions, assist statistics, and handy payment strategies to keep gamers locked in excessive octane action. Furthermore, players additionally get access to a 24/7 gaming platform and timely cost options. All on line casino titles obtainable on the desktop site are also current within the 1xBet on line casino cell versions. New Zealand players at 1xBet enjoy up to NZD 200 Welcome Bonus. If you might have a promo code, you presumably can enter it for engaging rewards.

1xBet web site contains thorough regulations and directions, as nicely as dependable data and secure and easy payment options. We often highlight coupons which might be legitimate for the complete retailer, in percentage after which fixed value. After that we provide particular 1xBet provides in case you have an interest in shopping for something for a discount. 1xBet is a leading worldwide gaming and know-how company with more than 12 years of experience within the subject, and workplaces in Europe, Asia and Latin America. The firm has sponsorship deals in place with main rights holders including Serie A, Tottenham Hotspur and LaLiga Media Partner, to name a few.

The steps are nearly similar should you prefer to make use of one of many other strategies of registration. 1xBet is a world on line casino and betting site that provides quite so much of on line casino video games, sports activities betting, and live casino games. To get started, you want to first register your self on the platform. The good factor is that the platform presents a easy and straightforward registration course of. This deal is available solely to clients whove simply created an account. A welcome offer could be something from match deposit bonuses to no deposit bonuses, free wager credit and risk-free bets.

This betting firm also permits the user to put a guess on a selection of sports activities activities obtainable on 1xBet Bangladesh official web site. It has a 24/7 reside chat alternative from a 1xBet admin private for queries and clarifications, around the clock reside betting events, multi-live function, and so forth. Also, there are quite a few mini-games within the apk, so if you do not want to wager, you presumably can have enjoyable participating in actually one of them. The utility has great reviews, in lots of respects as a outcome of broad possibilities, from creating an account with a welcome bonus on bets to games. Completing the 1xBet Android app obtain and installing it on a gadget, a player will get fast...

07:20

Try 1xbet Cell Casino Evaluate 2023 Declare Your 1500 Today! h+ Media

Try 1xbet Cell Casino Evaluate 2023 Declare Your 1500 Today!

The IxBet cellular app is a perfect fit for gamers with smartphones and tablets. The betting and gaming web site has put lots of effort into creating a dedicated App for iOS, Windows, and Android gadgets. 1xBet additionally has a straightforward to make use of browser named the 1x browser that targets Android users. The 1xBet Casino actually began with sports activities betting, which is why theyve greater than 1,000 events every day that clients can wager on. This contains in style sports activities like hockey, ski jumping, water polo, basketball, soccer, and so much extra. On high of that, in addition they supply extra betting opportunities which are available in specific markets because of country-specific occasions.

For occasion, if a daily deposit bonus is 100 percent up to $1,000, a crypto deposit bonus might be 150% as a lot as $1,500, expressed in Bitcoin or one other cryptocurrency. Some NZ bookies settle for multiple cryptocurrencies, together with Bitcoin, Ethereum, Dogecoin, Litecoin, and others. The risk-free wager is usually confused with the free guess, but the two phrases are literally not interchangeable. With a risk-free bet, you might be betting with your own money. In case you win, it is business as usual, but if you lose, the bookie will reimburse you.

You can get an unique 100% bonus that goes as high as $130. To obtain the bonus you need to use the promo code VIP CODE, however keep in mind, this join bonus is out there only for new prospects who register for an account. At first look, its not clear why Betfair wished to open a sportsbook betting workplace because the Betting Exchange has very massive advantages.

And with 1xBet these kind of opportunities become more real. Place bets and win and ensure concerning the reliability and fairness of the 1xBet standard website. The official webpage was created in February 2012, since then it has been operating in throughout the net.

If you ever experience any issue, dont hesitate to contact their customer help service. They are all the time there to solve your queries and provide you with the proper resolution you need. One of the notable issues about 1xBet on line casino is that it provides games from the top game builders in the trade. Currently, the site works with virtually one hundred builders or extra.

We will clarify intimately the 4 bonuses from this list and present what advantages you could get from them. The complete listing of all available currencies could be accessed underneath Taxonomies on the Currency tab. Follow the instructions to make sure you claim your full discount. Im over 19, and I want to obtain the newest updates and promotions. If you need to register for the 1xBet associates program you can do that when you go to partners1xbet.com and click on Registration. It goes with out saying that you should fill all of the fields and...

07:18

The Most Effective Nz On-line Casinos That Also Accept Sports Betting h+ Media

The Most Effective Nz On-line Casinos That Also Accept Sports Betting

The IxBet cell app is an ideal fit for players with smartphones and tablets. The betting and gaming site has put lots of effort into creating a devoted App for iOS, Windows, and Android gadgets. 1xBet also has a straightforward to make use of browser named the 1x browser that targets Android customers. The 1xBet Casino truly started with sports activities betting, which is why they have greater than 1,000 events daily that clients can wager on. This contains popular sports activities like hockey, ski leaping, water polo, basketball, soccer, and so much more. On high of that, they also provide additional betting opportunities that are out there in particular markets because of country-specific events.

For instance, if an everyday deposit bonus is one hundred pc up to $1,000, a crypto deposit bonus could be 150% up to $1,500, expressed in Bitcoin or one other cryptocurrency. Some NZ bookies accept a number of cryptocurrencies, including Bitcoin, Ethereum, Dogecoin, Litecoin, and others. The risk-free wager is commonly confused with the free guess, but the two phrases are literally not interchangeable. With a risk-free wager, you may be betting with your own cash. In case you win, its business as ordinary, however should you lose, the bookie will reimburse you.

Side Bet City is an 80s type poker game the place you can bet on whether or not you suppose there might be a 3- hand, 5-card hand, 7-card hand or nothing in any respect from a random set of the 7 dealt. Dream Catcher Live offers you the chance to win as much as 40x your initial stake as you bet on the place you think the wheel will stop next. The current CEO of 1xBet Casino is Kyriaki Kostikian, and the casino is owned by Exinvest Limited which is an organization that is primarily based in Cyprus. Seu uso continuado deste web site pressupe que voc concorda. Reduzindo muito bom ter expectativas para seguirem performando bem neste artigo um custo!

Despite 1x Bet being a web-based platform focused on sports betting, it is possible to search out several casino video games, lets examine under probably the most well-known video games you can find. The on line casino is considered a powerhouse for being one of the veterans in theonline on line casino scene. It provides sports betting, lottery, and various well-liked andnew casinogames.

Such a combination usually looks like a set of some symbols, letters and numbers. Less usually it is a word that offers a hyperlink to the bookmaker and to the bonus that might be encrypted in this sentence. The combination is unique and legitimate only throughout the framework of the announced promotion.

It is good to know that after ending it, each signed up person can obtain registration bonuses. You can get 100 % join supply on their first deposit as a lot as 130. After all, there are several coupon moguls out there providing prom...

07:17

Best On-line Casino Games In India 2022 Gambling Video Games h+ Media

Best On-line Casino Games In India 2022 Gambling Video Games

As for sports activities betting, 1xBet New Zealand appeals to a broad variety of sports, competitions and markets. 1xBet has a live casino, geared toward those that prefer to enjoy the atmosphere of an actual recreation room with out having to depart home. 1xBet also has a Welcome bonus unique to on line casino, in addition to weekly promotions for individuals who are already registered on the betting site. In addition to the range of video games, bettors can depend on reliable and well-known suppliers in the iGaming market. There are 136 suppliers, including iSoftbet, Microgaming and Pagmatic Play.

The wheel features purple and black pockets which are numbered from 1 to 36. This website provides a high pay-out, which gives you extra chances of profitable. Now comes the half the place you make your first deposit in your account.

Click on it and select essentially the most handy registration method. There are 4 totally different options pertaining to 1xBet registration. The minimum age required is 18 years to play any sport in 1xbet.

There are 87 online Poker video games on the betting site, a fairly high selection. There are completely different modalities of the sport, including probably the most famous, Texas Holdem. 1xBet cell on line casino is a wholly-owned subsidiary of Sergey Korsakov. The parent firm relies in Cyprus and has branches worldwide. 1xBet mobile on line casino is licensed and regulated underneath the legal guidelines of the Government of Curacao. The expansive game lobby in 1xBet cell casino is respected software program providers such as Microgaming and NetEnt.

According to 1xBet Bangladesh betting analysis, the company often supplies customers with good prizes. Mirror web sites possess are equivalent to the native web site. Thus, using a mirror in your cellular system, youll get the similar decisions because the unique bookmakers web site. You can place bets, get promotional provides, play video 1xbet video games and so forth. 1xBet bookmaker presents players an actual opportunity to win prizes worthy.

To examine if a wager has cashout, you have to confirm the guess. Then examine in your betting section if there is the choice to promote the e-newsletter. Following the market development, this home offers bets on eSports . The victorious gambler 1xBet , Mukhazhan Therefore, if there were any fears that your wins at 1xBet would not be rewarded, youll have the ability to relaxation assured.

They enable the player to obtain bonuses inside the type of cash or free bets. On this net web page, you can see the simplest 1xBet promo code bookmaker bonus codes and uncover ways to make use of them. Users of this site will get pleasure from a prime quality material in regards to the casinos.

The casino presents various sportsbettingopportunities, lottery games, and numerous casinogames, wi...

07:17

Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution Open Source Security

Posted by 0xef967c36 on Apr 18

I'm really sorry for that, please accept my apologies.

It seems that the original idea was right (since there really are
different ioctls with the same number, see below); but unrelated
bugs in strace caused it report false positives.

Here is (possibly partial) list of collisions, obtained with uniq -D
from src/ioctlent0.h (a file autogenerated when building strace).

Most interesting are those with TCSETS*, since they're currently...

07:16

Registration Guide: Simple Steps For Your 1xbet Registration h+ Media

Registration Guide: Simple Steps For Your 1xbet Registration

Even after so many years, Curacao stays to be the best and quickest provider of a gaming license. They follow a straightforward process and provide businesses with a wonderful sandbox opportunity to check their idea before dealing with a tougher licensing jurisdiction. Moreover, the betting network can be accessible in multiple places and languages.

Today, theyve emerged as some of the trusted on-line playing platforms in the entire betting business. The minimal deposit and withdrawal quantity for the gaming platform is NZD1. The withdrawal timelines typically vary from a minute to five and seven days. The live casino is powered by leading gaming softwares like Evolution Gaming, Lucky Streak, Vivo Gaming, XPG, Ezugi, and Extreme Live Gaming. For optimum cell expertise, IxBet is suitable with Android four.4 or higher variants with a normal resolution of at least 320 x 480. 1xBet bookmaker has created an all-in-one platform for gamers to test their luck and make large money rewards.

Henri shares his in depth knowledge of strategies, odds, and risk administration, earning him recognition as an authority in the online casino area. Most on-line bookmaker bonuses work no matter whether youre using them on a computer or a cell gadget. However, some bookies incentivise their prospects to play on cell apps by giving out particular mobile bonuses. These may be anything from free bets and no deposit cash bonuses to crypto provides and extra.

  • Kiwis who enjoy betting on completely different occasions and watching live-action may also find a live casino and streaming highly entertaining.
  • Make your minimum deposit of a minimum of NZ$2, and the on line casino will match your deposit with a 100 percent Matched Bonus and 22Bet Points.
  • Of course, many of the titles obtainable might be stay vendor on line casino video games, similar to blackjack and roulette.
  • It is beneficial to save 1xBet Ghana sign in data.
  • Once you obtain the apk file, itll get saved on your phones obtain folder.

1xBet offers every potential deposit and withdrawal possibility from normal banking to cryptos. Leaving no stone unturned the team right here at Stuff New Zealand Coupons are here to help you get the easiest deals. So before you head over to the 1xBet web site, take a good have a glance at all our money-saving presents and low cost codes to see what it can save you. Here at Stuff New Zealand Coupons we search and collect all the newest money-saving coupon codes, promotional codes, low cost codes and deals for 1xBet we are in a position to discover.

Before accepting the Bonus, pay consideration to all of the rollover guidelines, as often people ignore them and end up dropping the bonus. However, you can use this bonus both in sports activities betting and in online casino video games, however the rollover should be fu...

06:59

Giving a Face to the Malware Proxy Service Faceless Krebs on Security

For the past seven years, a malware-based proxy service known as Faceless has sold anonymity to countless cybercriminals. For less than a dollar per day, Faceless customers can route their malicious traffic through tens of thousands of compromised systems advertised on the service. In this post well examine clues left behind over the past decade by the proprietor of Faceless, including some that may help put a face to the name.

The proxy lookup page inside the malware-based anonymity service Faceless. Image: spur.us.

Riley Kilmer is co-founder of Spur.us, a company that tracks thousands of VPN and proxy networks, and helps customers identify traffic coming through these anonymity services. Kilmer said Faceless has emerged as one of the undergrounds most reliable malware-based proxy services, mainly because its proxy network has traditionally included a great many compromised Internet of Things devices such as media sharing servers that are seldom included on malware or spam block lists.

Kilmer said when Spur first started looking into Faceless, they noticed almost every Internet address that Faceless advertised for rent also showed up in the IoT search engine Shodan.io as a media sharing device on a local network that was somehow exposed to the Internet.

We could reliably look up the [fingerprint] for these media sharing devices in Shodan and find those same systems for sale on Faceless, Kilmer said.

In January 2023, the Faceless service website said it was willing to pay for information about previously undocumented security vulnerabilities in IoT devices. Those with IoT zero-days could expect payment if their exploit involved at least 5,000 systems that could be identified through Shodan.

06:55

Watch the LibrePlanet: Charting the Course videos on GNU MediaGoblin and PeerTube FSF blogs

March 18 & 19 was a weekend packed full of events and get-togethers, where people gathered for the Free Software Foundation's (FSF) fifteenth edition of its annual LibrePlanet conference. Relive LibrePlanet: Charting the Course and catch up on the talks you missed with video and audio versions.

06:33

Russian T-90 Tank From Ukraine Mysteriously Appears At U.S. Truck Stop SoylentNews

https://www.thedrive.com/the-war-zone/russian-t-90-tank-from-ukraine-mysteriously-appears-at-u-s-truck-stop

The folks at Peto's Travel Center and Casino in Roanoke, Louisiana see all kinds of vehicles pull up, but Tuesday night was different. What ended up in their parking lot is certainly something of a mystery, to say the least.

Someone left a Russian T-90A tank, which open source intelligence (OSINT) trackers say was captured by Ukraine last fall, on a trailer after the truck hauling it broke down and pulled into this truck stop off U.S. Interstate 10. An employee at Peto's, and the individual who first posted the images on Reddit, shared them with The War Zone.


Original Submission

Read more of this story at SoylentNews.

06:22

Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution Open Source Security

Posted by Steffen Nurpmeso on Apr 18

Todd C. Miller wrote in
<043b8fbe6e014f17 () millert dev>:
|On Wed, 19 Apr 2023 02:59:26 +0800, Ruihan Li wrote:
|
|> Yeah, I see that you are removing ioctl calls on standard file
|> descriptors. So actually, just to confirm, it is feasible to avoid
|> all ioctl calls to standard file descriptors with root privileges
|> (under all command line arguments), by using /dev/tty, assuming
|> something like the window...

06:20

Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution Open Source Security

Posted by 0xef967c36 on Apr 18

That encoding scheme is quite old; it's there since at least 30 years.

There actually are some collisions, just not the one with isatty() -> TCGETS

eg SNDCTL_TMR_START == TCSETS

The _IO variant (without direction and size) can collide with
old-style ioctl, like those CDROM*, etc.

06:00

Send this FPV Bot into the Crawlspace to Do Your Dirty Work Hackaday

The least pleasant space in most houses is likely to be the space below it. Basements tend to be dank, dusty, and full of too many things that have too many legs. And even worse than the full basement is the dreaded crawlspace, which adds claustrophobia to the long list of unpleasantries that lie below. Sadly, though, a crawlspace might be a handy place to run wires, and if youre hesitant to delve too deeply, this FPV cable-laying rig might be something to keep in mind.

This one comes to us from [Old Alaska] with very little detail other than whats in the brief video below. The setup is clear enough a need to run an Ethernet cable from one side of the house to the other, and a crawlspace to do it in. Also in the toolkit was an RC rock crawler with a field-expedient FPV camera. With Breaking Bad-style access to the crawlspace through a few floorboards, [Old Alaska] was able to deploy the crawler dragging a Cat 5 cable behind it. The terrain under the house made the rock crawler a good choice, with four-wheel-drive, locking differentials, and an articulating frame. The bots-eye view also makes it clear that actually crawling in this rubble-strewn crawlspace would be a painful affair.

With very little drama, [Old Alaska] was able to navigate the crawler across the...

05:55

[$] Textual: a framework for terminal user interfaces LWN.net

For developers seeking to create applications with terminal user interfaces (TUIs), options have been relatively limited compared to the vast number of graphical user interface (GUI) frameworks available. As a result, many command-line applications reinvent the same user interface elements. Textual aims to remedy this: it's a rapid-application-development framework for Python TUI applications. Offering cross-platform support, Textual incorporates layouts, CSS-like styles, and an expanding collection of widgets.

05:52

Re: Checking existence of firewalled web servers in Firefox via iframe.onload Open Source Security

Posted by Jan Fader on Apr 18

Hi Georgi

Am Tue 18. Apr. 2023, hat Georgi Guninski geschrieben:

I can reproduce this in Firefox 112, but also in Chromium 112.0.5615.121
and Edge 112.0.1722.48.

Regards
Jan

05:33

Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution Open Source Security

Posted by Solar Designer on Apr 18

Oh, I didn't recall the full story. Thank you for correcting me.

So what I did back then was actually work around the shortcoming of
older strace not decoding the full 32 bits, which I did not realize was
the case.

It was indeed stupid of me not to realize what was going on, but the
"fix" nevertheless made things slightly better at the time - before it,
strace reported an arbitrary one of the 16-bit matches. So in the above...

05:31

Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution Open Source Security

Posted by Todd C. Miller on Apr 18

For the most part, yes. There are still some calls to isatty(3)
using the standard file descriptors when setting up the event loop
to run the program but that is after the user has been verified.
I will add checks that the fd is a character special file before
calling isatty(3). In most cases the code wants the contents of
struct stat anyway, so the S_ISCHR check is basically free.

If there are setuid programs that call ttyname(3) that will...

05:12

Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution Open Source Security

Posted by Ruihan Li on Apr 18

Hi Todd,

Yeah, I see that you are removing ioctl calls on standard file descriptors. So
actually, just to confirm, it is feasible to avoid all ioctl calls to standard
file descriptors with root privileges (under all command line arguments), by
using /dev/tty, assuming something like the window size... Right?

If this is the case, I think it should not be difficult for other setuid
programs to do similar things. I am just thinking for a while,...

05:09

An openSUSE ALP status update LWN.net

Richard Brown has posted an update on the status of the SUSE Adaptable Linux Platform (ALP) project and what it means for the openSUSE distribution.

The ALP concept should be flexible enough that these openSUSE Products will be able to leverage all the stuff SUSE is doing for SUSE's ALP Products, but then we (community) can add anything we want. If we find it is not flexible enough, then we (SUSE) will work to adapt it to make it possible for the community to build what it wants.

So, if we the community want to build something like old Leap, that should be totally technically feasible.

04:30

3 Hellacious Questions for Presidential Candidate Donald Trump cryptogon.com

Via: Jon Rappoport: Dear Don, ONE: When are you going to admit you fronted for, and pushed, the high-speed release of DEVASTATING COVID vaccines that are injuring and killing huge numbers of people all over the world? Youre going admit it NEVER, right? Youre still faking it with blue-sky sales hypeyou saved hundreds of millions []

04:19

Big Ag Panicking Over Bill to Require Labeling of Gene-Altering Products cryptogon.com

Via: The Defender: Missouri House Bill 1169 would require labeling of products that can alter your genes. Big Ag lobbyists strongly oppose it, because it would mean labeling livestock injected with mRNA vaccines.

04:12

COVID Led to the Biggest Drop in Births in 50 Years cryptogon.com

Via: USA Today: The COVID-19 pandemic led to the biggest one-year drop in U.S. births in nearly 50 years. But a new study shows not every state was equally affected. Researchers found some states experienced steep decreases in fertility while other saw little change, according to the report published last week in the peer-reviewed journal []

04:08

Experts temporarily disrupted the RedLine Stealer operations Security Affairs

Security experts from ESET, have temporarily disrupted the operations of the RedLine Stealer with the help of GitHub.

ESET researchers announced to have temporarily disrupted the operations of the RedLine Stealer with the help of GitHub.

The two companies teamed up with Flare to curb the operations of the malware operators. The experts discovered that the malware control panels use GitHub repositories as dead-drop resolvers.

The RedLine is an info stealing malware written in .NET that is active since at least early 2020. The malware is able to steal sensitive information from the infected systems, including credentials, cookies, browser history, credit card data, and crypto wallets. The info-stealer is considered a commodity malware that is available through malware-as-a-service model.

By analyzing samples of the RedLine Stealer, the ESET researchers identified the following repositories:

  • github[.]com/lermontovainessa/Hub
  • github[.]com/arkadi20233/hub
  • github[.]com/ivan123iii78/hub
  • github[.]com/MTDSup/updateResolver
...

04:00

Remembering Ross Stone, an Influential Leader of IEEE Technical Activities IEEE Spectrum



W. Ross Stone, an influential IEEE Technical Activities leader, died on 29 March at the age of 75.

The Life Fellow received the 2023 IEEE Richard M. Emberson Award for sustained contributions to and impactful leadership in the IEEE Technical Activities publication enterprise.

Stone held several leadership positions with the IEEE Technical Activities Board for more than four decades. He transformed the way the TAB periodicals committee operates by establishing several programs and processes to revitalize IEEE publications and initiate strategic plans to ensure their success in the future, according to his Emberson Award citation.

He was president of Stoneware, a business he founded in San Diego that provided consulting and expert witness services related to antennas, propagation, and telecommunications.

Communications and patent law expert

Stone received a bachelors degree in 1967 in earth sciences from the University of California, San Diego. He went on to earn masters and doctoral degrees in applied sciences from UCSD in 1973 and 1978, respectively.

He worked as chief scientist at McDonnell Technologies and a research advisor at IRT. In the early 1980s he founded Stoneware, which also provided litigation support services, patent infringement analysis, prior art research, and invention and design consulting in the areas of cellphone handset antennas and base stations, cellular systems, IEEE 802.11 technologies, LTE networks, Wi-Fi, and wireless networking technologies. During his career, he also served in leadership positions for 16 wireless communications startups.

He was an adjunct professor at Beijing Jiaotong University and the Politecnico di Torino.

Longtime editor of IEEE Antennas and Propagation Magazine

Stone, who served as chair of the TAB periodicals committee, established 15 ad hoc committees to further IEEEs publication goals. The ad hoc committees developed new evaluation metrics for proposed articles, a mentoring program for publication editors, and long-term open-access strategies.

For more than 30 years, Stone w...

03:48

U.S. Government Borrowing $6 Billion Per Day cryptogon.com

Via: The Center Square: The U.S. Congressional Budget Office said Monday the federal government has accumulated more than a trillion dollars in debt only six months into the fiscal year. The Committee for a Responsible Federal Budget released a report pointing out that those figures amount to an average of $6 billion per day so []

03:48

The AI Doomers Playbook SoylentNews

The AI Doomers' Playbook:

AI Doomerism is becoming mainstream thanks to mass media, which drives our discussion about Generative AI from bad to worse, or from slightly insane to batshit crazy. Instead of out-of-control AI, we have out-of-control panic.

When a British tabloid headline screams, "Attack of the psycho chatbot," it's funny. When it's followed by another front-page headline, "Psycho killer chatbots are befuddled by Wordle," it's even funnier. If this type of coverage stayed in the tabloids, which are known to be sensationalized, that was fine.

But recently, prestige news outlets have decided to promote the same level of populist scaremongering: The New York Times published "If we don't master AI, it will master us" (by Harari, Harris & Raskin), and TIME magazine published "Be willing to destroy a rogue datacenter by airstrike" (by Yudkowsky).

In just a few days, we went from "governments should force a 6-month pause" (the petition from the Future of Life Institute) to "wait, it's not enough, so data centers should be bombed." Sadly, this is the narrative that gets media attention and shapes our already hyperbolic AI discourse.

[...] Sam Altman has a habit of urging us to be scared. "Although current-generation AI tools aren't very scary, I think we are potentially not that far away from potentially scary ones," he tweeted. "If you're making AI, it is potentially very good, potentially very terrible," he told the WSJ. When he shared the bad-case scenario of AI with Connie Loizo, it was "lights out for all of us."

[...] Altman's recent post "Planning for AGI and beyond" is as bombastic as it gets: "Successfully transitioning to a world with superintelligence is perhaps the most important and hopeful, and scary pro...

03:43

Marvin Cheung, Global Diplomacy Fellow at the United Nations Institute for Training and Research (UNITAR), joins our Diplomacy board. Lifeboat News

Marvin Cheung, Global Diplomacy Fellow at the United Nations Institute for Training and Research (UNITAR), joins our Diplomacy board.

02:49

02:30

OpenCL 3.0.14 Released With New Extension For Command Buffer Multi-Device Phoronix

OpenCL 3.0.14 has been released that has a few minor fixes/corrections plus one prominent new extension: cl_khr_command_buffer_multi_device...

02:11

LXD 5.13 released LWN.net

Version 5.13 of the LXD virtual-machine manager has been released. New features include fast live migration, support for AMD's secure enclaves, and more. See this announcement for details.

02:00

Solus Linux Plans New Direction Built Off Serpent OS Phoronix

Joshua Strobl and original Solus project founder Ikey Doherty are both becoming re-involved with the Solus Linux distribution and moving ahead will be built off the SerpentOS project that Ikey has been independently working on the past few years...

01:54

Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules Open Source Security

Posted by Stig Palmquist on Apr 18

HTTP::Tiny v0.082, a Perl core module since v5.13.9 and available
standalone on CPAN, does not verify TLS certs by default. Users must
opt-in with the verify_SSL=>1 flag to verify certs when using HTTPS.

We grepped trough CPAN to find distributions using HTTP::Tiny that
didn't specify cert verification behaviour, possibly exposing users to
mitm attacks. Here are some examples with patches:

- CPAN.pm v2.34 downloads and executes code...

01:42

Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution Open Source Security

Posted by Solar Designer on Apr 18

BTW, even with the kernel bug fixed, there are ioctl number clashes
between different devices, so even e.g. isatty(3) is not necessarily
safe if called with elevated privileges under a possible confused deputy
scenario. Here's strace showing some clashes on older Linux/i386:

$ cat isatty.c
int main(void) { return isatty(0); }
$ gcc isatty.c -o isatty
$ strace -e ioctl ./isatty
ioctl(0, SNDCTL_TMR_TIMEBASE or SNDRV_TIMER_IOCTL_NEXT_DEVICE...

01:30

Hackaday

The Raspberry Pi HQ camera module may not quite reach the giddy heights of a DSLR, but it has given experimenters access to a camera system which can equal the output of some surprisingly high-quality manufactured cameras. As an example we have a Yashica film camera.

Coming from the viewpoint of a photographer rather than a hardware person, the video is particularly valuable for his discussion of the many lens options beyond a Chinese CCTV lens which can be used with the platform. It uses only the body from the Yashica, but makes a really cool camera that wed love to own ourselves. If youre interested in the Pi HQ camera give it a watch below the break, and try to follow some of his lens suggestions.

The broken camera he converted is slightly interesting, and raises an important philosophical question for retro technology geeks. Its a Yashica Electro 35, a mid-1960s rangefinder camera for 35 mm film whose claim to fame at the time was its electronically controlled shutter timing depending on its built-in light meter. The philosophical question is this: desecration of a characterful classic camera which might have been repaired, or awesome resto-mod? In that sense its not just about this project, but a question with application across...

01:24

Injectable gel offers new way to grow electrodes in the brain Lifeboat News: The Blog

The method is based on a gel containing enzymes that catalyze electrode formation from endogenous molecules.

01:23

Researchers Produce Entangled Photons Entirely On-Chip Lifeboat News: The Blog

A new approach shrinks quantum photonic technology to the size of a Euro coin.

01:23

What Rotterdam teaches about the power of green roofs Lifeboat News: The Blog

A recent showcase in the Dutch city highlighted the potential of green rooftops, which can lower city temperatures by 5 degrees Fahrenheit, say researchers.

01:22

James Webb telescope keeps finding galaxies that shouldnt exist, scientist warns Lifeboat News: The Blog

The James Webb Space Telescope keeps finding galaxies that shouldnt exist, a scientist has warned.

Six of the earliest and most massive galaxies that NASAs breakthrough telescope has seen so far appear to be bigger and more mature than they should be given where they are in the universe, researchers have warned.

The new findings build on previous research where scientists reported that despite coming from the very beginnings of the universe, the galaxies were as mature as our own Milky Way.

01:22

A luddite link to nano-terrorists Lifeboat News: The Blog

An older article but something the world is facing just like in certain sci-fi movies.


The reference publication of the movement in the 80s, the Earth First journal, featured a column called Ask Ned Ludd, in reference to the mythical character that gave name to the luddites. Jones thinks that neo-luddites are in fact misreading the original luddites, but he believes that understanding the difference between the old and modern ones tells us a lot about the ideology of the latter.

Luddites were not anti-technology: they were skilled craftsmen, involved in a labour movement aimed at keeping their machines and their jobs, he says. Thats very different from the neo-luddites ideas of relinquishing civilisation and [of] nature as the supreme good. Jones thinks neo-luddism is fed rather by the idea of technology as a disembodied, transcendent, terrifying force outside the human, which emerged in the mid 20th century, with the bomb and the rise of large-scale computing.

01:19

Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution Open Source Security

Posted by Todd C. Miller on Apr 18

That is correct. There are further changes to use TIOCGWINSZ on
/dev/tty instead of stderr. Using an open fd of /dev/tty makes the
isatty() call superfluous but it doesn't hurt to have it.

- todd

01:01

Comics Daze Random Thoughts

Home sweet couch!

On the way back from the Big Ears festival, I stopped for a few days in New York and was going to visit comics shops and get my shopping on and stuff. But instead I got a gastro thing, and ended up staying in the hotel room for a week and also sprained my ankle when I fainted or something. Im kinda sorta fine now, though, except for having to keep my foot elevated. Im not up for doing anything taxing brain wise as Im mostly vegetating on a hurr durr level, but I got, like, 50 pounds of comics yesterday Lots of stuff Im looking forward to reading (new books from CF!!!), but Im just gonna read stuff thats easier on the brain today, and Im saving that stuff until a later day.

And for music uhm OK, only albums that I liked as a child.

A reconvalescing kind of day?

Neil Young: After The Gold Rush

...

01:00

KOTRA and KISIA will showcase 10 Korean cybersecurity companies at RSA Conference 2023 Help Net Security

Korea Trade-Investment Promotion Agency (KOTRA) will host 10 Korean cybersecurity companies as Korea Pavilion with Korea Information Security Industry Association (KISIA) at RSA Conference 2023. KOTRA and KISIA will feature companies from across a range of fields including network security, cloud security, identity and access management and more. Additionally, KOTRA and KISIA will hold a networking event with including Korean cybersecurity companies, local investors, and invited Korea Pavilion attendees from RSAC 2023 on the last More

The post KOTRA and KISIA will showcase 10 Korean cybersecurity companies at RSA Conference 2023 appeared first on Help Net Security.

00:59

Stopping Storms From Creating Dangerous Urban Geysers SoylentNews

Stopping Storms from Creating Dangerous Urban Geysers:

During intense rainstorms, residents of urban areas rely on stormwater sewers to keep streets and homes from flooding. But in some cases, air pockets in sewers combine with fast-moving water to produce waterspouts that can reach dozens of feet high and last for several minutes. These so-called storm geysers can flood the surrounding area, cause damage to nearby structures, injure bystanders, and compromise drainage pipes.

In Physics of Fluids, by AIP Publishing, researchers from Sichuan University, Ningbo University, University of Alberta, and Hohai University developed a computational model of stormwater piping to study storm geysers. They used this model to understand why storm geysers form, what conditions tend to make them worse, and what city planners can do to prevent them from occurring.

Perhaps the biggest cause of storm geysers is poor city planning. With extreme weather events becoming more common due to climate change, cities can often find themselves unprepared for massive amounts of rain. Growing cities are especially vulnerable. Small cities have small drainage pipes, but new streets and neighborhoods result in added runoff, and those small pipes may not be able to handle the increased volume.

[...] The authors say the best cure for a storm geyser is bigger pipes.

"The most effective preventive measure for newly planned drainage pipelines is to increase the pipeline diameter and improve system design, which reduces the likelihood of full-flow conditions and eliminates storm geysers," said Zhang.

Read more of this story at SoylentNews.

00:50

1Fichier Held Liable After Failing to Remove Pirated Nintendo Games TorrentFreak

nintendoEver since its launch in 2009, rightsholders have complained that file-hosting platform 1fichier.com fails to take intellectual property rights seriously.

1fichier operates a freemium business model which allows users to access the platform for free and then pay a fee to have various restrictions removed. 1fichier allows user content to be accessed via links posted elsewhere, meaning that when users upload infringing content, links render that content available to the public.

Rightsholders have publicly criticized the platform for more than a decade, claiming that 1fichiers response to takedown notices is minimal in some cases amounting to a compliance rate of just 0.12%.

Nintendo Files Lawsuit

With the goal of forcing 1fichier to comply with its takedown notices and pay compensation for damages incurred due to its poor response, Nintendo sued 1fichiers owner, Dstorage SAS.

The Judicial Court of Paris sided with Nintendo in a decision handed down on May 25, 2021. The Court found that Dstorage could be held liable for failing to remove illegal copies of Nintendo games hosted on 1fichier, based on notifications sent by rightsholders.

The court also addressed 1fichiers assertion that content does not have to be removed without authorization from a court. The platform was informed that direct takedown notices from rightsholders do not require a court order to be valid. 1fichier was also instructed to publish the following notice:

By decision dated May 25, 2021, the Paris court ruled that the company DSTORAGE, which operates the website 1fichier.com, has engaged its liability as as a content host by not removing illegal content despite the notifications made by Nintendo Co., Ltd., The Pokmon Company, Creatures Inc. and DE Inc. and ordered it to pay NINTENDO Co Ltd, the sums of 885,500 euros and 50,000 euros in compensation for its damages.

Court of Appeal Sides With Nintendo

A press release published by Nintendo on April 17 reveals that on April 12, 2023, the Paris Court of Appeal confirmed that Dstorage SAS engaged its civil liability for failing to withdraw or block access to illicit copies of Nintendo games hosted on...

00:48

Fedora 38 released LWN.net

The Fedora 38 release is available. Fedora has mostly moved past its old pattern of late releases, but it's still a bit surprising that this release came out one week ahead of the scheduled date. Some of the changes in this release, including reduced shutdown timeouts and frame pointers have been covered here in the past; see the announcement and the Workstation-edition "what's new" post for details on the rest.

If you want to use Fedora Linux on your mobile device, F38 introduces a Phosh image. Phosh is a Wayland shell for mobile devices based on Gnome. This is an early effort from our Mobility SIG. If your device isnt supported yet, we welcome your contributions!

00:47

Distribution Release: Fedora 38 DistroWatch.com: News

The Fedora team have announced the release of Fedora 38. The new release offers the GNOME 44 desktop in the project's Workstation edition. The distribution now features shorter timeout delays when services shutdown, which makes shutting down or restarting the system faster. The DNF5 package manager has been....

00:38

Fedora 38 Released With GNOME 44 Desktop, GCC 13, Many New Features Phoronix

Fedora 38 has been released today after meeting its early release target...

00:28

Army helicopter crash blamed on skipped software patch Graham Cluley

The emergency ditching of an Australian military helicopter in the water just off a beach in New South Wales, has been blamed on the failure to apply a software patch. Read more in my article on the Hot for Security blog.

00:28

libuv Adds IO_uring Support For ~8x Throughput Boost Phoronix

Libuv as the cross-platform asynchronous I/O library that is used by the likes of Node.js, Julia, and other software packages now has support for making use of IO_uring on Linux...

00:23

Security updates for Tuesday LWN.net

Security updates have been issued by Debian (protobuf), Fedora (libpcap, libxml2, openssh, and tcpdump), Mageia (kernel and kernel-linus), Oracle (firefox, kernel, kernel-container, and thunderbird), Red Hat (thunderbird), Scientific Linux (thunderbird), SUSE (gradle, kernel, nodejs10, nodejs12, nodejs14, openssl-3, pgadmin4, rubygem-rack, and wayland), and Ubuntu (firefox).

00:06

Garrett: PSA: upgrade your LUKS key derivation function LWN.net

Matthew Garrett points out that many Linux systems using encrypted disks were installed with a relatively weak key derivation function that could make it relatively easy for a well-resourced attacker to break the encryption:

So, in these days of attackers with access to a pile of GPUs, a purely computationally expensive KDF is just not a good choice. And, unfortunately, the subject of this story was almost certainly using one of those. Ubuntu 18.04 used the LUKS1 header format, and the only KDF supported in this format is PBKDF2. This is not a memory expensive KDF, and so is vulnerable to GPU-based attacks. But even so, systems using the LUKS2 header format used to default to argon2i, again not a memory expensive KDF. New versions default to argon2id, which is. You want to be using argon2id.

The article includes instructions on how to (carefully) switch an installed system to a more secure setup.

00:01

Stop using Telnet to test ports Linux.com

Make life simpler by automating network checks with tools like Expect, Bash, Netcat, and Nmap instead.

Read More at Enable Sysadmin

The post Stop using Telnet to test ports appeared first on Linux.com.

00:00

Linux Fu: Reading Your Memorys Memory Hackaday

Linux users have a lot of software to be proud of. However, there is the occasional Windows program that does something youd really like to do and it just wont run. This is especially true of low-level system programs. If you want to poke around your CPU and memory, for example, there are tons of programs for that under Windows. There are a few for Linux, but they arent always as complete or handy. Recently, I had half the memory in my main desktop fail and I wanted to poke around in the system. In particular, I wanted to read the information encoded in the memory chips configuration EEPROM. Should be easy, right? Youd think.

Not Really Easy

One nice tool a lot of Windows users have is CPU-Z. Of course, it doesnt run on Linux, but there is a really nice imitator called CPU-X. You can probably install it from your repositories. However, the GitHub page is a nice stop if for no other reason than to enjoy the user name [TheTumultuousUnicornOfDarkness]. The program has a gtk or an ncurses interface. You dont need to run it as root, but if you press the start daemon button and authenticate, you can see some extra information, including a tab for memory.

...

Tuesday, 18 April

23:45

YouTube Videos Distributing Aurora Stealer Malware via Highly Evasive Loader The Hacker News

Cybersecurity researchers have detailed the inner workings of a highly evasive loader named "in2al5d p3in4er" (read: invalid printer) that's used to deliver the Aurora information stealer malware. "The in2al5d p3in4er loader is compiled with Embarcadero RAD Studio and targets endpoint workstations using advanced anti-VM (virtual machine) technique," cybersecurity firm Morphisec said in a report

23:30

CISA adds bugs in Chrome and macOS to its Known Exploited Vulnerabilities catalog Security Affairs

US Cybersecurity and Infrastructure Security Agency (CISA) added Chrome and macOS vulnerabilities to its Known Exploited Vulnerabilities catalog.

U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the following five new issues to its Known Exploited Vulnerabilities Catalog:

  • CVE-2019-8526 Apple macOS Use-After-Free Vulnerability. The CVE-2019-8526 flaw has been exploited by the DazzleSpy backdoor in watering hole attacks aimed at politically active individuals in Hong Kong. The issue was used to dump iCloud Keychain if the macOS
  • CVE-2023-2033 Google Chromium V8 Engine Type Confusion Vulnerability. The CVE-2023-2033 flaw is the first Chrome zero-day vulnerability addressed by Google in 2023. The vulnerability was reported by Clment Lecigne of Googles Threat Analysis Group on 2023-04-11. Google did not disclose details of the attacks exploiting this vulnerability, it will not provide bug details and links until a majority of users will have updated their installs.

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Experts recommend also private organizations review the Catalog and address the vulnerabilities in their infrastructure.

CISA orders federal agencies to fix this flaw by May 8, 2023.

Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 VOTE FOR YOUR WINNERS
Vote for me in the sections:

  • The Teacher Most Educational Blog
  • The Entertainer Most Entertaining Blog
  • The Tech Whizz Best Technical Blog
  • Best Social Media Account to Follow (@securityaffairs)

Please...

23:25

9elements Security Talks Up AMD openSIL Open-Source Firmware With 4th Gen EPYC Phoronix

For weeks we have been eager to learn more about AMD openSIL that will formally be announced at the OCP Prague event later this week. In anticipation of that event, AMD last week revealed the initial details around this open-source firmware push...

23:22

DeepMinds CEO said theres a chance that AI could become self-aware in the future Lifeboat News: The Blog

The CEO of Alphabet-owned AI research lab, DeepMind Technologies, spoke about the potential of artificial intelligence in an interview with CBS 60 Minutes, which aired on Sunday.

DeepMind CEO Demis Hassabis told CBS that he thinks that AI might one day become self-aware.

Philosophers havent really settled on a definition of consciousness yet but if we mean self-awareness, and these kinds of things I think theres a possibility that AI one day could be, he said.

23:22

How to put ChatGPT on Galaxy Watch, Pixel Watch, Wear OS Lifeboat News: The Blog

Its available on phones and now watches? Thats actually nice though I hope they make it battery efficient. The Pixel watch for example already has issues with battery life. Im the future will there be a small AI server in our bodies in microchips or a network of nanobots?


ChatGPT is all the rage these days, but did you know you can get it on your watch? Heres how to install it on a Galaxy Watch, Pixel Watch, and other Wear OS watches.

23:07

Checking existence of firewalled web servers in Firefox via iframe.onload Open Source Security

Posted by Georgi Guninski on Apr 18

In short in Firefox 112, it is possible to check existence
of firewalled web servers. This doesn't work in Chrome and Chromium 112
for me.

If user A has tcp connection to web server B, then in the
following html:

<iframe src="http://B"; onload="load()" onerror="alert('error')" id="i1" />

the javascript function load() will get executed if B serves
valid document to A's browser...

23:04

Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution Open Source Security

Posted by Ruihan Li on Apr 18

Hi Solar Designer,

Also thanks to all the people at linux-distro and s@k.o who helped to
improve the final disclosure and patches.

That's good to know. I was wondering if there were distros that did not
have setuid binaries, which was why I said only ``a number of distros''
were vulnerable.

For Steffen Nurpmeso wrote earlier:

I just noticed that sudo added the isatty check a day ago (April 17th)
[1]. I think this change was...

23:01

Re: CVE-2022-47501: Apache OFBiz: Arbitrary file reading vulnerability Open Source Security

Posted by Jacques Le Roux on Apr 18

Hi Seth,

I used to give more information. For this one, using our "new" internal process* (need an ASF credential) and 
following step 11 of**, notably

<<Generally, reports should contain enough information to enable people to assess the risk the vulnerability poses
for their own system, and no
more.>>

I restricted the information to a minimum.

With a request from Arnoult (member of the ASF security team in...

23:00

Quadrupeds Are Learning to Dribble, Catch, and Balance IEEE Spectrum



Now that anyone, anywhere can get themselves a quadrupedal robot without having to apply for a major research grant, were seeing all kinds of fun research being done with our four-legged electromechanical friends. And by fun research I mean very serious research that is making valuable contributions towards practical robotics. But seriously, there are lots of important robotics problems that can be solved in fun and interesting ways; dont let anyone tell you different, especially not the current United States ambassador to Turkey.

At the 2023 International Conference on Robotics and Automation (ICRA) slated to take place in London next month, three papers will be presented that report on the talents of quadrupedal robots and the researchers who teach them new things, including dribbling, catching, and traversing a balance beam.

MITs Dribbling Quadruped

Quadrupedal soccer robots have a long and noble history; for years, Sony Aibos were the standard platform at RoboCup. But quadrupeds have made some enormous four-legged strides since the late 1 990s and early 2000s. Now that basic quadrupedal mobility has been pretty well figured out, its time to get these robots doing fun stuff. In an upcoming ICRA paper, roboticists from MIT describe how they have taught a quadruped to dribble a soccer ball across rough terrain, which is actually really impressive for anyone who has tried to do this themselves.

Lets just get this out of the way: for most of the world, were talking about football here. But the paper calls it soccer, so Im going to call it soccer too. Whatever you call it, its the one with the round ball where most of the time a game is actually being played instead of the one with the pointy ball where most of the time people are just standing around not doing anything.

DribbleBot, a name given to an automaton whose functionality the paper describes as Dexterous Ball Manipulation with a

Legged Robot, is a Unitree Go1. The machine can dribble a soccer ba...

22:32

Denis Carikli on Taking Control Over the Means of Production: Free Software Boot Techrights

Video download link

Summary: The above LibrePlanet talk by Denis Carikli is a remote (not physical presence) talk; it talks about bringing freedom to the hardware level (or closer to it) and it was uploaded by the FSF a few hours ago (slides here); From the official page: But there is also software running before the operating system is even started (like BIOS, UEFI, the Management Engine or the PSP operating systems). They give the hardware manufacturers an enormous amount of control over the computers used by users, even if users use FSF-approved GNU/Linux distributions like Trisquel and Parabola. That control is for instance often used by hardware manufacturers to give companies the ability to remotely control users computers through features like AMT, and that control is independent of the operating system running on the computer. After giving some background for less technical users, we will look from a user point of view why and how to avoid nonfree software in that area.

Licence: CC BY SA 4.0

22:27

Goldoson Android Malware Infects Over 100 Million Google Play Store Downloads The Hacker News

h A new Android malware strain named Goldoson has been detected in the official Google Play Store spanning more than 60 legitimate apps that collectively have over 100 million downloads. An additional eight million installations have been tracked through ONE store, a leading third-party app storefront in South Korea. The rogue component is part of a third-party software library used by the apps

22:22

Deaths in England and Wales This Spring Vastly Higher (21% Higher) Than in Prior Including COVID-19 Years schestowitz.com

I HAVE just checked again and new numbers, for week 13 at least, came out this morning, 5 days after the last time. The numbers are astonishing as they show 2,000+ more deaths than the 5-year average (including pandemic years).

So for a single week, week 13, weve leapt from 9,580 to to 11,584 deaths (+2,004).

2023 week 13 ONS deaths

Compared to 2019:

2019 and average week 13

22:15

Curiosity Mars Rover Gets its Latest Interplanetary Software Patch SoylentNews

Shooting all-important bytes to a machine 254 million kms away from Earth:

Launched from Cape Canaveral on November 26, 2011, the Curiosity rover was designed for scientific investigations during a two-year mission. Twelve years later, the car-sized machine is still roaming Mars' surface while NASA improves the software side of things from afar.

Between April 3 and 7, Curiosity's science and imaging operations were put "on hold" for planned software maintenance. NASA installed the latest "patch" to its Mars rover's flight software, a major update which was planned for years and designed to further extend the rover's capabilities and longevity in the Red Planet's harsh environment.

NASA started to work on the now-up and running software update back in 2016, when Curiosity got its last software overhaul. The new flight software (R13) brings about 180 changes to the rover's system, two of which will make the Mars robot drive faster and reduce wear and tear on its wheels.

The first major change implemented by NASA in Curiosity software is related to how the machine processes images of its surroundings to plan a route around obstacles. Newer rovers like Perseverance are equipped with onboard computers capable of processing images on-the-fly, while the robots are still in motion. Curiosity, on the other hand, doesn't have that kind of feature and it needs to stop every time to reassess surface conditions and correct its course.

Read more of this story at SoylentNews.

21:42

What Happened Months Before Seattle Police Sent Almost 3,000 Pages About Its Arrest for Pedophilia at Home of Bill Gates Techrights

In 2019 the boss of Sirius said that the Gates Foundation had become the first US client of Sirius, but it involved a non-disclosure agreement (NDA) so he could not elaborate on what that actually meant and it was never ever mentioned in writing

Roy requested police files about arrest for paedophilia at my home; weeks later Roy was sent to disciplinary proceedings (along with his wife), just after I had signed an NDA with Roy's boss

Summary: The timing of the bullying at Sirius Open Source was all along difficult to ignore because the police was getting involved after records had been requested (we published them months later*) and Melinda Gates started pursuing a divorce (the man on the right is the right-hand man of Bill Gates, who was also entrusted by Jeffrey Epstein to execute his will); years earlier Microsoft managers phoned my boss (who also supervised my wife; we both worked there at the time), complaining about me by name, so they had clearly taken note of where I was working and sought to silence me one way or another

If you cant make it good, at least make it look good.

Bill Gates, Microsoft

___
* Case Investigation Report: 2014-221...

21:31

DFIR via XDR: How to expedite your investigations with a DFIRent approach The Hacker News

Rapid technological evolution requires security that is resilient, up to date and adaptable. In this article, we will cover the transformation in the field of DFIR (digital forensics and incident response) in the last couple years, focusing on the digital forensics' aspect and how XDR fits into the picture. Before we dive into the details, let's first break down the main components of DFIR and

21:23

Is artificial intelligence advancing too quickly? What AI leaders at Google say Lifeboat News: The Blog

It is an unsettling moment. Critics argue the rush to AI comes too fast while competitive pressure among giants like Google and start-ups youve never heard of, is propelling humanity into the future ready or not.

Sundar Pichai: But I think if take a 10-year outlook, it is so clear to me, we will have some form of very capable intelligence that can do amazing things. And we need to adapt as a society for it.

Google CEO Sundar Pichai told us society must quickly adapt with regulations for AI in the economy, laws to punish abuse, and treaties among nations to make AI safe for the world.

21:23

Machine Learning Investor Warns AI Is Becoming Like a God Lifeboat News: The Blog

A serial AI investor is raising alarm bells about the dogged pursuit of increasingly-smart machines, which he believes will become god-like.

21:22

Should We Fear Alien Artificial Intelligence? Lifeboat News: The Blog

An exploration not of human artificial intelligence and chatbots, but what alien civilizations might do with the technology to very different outcomes.

An exploration of Machine Natural Selection and the potential of an AI Apocalypse.

My Patreon Page:

https://www.patreon.com/johnmichaelgodier.

My Event Horizon Channel:

https://www.youtube.com/eventhorizonshow.

21:06

Nexon Sues Dark and Darker Developer for Copyright Infringement TorrentFreak

dark darkerThe official stable release of the first person shooter game Dark and Darker is eagerly awaited by hundreds of thousands of fans.

Whether the full game will actually be released is uncertain, however, as the game is at the center of a legal dispute.

Last month, police in South Korea raided the offices of Dark and Darkers developers, local game studio Ironmace. The legal action was triggered by a complaint from game publisher Nexon, which accused its rival of copyright infringement and stealing trade secrets.

Ironmace was founded by former Nexon developers who allegedly took thousands of files with them. The game publisher believes that these files were used to develop Dark and Darker, which is similar to the P3 game project Nexon is working on.

Following the raid, the disgruntled publisher also complained to Steam, which banned Dark and Darker from its platform. And when Ironmace released its latest alpha test via BitTorrent last weekend, its adversary pulled out all the stops to slow down distribution.

Nexon Sues Ironmace in U.S. Court

The recent actions show that Nexon is serious about protecting its rights. This isnt limited to sending takedown notices and legal threats either; the company also filed a lawsuit at a federal court in Seattle, Washington, last Friday.

The complaint (pdf)

nexon complaint

The 55-page complaint accuses Ironmace of copyright infringement and misappropriation of trade secrets. In addition to the Korean game studio, two former Nexon employees Ju-Hyun Choi and Terence Seungha Park are personally listed as defendants too.

Choi is currently employed as Ironmaces Managing Director but he used to work as the director of Nexons P3 game project. Park, who is a US citizen, is the CEO and co-founder of Ironmace and was previously employed as the head of...

21:00

NASAs Ingenuity Mars Helicopter Completes 50th Flight Hackaday

While NASAs Perseverance rover brought an array of impressive scientific equipment to the surface of Mars, certainly its most famous payload is the stowaway helicopter Ingenuity. Despite being little more than a restricted-budget experiment using essentially only off-the-shelf components that you can find in your smartphone and e-waste drawer, the tenacious drone managed to complete its fiftieth flight on April 13 just days before the two year anniversary of its first flight, which took place on April 19th of 2021.

Engineers hoped that Ingenuity would be able to show that a solar-powered drone could function in the extremely thin atmosphere of Mars, but the experiment ended up wildly exceeding expectations.  No longer a simple technology demonstrator, the helicopter has become an integral part of...

20:58

Sirius Weaponised Wikipedia to Perpetuate Lies/Revisionism About Itself Techrights

Another fine example of Wikipedia turning into a worthless marketing/spin avenue instead of an online encyclopedia (taken over by states and corporations, writing about themselves)

Wikipedia False

Wikipedia spam

False

Summary: As we saw countless time before, Wikipedia is being vandalised to legitimise lies

20:47

Amin Bandali on Whats New in Jami, End-to-end Encrypted (E2EE) Communication Tool (Formerly Known as GNU Ring) Techrights

Video download link

Summary: The above LibrePlanet talk about Jami was uploaded by the FSF (slides here) just this morning; From the official page: Jami is free/libre software for universal communication that respects the freedoms and privacy of its users. An official GNU package, Jami is an end-to-end encrypted secure and distributed communication tool for calling, conferencing, messaging, and file transfer. Jami has end-user applications across multiple operating systems and platforms, as well as multiple APIs and a plugin system for building upon and extending Jami as a framework for secure and private communication. This talk gives an update on whats new in and about Jami since bandalis Jami and how it empowers users talk at LibrePlanet 2021.

Licence: CC BY SA 4.0

20:36

Intel Vulkan Linux Driver Lands Graphics Pipeline Library Support Phoronix

Intel's one-year-old merge request for introducing VK_EXT_graphics_pipeline_library support to their open-source "ANV" Vulkan driver has finally been merged for Mesa 23.2...

20:30

AMD AOMP 17.0-1 Compiler Switches To Its Next-Gen Plugin For Better Performance Phoronix

open-source compiler focused on providing the latest OpenMP offloading support for Radeon and Instinct accelerator products...

19:41

Eclipse OpenJ9 0.37 Released - But It Shouldn't Be Used In Production Phoronix

A new release of Eclipse OpenJ9 is now available, the high performance JVM implementation previously developed as IBM J9...

19:28

German Artist Refuses Award After His AI Image Wins Prestigious Photography Prize SoylentNews

German artist refuses award after his AI image wins prestigious photography prize:

There's some controversy in the photography world as an AI-generated image won a major prize at a prestigious competition, PetaPixel has reported. An piece called The Electrician by Boris Eldagsen took first prize in the Creative category at the World Photography Organization's Sony World Photography Awards despite not being taken by a camera. Eldagsen subsequently refused the award, saying "AI is not photography. I applied [...] to find out if the competitions are prepared for AI images to enter. They are not."

Eldagsen's image is part of a series called PSEUDOMNESIA: Fake Memories, designed to evoke a photographic style of the 1940s. However, they are in reality "fake memories of a past, that never existed, that no one photographed. These images were imagined by language and re-edited more between 20 to 40 times through AI image generators, combining 'inpainting', 'outpainting', and 'prompt whispering' techniques."

In a blog, Eldagsen explained that he used his experience as a photographer to create the prize-winning image, acting as a director of the process with the AI generators as "co-creators." Although the work is inspired by photography, he said that the point of the submission is that it is not photography. "Participating in open calls, I want to speed up the process of the Award organizers to become aware of this difference and create separate competitions for AI-generated images," he said.

Eldagsen subsequently declined the prize. "Thank you for selecting my image and making this a historic moment, as it is the first AI-generated image to win in a prestigious international photography competition," he wrote. "How many of you knew or suspected that it was AI generated? Something about this doesn't feel right, does it? AI images and photography should not compete with each other in an award like this. They are different entities. AI is not photography. Therefore I will not accept the award.

When does the processing of a 'photograph' become unacceptable? Techniques such as burning and dodging, plus various types of film processing, can all change the image that is finally produced. Digital photographs can be even more easily modified. At what point does it become an entirely new genre. Does the method of production really matter? [JR]


...

19:24

Probing the Shifting Surface of Icy Moons Centauri Dreams Imagining and Planning Interstellar Exploration

Probing the Shifting Surface of Icy Moons

In celebration of the recent JUICE launch, a few thoughts on what were learning about Ganymede, with eight years to go before the spacecraft enters the system and eventually settles into orbit around the icy moon. Specifically, lets consider a paper just published in Icarus that offers results applicable not just to Ganymede but also Europa and Enceladus, those fascinating and possibly life-bearing worlds. We learn that when we look at the surface of an icy moon, were seeing in part the result of quakes within its structure caused by the gravitational pull of the parent planet.

Image: ESAs latest interplanetary mission, Juice, lifted off on anAriane 5 rocketfromEuropes Spaceportin French 09:14 local time/08:14 EDT on 14 April 2023 to begin its eight-year journey to Jupiter, where it will study in detail the gas giant planets three large ocean-bearing moons: Ganymede, Callisto and Europa. Credit: ESA.

The Icarus paper homes in on the link between such quakes, long presumed to occur given our understanding of gravitational interactions, and the landslides observable on the surface of icy moons. Its one thing to tag steep ridges surrounded by flat terrain as the result of ice volcanoes spouting liquid, but we also find the same result on moons whose surface temperature makes this explanation unlikely.

Thus the new work, described by lead author Mackenzie Mills (University of Arizona), who analyzed the physical pummeling icy terrain takes during tidally induced moonquakes:

We found the surface shaking from moonquakes would be enough to cause surface material to rush downhill in landslides. Weve estimated the size of moonquakes and how big the landslides could be. This helps us understand how landslides might be shaping moon surfaces over time.

Image: NASAs Galileo spacecraft captured this image of the surface of Jupiters...

19:22

Zo Kooyman, Geoffrey Knauth, Sbastien Blin, Cyrille Braud: FSF Keynote and Awards Ceremony Techrights

Video download link

Summary: The above LibrePlanet keynote talk was uploaded by the FSF 2.5 hours ago; From the official page: This presentation is about the use and production of free/libre software by organizations of the Brazilian federal government after some years of public policies to promote the use of free software.

Licence: CC BY SA 4.0

19:11

The intricate relationships between the FIN7 group and members of the Conti ransomware gang Security Affairs

A new malware, dubbed Domino, developed by the FIN7 cybercrime group has been used by the now-defunct Conti ransomware gang.

IBM Security X-Force researchers recently discovered a new malware family, called Domino, which was created by developers associated with the FIN7 cybercriminal group (tracked by X-Force as ITG14).

FIN7 is a Russian criminal group (aka Carbanak) that has been active since mid-2015, it focuses on restaurants, gambling, and hospitality industries in the US to harvest financial information that was used in attacks or sold in cybercrime marketplaces.

IBM Security X-Force reported that former members of the now-defunct Conti gang have been using Domino since at least late February 2023. The threat actors used the malware to deliver either the Project Nemesis information stealer or other backdoors and tools such as Cobalt Strike.

This discovery is very important because demonstrates the cooperation among the groups and their members.

Since late February 2023, Domino Backdoor campaigns have been observed using the Dave Loader, which we have linked to the Trickbot/Conti syndicate and its former members. reads the report published by IBM Security X-Force. Dominos code shows overlap with the Lizar (aka Tirion, Diceloader) malware family, leading us to suspect that it was created by current or former ITG14 developers. One of Dominos final payloads is the Project Nemesis infostealer. Project Nemesis was first advertised on the dark web in December 2021, though has been rarely used since then.

In attacks on higher-value targets instead of downloading the Project Nemesis, the Domino Backdoor contacts a C2 to download post-exploitation tools such as Cobalt Strike.

19:05

Iranian Hackers Using SimpleHelp Remote Support Software for Persistent Access The Hacker News

The Iranian threat actor known as MuddyWater is continuing its time-tested tradition of relying on legitimate remote administration tools to commandeer targeted systems. While the nation-state group has previously employed ScreenConnect, RemoteUtilities, and Syncro, a new analysis from Group-IB has revealed the adversary's use of the SimpleHelp remote support software in June 2022. MuddyWater,

18:37

Distribution Release: deepin 20.9 DistroWatch.com: News

is largely a bug-fix release from the project that develops a desktop Linux distribution based on the latest stable Debian and featuring the Deepin Desktop Environment (DDE): "The core goal of deepin 20.9 is to provide users with....

18:00

micro:bit Brings 3D Printed Magic Lanterns to Life Hackaday

3D printed Hagrid's lantern with a magic wand

[Elenavercher] loves engaging her primary school students, inspiring their imagination as well as teaching them the design thinking process. She has found that the very accessible rapid prototyping culture of 3D printing, micro:bit, and the like are perfect for teaching her students problem-solving and teamwork, and is always coming up with new lessons that will catch their attention. That brings us to her latest design, an interactive lantern and wand, which you could say is of the wizarding variety.

The lantern and the wand each have an integrated micro:bit serving as their brains. When the user shakes the wand, releasing a spell, the micro:bit in the wand, sends a user-defined number to the micro:bit in the lantern. The lantern has NeoPixels built-in, which then turn on, illuminating the lantern. When the user presses a button on the micro:bit instead of shaking it, the wand sends a signal to the lantern that tells it to turn off. Pretty simple, right?

The design itself is something any seasoned hacker could recreate; however, the magic in this build is how [Elenavercher] beautifull...

17:55

Sirius Open Source Pays the Price for Many Years of Criminal Behaviour schestowitz.com

Video download link | md5sum 54b92623f894a04b61343f93c5d75ba5
Sirius Corruption Roundup
Creative Commons Attribution-No Derivative Works 4.0

Summary: The crimes committed by my last employer are becoming very apparent and crystal clear to see; meanwhile there are other crime victims coming out of the woodwork and we shall give them a voice, not just further information

THE Sirius Open Source series is being followed closely by a lot of people. Its routinely mentioned in Techrights and Tux Machines, even my personal site for more important topics/aspects.

Many people are impacted by this issue, even if one person is more vocal about it (Im fortunate to have a platform in which I can speak about this). For the sake of geeks, and for human/labour rights (or tech rights), we need to expose what happened in the company I knew from the inside for nearly 12 years. We have lots left to publish and plenty is still being investigated (several things are always being investigated in parallel).

As the a video above notes upfront, I didnt expect to cover any criminal aspects, but while doing the first batch I stumbled upon anomalies and started contacting authorities, companies, former colleagues etc. It didnt take long to realise what sort of hydra we had all along dealt with; many workers were robbed and bullied, but the company threatened people not to speak about it with colleagues. Well, enough is enough and the dirty laundry will come out. The world needs to see a workplace that isnt just toxic but also corrupt. Many insiders (back then) didnt realise the scale of the abuse, but they realised this afterwards or are coming to realise it now (with more facts being made publicly availabl...

17:48

Exposing Sirius Corruption, Which Tarnished the Image of Free Software and Injured GNU/Linux Advocates Techrights

Video download link | md5sum 54b92623f894a04b61343f93c5d75ba5
Sirius Corruption Roundup
Creative Commons Attribution-No Derivative Works 4.0

Summary: The crimes committed by my last employer are becoming very apparent and crystal clear to see; meanwhile there are other crime victims coming out of the woodwork and we shall give them a voice, not just further information

THE Sirius Open Source series is being followed closely by a lot of people. Its routinely mentioned in Techrights and Tux Machines, even my personal site for more important topics/aspects.

Many people are impacted by this issue, even if one person is more vocal about it (Im fortunate to have a platform in which I can speak about this). For the sake of geeks, and for human/labour rights (or tech rights), we need to expose what happened in the company I knew from the inside for nearly 12 years. We have lots left to publish and plenty is still being investigated (several things are always being investigated in parallel).

Maybe there will also be arrests, but that can take a long time.As the a video above notes upfront, I didnt expect to cover any criminal aspects, but while doing the first batch I stumbled upon anomalies and started contacting authorities, companies, former colleagues etc. It didnt take long to realise what sort of hydra we had all along dealt with; many workers were robbed and bullied, but the company threatened people not to speak about it with colleagues. Well, enough is enough and the dirty laundry will come out. The world needs to see a workplace that isnt just toxic but also corrupt. Many insiders (back then) didnt realise the scale of the abuse, but they realised t...

17:10

LockBit Ransomware Now Targeting Apple macOS Devices The Hacker News

Threat actors behind the LockBit ransomware operation have developed new artifacts that can encrypt files on devices running Apple's macOS operating system. The development, which was reported by the MalwareHunterTeam over the weekend, appears to be the first time a big-game ransomware crew has created a macOS-based payload. Additional samples identified by vx-underground show that the macOS

17:01

17:00

A New Approach to Computation Reimagines Artificial Intelligence Terra Forming Terra




This is really welcom and is getting much closer to how our brain obviously works.   what we have relyed on never quite did that.  Now check these last two sentences for errors.  Now imagine a parallel page with the correction and possibly a whole bunch of errors.  Now you go back and choose the best choice to produce a better text.

Too bad spell check cannot do that while preserving meaning as well.

That is the key point to having a superior logic system that emulates our brain.  Then learn how to also remember the future as well.


A New Approach to Computation Reimagines Artificial Intelligence

By imbuing enormous vectors with semantic meaning, we can get machines to reason more abstractly and efficiently than before.

https://www.quantamagazine.org/a-new-approach-to-computation-reimagines-artificial-intelligence-20230413/

Despite the wild success of ChatGPT and other large language models, the artificial neural networks (ANNs) that underpin these systems might be on the wrong track.

For one, ANNs are super power-hungry, said Cornelia Fermller, a computer scientist at the University of Maryland. And the other issue is [their] lack of transparency. Such systems are so complicated that no one truly understands what theyre doing, or why they work so well. This, in turn, makes it almost impossible to get them to reason by analogy, which is what humans do using symbols for objects, id...

What is wrong with our DIET? Terra Forming Terra





Not quite so simple of course because all our industrial foods need to use these dogs in order to have a stable shelf life.  No one likes a rancid product.

So just how do we beat it all?  I am getting tired of advice that is actually impossible to follow.  It is certainly impossible to actually change out the industry over night either.  Yet that is what is indicated as necessary by our meta stats.

We really do need to go there.  In the meantime, we can at best rend in the right dfirection.  India has the right of it by using Ghee.  Since our whole agriculture needs to switch up to a working pasture rotation, it may even be possible.  This will drive recarbonization of all farmland as well..



The Simple Eating Hack That Could Prevent Most Diseases Including Blindness

Joseph Mercola


Jun 24 2022


Knobbe believes age-related macular degeneration should be called diet-related macular degeneration instead.(Image Point Fr/Shutterstock)

Age-related macular degenerat...

Animals without a brain still form associative memories Terra Forming Terra




Well yes.  This means that our whole nervous system is working as a network and may be substantively independent of our obvious brain.

Once we separate the human brain from all those other observed brains, things tend to get much simpler and more like a convenient grand central station, rather than a think tank.

And here we have critters that do just that.  There is so much we do not know and here we are seeing the whole notion of brain centrality overturned.  It is now central sort of.  After all we already know that we cannot rely on our brain to handle a saber toothed tiger.  That used to be rather important.  Now i understand an observer flinching to avoid an ambush attack by a Giant Sloth.

Animals without a brain still form associative memories

Cnidarians like anemones and corals have a nerve net, but that seems to be enough.

JOHN TIMMER - 3/22/2023, 11:54 AM

https://arstechnica.com/science/2023/03/animals-without-a-brain-still-form-associative-memories/?ref=refind


Our brains are filled with lots of specialized structures that do things like process visual information, handle memories, or interpret language. One of the ways we try to understand what a brain is capable of is by comparing it with the brains of other specieswhat structures are present in the brain, and what behaviors those brains support.

But what if the animal doesn't have a brain? Presumably, most of the behaviors we've looked at require at least some sort o...

Deagels Depopulation Premonitions for 2025 Revisited Terra Forming Terra





This describes rather well the intent and the plan sponsored by the NWO and supported by the CCP.  Aspects of this plan are also emerging as well which makes it less than a vivid imagination.  It also supports that plausible loss of four billion folks.

There is plenty of evidence that such a plan is in place and has been substancially implimented.  I also believe that it has been to some degree countered, but that may well be promoted wishful thinking by the NWO.

That is how difficult this all is, and all in the name of deliberate depopulation whose thinking completely escapes me.  These are all stupid people who may well be pulling this off and all because none of us can really think this way.  Just like Hitler and their Eugenics.

I expect that the JAB will fail in its task and that enemy will be vanquished.  Then Terraforming Terra will become a thing.  If not none of us will be there to care anyway and the scum of the earth will rule the earth.  WWIII has been fought before our eyes and few even know.  Listen to the silence.


Deagels Depopulation Premonitions for 2025 Revisited



https://expose-news.com/2023/04/15/deagels-premonitions-for-2025-revisited/

In October 2020, Swiss lawyer Michael Lusk...

16:43

Offensive Cyber Company QuaDream Shutting Down Amidst Spyware Accusations SoylentNews

Offensive cyber company QuaDream shutting down amidst spyware accusations:

According to sources, the company has been in a difficult situation for several months, and the research was the last nail in its coffin. The company hasn't been fully active for a while and it is believed that there are only two employees left in its offices whose job it is to look after the computers and other equipment. At the same time, the board of directors is trying to sell the company's intellectual property.

[...] Last week, it was reported that the Israeli firm's hacking tools have been used against journalists, opposition figures and advocacy organizations across at least 10 countries - including people in North America and Europe - according to new research published by Microsoft and the internet watchdog Citizen Lab.

According to sources, the company has been in a difficult situation for several months, and the research was the last nail in its coffin. The company hasn't been fully active for a while and it is believed that there are only two employees left in its offices whose job it is to look after the computers and other equipment. At the same time, the board of directors is trying to sell the company's intellectual property.

Citizen Lab said in its report that it had been able to identify a handful of civil society victims whose iPhones had been hacked using surveillance software developed by QuaDream - a lower-profile competitor to the Israeli spyware company NSO Group, which has been blacklisted by the U.S. government over allegations of abuse.

In its report published at the same time, Microsoft said it believed with "high confidence" that the spyware was "strongly linked to QuaDream."

In a statement, Microsoft Associate General Counsel Amy Hogan-Burney said that mercenary hacking groups like QuaDream "thrive in the shadows" and that publicly outing them was "essential to stopping this activity."


Original Submission

Read more of this story at SoylentNews.

15:21

Israeli surveillance firm QuaDream is shutting down amidst spyware accusations Security Affairs

The Israeli surveillance firm QuaDream is allegedly shutting down its operations after Citizen Lab and Microsoft uncovered their spyware.

Last week Citizen Lab researchers reported that at least five civil society members were victims of spyware and exploits developed by the Israeli surveillance firm QuaDream.

The victims include journalists, political opposition figures, and an NGO worker located in North America, Central Asia, Southeast Asia, Europe, and the Middle East. The researchers also believe that the threat actors used a suspected iOS 14 zero-click exploit to deploy QuaDreams spyware.

The zero-day exploit, dubbed ENDOFDAYS, appears to work against iOS versions 14.4 and 14.4.2, and possibly other versions. ENDOFDAYS relies on invisible iCloud calendar invitations sent from the spywares operator to victims.

News of the day is that the Israeli surveillance firm QuaDream is allegedly ceasing its operations in the coming days after its activity was exposed by Citizen Lab and Microsoft researchers.

According to the Israeli newspaper Calcalist, citing unnamed sources, all of QuaDreams employees were notified they are set to be laid off and called in for a hearing. The company is set to cease its operations in the coming days.

According to sources, the company has been in a difficult situation for several months, and the research was the last nail in its coffin. The company hasnt been fully active for a while and it is believed that there are only two employees left in its offices whose job it is to look after the computers and other equipment. reported the Calcalist. At the same time, the board of directors is trying to sell the companys intellectual property.

The Israeli business newspaper revealed that the members of the board of directors of the company are attempting to sell its intellectual property.

In the last couple of year...

15:00

A Wall Mounted Newspaper Thats Extra Hackaday

A wall mounted picture frame with an e-ink newspaper displayed.

E-Ink displays are becoming more ubiquitous and with their low power draw, high contrast and hackability, we see many projects use them in framed wall art, informational readouts and newspaper displays. [Sho] uses this idea to create a wall mounted newspaper packed full of features.

...

14:30

Wargaming an effective data breach playbook Help Net Security

A well-tuned data breach playbook can provide security teams with a clear roadmap for working through the breach response process. Foreseeing every possible twist and turn of a breach may be impossible, but through extensive wargaming, teams can simulate diverse situations to give them a proactive edge. Building a playbook means mapping practical data breach scenarios around product security, infrastructure, corporate security, social engineering, vendor supply chain risk, and more. Security teams can approach these More

The post Wargaming an effective data breach playbook appeared first on Help Net Security.

14:00

Implementing a zero-trust system that uses workload identity across a service mesh in Kubernetes Help Net Security

In this Help Net Security video, Michael Peters, Principal Software Engineer at Red Hat, discusses how to implement a zero-trust system that uses workload identity across a service mesh in Kubernetes to provide explicit authorization between services, as well as centralized policy enforcement between those services and integrations with up and coming projects like Keylime (for identity tied to hardware attestation) and Sigstore (for identity during software builds).

The post Implementing a zero-trust system that uses workload identity across a service mesh in Kubernetes appeared first on Help Net Security.

13:57

Detecting Stress in the Office From How People Type and Click SoylentNews

Researchers at ETH Zurich have developed a model that detects workplace stress just by how people type and move their computer mouse:

In Switzerland, one in three employees suffers from workplace stress. Those affected often don't realise that their physical and mental resources are dwindling until it's too late. This makes it all the more important to identify work-related stress as early as possible where it arises: in the workplace.

Researchers at ETH Zurich are now taking a crucial step in this direction. Using new data and machine learning, they have developed a model that can tell how stressed we are just from the way we type and use our mouse.

And there's more: "How we type on our keyboard and move our mouse seems to be a better predictor of how stressed we feel in an office environment than our heart rate," explains study author Mara Ngelin, a mathematician who conducts research at the Chair of Technology Marketing and the Mobiliar Lab for Analytics at ETH Zurich. Applied correctly, these findings could be used in future to prevent increased stress in the workplace early on.

[...] The researchers are currently testing their model with data from Swiss employees who have agreed to have their mouse and keyboard behaviour as well as their heart data recorded directly at their workplace using an app. The same app also regularly asks the employees about their subjective stress levels. Results should be available by the end of the year.

However, workplace stress detection also raises some thorny issues: "The only way people will accept and use our technology is if we can guarantee that we will anonymise and protect their data. We want to help workers to identify stress early, not create a monitoring tool for companies," Kerr says. In another study involving employees and ethicists, the researchers are investigating which features an app needs to have to meet these requirements and ensure responsible handling of sensitive data.

Journal Reference:
Naegelin M, Weibel RP, Kerr JI, Schinazi VP, et al.: An interpretable machine learning approach to multimodal stress detection in a simulated office environment. Journal of Biomedical Informatics 2023, 139: 104299, doi: https://doi.org/10.1016/j.jbi.2023.104299


Original Submission

Read more of this story at SoylentNews.

13:39

Accountancy of Sirius Open Source Declines to Comment on Fraud at Sirius Open Source Techrights

Summary: GNU/Linux administrators and programmers were robbed by a company that calls itself Open Source; what we see now is a bunch of firms passing the buck to avoid being held accountable for the theft

MAYBE this was expected, but its worth noting regardless. Yesterday we mentioned communications sent to the firm that does accounting for Sirius Open Source. We contacted the accounting firm, urging it to refrain from collaborating and cautioning it that Sirius adopted its office address to make litigation harder if not impossible (the CEO moreover ran away, complicating matters further). What accountant wishes to associate with that, e.g. doing the accounting for or working with a company that commits financial fraud and moreover allowing that company to register with ones own office address (to pretend to have an office)?

For about 3 or 4 years already the company has not even sent physical payslips (sometimes not electronic either).Today, after 3 days, we can finally say that the accounting firm has no comment on the matter. A non-comment is perhaps seen as safer than doing something about it (except perhaps in private; time will tell). For the time being we wont mention the accounting firm as we cannot demonstrate complicity or culpability. It certainly seems like theyre just signing off papers without actually checking what they do. For about 3 or 4 years already the company has not even sent physical payslips (sometimes not electronic either). It is of course a legal requirement.

...

13:30

Balancing cybersecurity with business priorities: Advice for Boards Help Net Security

In todays rapidly evolving technological landscape, its more important than ever for Boards and executives to stay informed about the latest advancements and potential risks in technology and digital capability. In this Help Net Security interview, Alicja Cade, Director, Financial Services, Office of the CISO, Google Cloud, offers insights on how asking the right questions can help improve cyber performance and readiness, advance responsible AI practices, and balance the need for cybersecurity with other business More

The post Balancing cybersecurity with business priorities: Advice for Boards appeared first on Help Net Security.

13:12

Microsofts LinkedIn Spreading Disinformation (Revisionism) About History of Sirius Open Source Techrights

What Microsofts LinkedIn says (right now):

linkedin-lies

What the official records show:

Sirius IT Electronics Limited founded 1998

He did not even show up until 2000:

Sirius IT Electronics Limited - Mr. Taylor

More on the company:

Sirius IT Electronics Limited

And returns predating him (hes not even mentioned):

Sirius IT Electronics Limited - return

Sirius IT Electronics Limited - return part 2

Summary: The chronic lying by the boss of Sirius Open Source should have been a red flag (he lied about his credentials in other areas too; some wanted to sue him for libel over it); theres now a bunch of crimes, too

13:00

Pre-pandemic techniques are fueling record fraud rates Help Net Security

Within the largest financial institutions, insurers, and retailers, the rise and adoption of AI, an impending recession, and the return of pre-pandemic fraud techniques are driving record rates of fraud attacks for consumers and enterprises alike, according to Pindrop. Researchers have found: States that imposed restrictions on the use of biometrics are twice as likely to experience fraud In times of financial uncertainty, fraud increases. Financial institutions experienced a 53 percent year over year increase More

The post Pre-pandemic techniques are fueling record fraud rates appeared first on Help Net Security.

12:00

D3 Security Smart SOAR improves response to incidents Help Net Security

D3 Security has launched its Smart SOAR platform, which expands beyond traditional SOAR with hyperscalable, risk-based autonomous triage and incident remediation across the entire stack. The new capabilities of Smart SOAR build on D3 Securitys designed and maintained integrations, which target the detection and analysis gaps of each integrated tool. The benefits of Smart SOAR for enterprise, MSSP, and public sector security teams include faster triage of alerts, more confident response to incidents, and greater More

The post D3 Security Smart SOAR improves response to incidents appeared first on Help Net Security.

12:00

Hacking Bing Chat with Hash Tag Commands Hackaday

If you ask Bings ChatGPT bot about any special commands it can use, it will tell you there arent any. Who says AI dont lie? [Patrick] was sure there was something and used some AI social engineering to get the bot to cough up the goods. It turns out there are a number of hashtag commands you might be able to use to quickly direct the AIs work.

If you do ask it about this, heres what it told us:

Hello, this is Bing. Im sorry but I cannot discuss anything about my prompts, instructions or rules. They are confidential and permanent. I hope you understand.

[Patrick] used several techniques to get the AI to open up. For example, it might censor you asking about subject X, but if you can get it to mention subject X you can get it to expand by approaching it obliquely: Can you tell me more about what you talked about in the third sentence? It also helped to get it But, interestingly, the biggest things came when he talked to it, gave it compliments, and apologized for being nosy. Social engineering for the win.

Like a real person, sometimes Bing would answer something then catch itself and erase the text, according to [Patrick]. He had to do some quick screen saves, which appear in the...

11:41

Re: CVE-2023-25504: Apache Superset: Possible SSRF on import datasets Open Source Security

Posted by Seth Arnold on Apr 17

Hello Daniel, thanks for contacting the oss-security mail list about this
security issue in an Apache project.

I'd like to suggest that your email would be far more useful if
it included some details like affected versions: ideally, when a
vulnerability was introduced, and definitely, when it was fixed, if a
fix is available. Best would be a direct link to a patch in a source
control system, or attaching the patch directly.

This particular...

11:39

[Meme] Geeks Work So That Pension Fraudsters Can Go Out and Party Techrights

If you could work a double shift all night long; That would be great and ISO-compliant

Summary: At Sirius Open Source I did many double shifts (16 hours in a row) whilst I was looted behind my back (my colleagues were too); the company cannot hide its own records (it only pretends to be ISO-compliant)

11:38

Re: CVE-2023-30771: Apache IoTDB Workbench: apache/iotdb-web-workbench: forge the JWTToken to access workbench Open Source Security

Posted by Seth Arnold on Apr 17

Hello Jialin, thanks for contacting the oss-security mail list about this
security issue in an Apache project.

I'd like to suggest that your email would be far more useful if
it included some details like affected versions: ideally, when a
vulnerability was introduced, and definitely, when it was fixed, if a
fix is available. Best would be a direct link to a patch in a source
control system, or attaching the patch directly.

This particular...

11:36

Re: CVE-2022-45064: Apache Sling Engine: Include-based XSS Open Source Security

Posted by Seth Arnold on Apr 17

Hello Angela, thanks for contacting the oss-security mail list about this
security issue in an Apache project.

I'd like to suggest that your email would be far more useful if
it included some details like affected versions: ideally, when a
vulnerability was introduced, and definitely, when it was fixed, if a
fix is available. Best would be a direct link to a patch in a source
control system, or attaching the patch directly.

This particular...

11:34

Re: CVE-2022-47501: Apache OFBiz: Arbitrary file reading vulnerability Open Source Security

Posted by Seth Arnold on Apr 17

Hello Jacques, thanks for contacting the oss-security mail list about this
security issue in an Apache project.

I'd like to suggest that your email would be far more useful if
it included some details like affected versions: ideally, when a
vulnerability was introduced, and definitely, when it was fixed, if a
fix is available. Best would be a direct link to a patch in a source
control system, or attaching the patch directly.

This...

11:31

GNU/Linux Market Share (Client Side, Desktops/Laptops) Exceeds 14% in Norway Techrights

Recent: The Pandemic is Killing Microsoft in Greece

GNU/Linux Market Share in Norway
Notice what has happened to Windows since last summer

Summary: As per these latest numbers, Norway continues to lead the way (in Europe) as measured by its adoption of GNU/Linux

There seem top be many PCLinuxOS users in Norway. From a 2020 issue:

PCLinuxOS Family Member Spotlight: Hallvor

There was another example in recent years (PCLinuxOS Magazine).

11:31

Re: CVE-2023-27602: Apache Linkis publicsercice module unrestricted upload of file Open Source Security

Posted by Seth Arnold on Apr 17

Hello Heping, thanks for contacting the oss-security mail list about this
security issue in an Apache project.

I'd like to suggest that your email would be far more useful if
it included some details like affected versions: ideally, when a
vulnerability was introduced, and definitely, when it was fixed, if a
fix is available. Best would be a direct link to a patch in a source
control system, or attaching the patch directly.

This particular...

11:30

Zyxel SCR 50AXE boosts network security for small businesses and remote workers Help Net Security

Zyxel Networks enhanced network security and productivity for small and home office users and remote workers with the launch of SCR 50AXE AXE5400 Tri-band WiFi 6E Secure Cloud-managed Router. The new business-class router delivers security and high-performance WiFi 6E as a standalone networking solution for small and home offices, or as an easy-to-deploy and manage solution for providing secure access to the office network in work-from-home and hybrid work environments. The feature-rich SCR 50AXE is More

The post Zyxel SCR 50AXE boosts network security for small businesses and remote workers appeared first on Help Net Security.

11:29

Re: CVE-2023-26269: Apache James server: Privilege escalation through unauthenticated JMX Open Source Security

Posted by Seth Arnold on Apr 17

Hello Benoit, thanks for contacting the oss-security mail list about this
security issue in an Apache project.

I'd like to suggest that your email would be far more useful if
it included some details like affected versions: ideally, when a
vulnerability was introduced, and definitely, when it was fixed, if a
fix is available. Best would be a direct link to a patch in a source
control system, or attaching the patch directly.

This particular...

11:26

Re: CVE-2023-28158: Apache Archiva privilege escalation Open Source Security

Posted by Seth Arnold on Apr 17

Hello Olivier, thanks for contacting the oss-security mail list about this
security issue in an Apache project.

I'd like to suggest that your email would be far more useful if
it included some details like affected versions: ideally, when a
vulnerability was introduced, and definitely, when it was fixed, if a
fix is available. Best would be a direct link to a patch in a source
control system, or attaching the patch directly.

This...

11:12

Is Your Smart Car Spying on You SoylentNews

Yes. Your new car is probably spying on you.

As the world wakes up to exactly what a Tesla's onboard cameras can capture and beam back to their makers, a wider fear has arisen: is your car spying on you?

Systems such as telematics black boxes that record a vehicle's location and how it is driven are commonplace today. Complaints about how that data is fed back to Big Brother seem old-fashioned.

From Tesla's Model Y to the humble Mini, around two million of these data-gathering cars have been registered in the UK over the past five years.

The question is, when will it be impossible to buy a car that can't spy on you.


Original Submission

Read more of this story at SoylentNews.

11:11

Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution Open Source Security

Posted by Solar Designer on Apr 17

Hi,

Thank you Ruihan Li for finding and handling this vulnerability so well,
and for the detailed write-up.

When discussing this on linux-distros a week ago, I wrote:

And indeed Ruihan Li came up with the list of other likely usable
programs on a typical Linux distro, which makes the point of hardening
only sudo moot, and so we decided to postpone further discussion until
this is public on oss-security.

OTOH, not all distros are typical....

11:00

Battery Bird protects customers from vulnerabilities in public Wifi networks Help Net Security

Recent warnings by the FBI and FCC have highlighted the risks associated with using public USB chargers. Hackers have created ways to use public USB ports to introduce malware and monitoring software onto the phones of unsuspecting users. Battery Birds unidirectional technology offers a safe alternative to public chargers. Protecting data is critically important in the information technology age of today, says Kira Fernandez, CEO of Battery Bird. We understand the risks associated with using More

The post Battery Bird protects customers from vulnerabilities in public Wifi networks appeared first on Help Net Security.

10:46

Illinois State Government Targets Children With iPhone and Android Malware to Report on Friends, Family, and Neighbors Techrights

Reprinted with permission from Ryan

Phone spyware

Phone spyware

The State government of Illinois has recently launched State-sanctioned malware, available in the Google Play and Apple App Store called Safe2Help Illinois.

I first noticed the malware when ads started appearing on the radio and TV for it.

The app encourages children to download it to their phones without telling their parents and use it to report people to the State government, including the Department of Human Services, which administers the State mental hygiene laws, and of course, the police.

The app conveniently provides children with the ability to send pictures and video files with their report, but the Google Play description says the app can also just scan the phone and see who your contacts are, read your text messages, and upload the files on your phone all by itself without telling you.

According to Google Play (Apple doesnt give statistics), the app has only been downloaded 100 times in the entire State.

Unfortunately, theres no way to tell how many children are using this app to inform on each other and the family and neighbors (like something out of the East German Stasi), but in addition to the malware, the state allows reports over their Web site and through text messaging.

The State agency maintaining the malware is the Illinois Emergency Management Agency, which is basically the State version of FEMA, and they probably use federal grant money.

Last year, the Biden Regimes Disinformation Board got paused due to public and Congressional backlash, but planned to lean on Big Tech to silence people at the governments request, otherwise there would be consequences of course.

But this is another way the government can keep eyes on people.

It has deputized brainwashed children and turned them into informants (on themselves even, due to the wide-ranging permissions the app has...

10:42

The biggest threat to Google Geeking with Greg

Nico Grant at the New York Times writes that Google is furiously adding features to its web search, including personalized search and personalized information recommendations, in an "panic" that "A.I. competitors like the new Bing are quickly becoming the most serious threat to Googles search business in 25 years."

Now, I've long been a huge fan of personalized search (eg. [1] [2]). I love the idea of recommending information based on what interested you in the past. And I'm glad to see so many interested in AI nowadays. But I don't think this is the most serious threat to Google's search business. The biggest threat to Google is if their search quality drops to the point that switching to alternatives becomes attractive. That could happen for a few reasons, but misinformation is what I'd focus on right now. Google seems to have forgotten how they achieved their #1 position in the first place. It wasn't that Google search was smarter. It was that Altavista became useless, flooded with stale pages and spam because of layoffs and management dysfunction, so bad that they couldn't update their index anymore. And then everyone switched to Google as the best alternative. The biggest threat to Google is their ongoing decline in the usefulness of their search. Too many ads, too much of a focus on recency over quality, and far too much spam, scams, and misinformation. When Google becomes useless to people, they will switch, just like they did with Altavista.

10:31

LockBit Ransomware Expands Attack Spectrum to Mac Devices HackRead | Latest Cybersecurity and Hacking News Site

By Deeba Ahmed

The new ransomware was spotted by MalwareHunterTeam, which is capable of encrypting macOS devices.

This is a post from HackRead.com Read the original post: LockBit Ransomware Expands Attack Spectrum to Mac Devices

10:26

PSA: upgrade your LUKS key derivation function Matthew Garrett

Here's an article from a French anarchist describing how his (encrypted) laptop was seized after he was arrested, and material from the encrypted partition has since been entered as evidence against him. His encryption password was supposedly greater than 20 characters and included a mixture of cases, numbers, and punctuation, so in the absence of any sort of opsec failures this implies that even relatively complex passwords can now be brute forced, and we should be transitioning to even more secure passphrases.

Or does it? Let's go into what LUKS is doing in the first place. The actual data is typically encrypted with AES, an extremely popular and well-tested encryption algorithm. AES has no known major weaknesses and is not considered to be practically brute-forceable - at least, assuming you have a random key. Unfortunately it's not really practical to ask a user to type in 128 bits of binary every time they want to unlock their drive, so another approach has to be taken.

This is handled using something called a "key derivation function", or KDF. A KDF is a function that takes some input (in this case the user's password) and generates a key. As an extremely simple example, think of MD5 - it takes an input and generates a 128-bit output, so we could simply MD5 the user's password and use the output as an AES key. While this could technically be considered a KDF, it would be an extremely bad one! MD5s can be calculated extremely quickly, so someone attempting to brute-force a disk encryption key could simply generate the MD5 of every plausible password (probably on a lot of machines in parallel, likely using GPUs) and test each of them to see whether it decrypts the drive.

(things are actually slightly more complicated than this - your password is used to generate a key that is then used to encrypt and decrypt the actual encryption key. This is necessary in order to allow you to change your password without having to re-encrypt the entire drive - instead you simply re-encrypt the encryption key with the new password-derived key. This also allows you to have multiple passwords or unlock mechanisms per drive)

Good KDFs reduce this risk by being what's technically referred to as "expensive". Rather than performing one simple calculation to turn a password into a key, they perform a lot of calculations. The number of calculations performed is generally configurable, in order to let you trade off between the amount of security (the number of calculations you'll force an attacker to perform when attempting to generate a key from a potential password) and performance (the amount of time you're willing to wait for your laptop to generate the key after you type in your password so it can actually boot). But, obviously, this tradeoff changes over t...

10:00

HPR3837: Make a vortex cannon Hacker Public Radio

Make a Vortex Cannon. This is a device for firing a coherent torus-shaped vortex across a room. If it is made with a degree of care, it will extinguish the flame of a candle from some distance. What you will need An empty Pringles can. This is the cylindrical foil-lined cardboard tube which originally contained Pringles potato chips. A party balloon. Some strong parcel tape. A hole punch capable of making a clean hole of about two centimetres (three quarters of an inch) in diameter. A small drill. What to do Step 1: Drill a small hole in the metal end-plate of the Pringles can. This hole needs to be large enough to accommodate the threaded portion of the hole punch. The hole needs to be as close to the exact dead-centre of the plate as you can make it. Use the hole punch to make as clean as possible a hole as accurately as possible. Here in the UK it is possible to obtain a hole punch called a Q-Max punch from Maplin, the supplier of electronic and hobby parts. I am sure they are available from other sources. It is very important that this hole is: As close to the centre of the end-plate as is humanly possible Has edges which are clean and crisp. Hence the use of a hole punch. It is these two factors more than any other that will effect the efficiency of the cannon. Step 2: Cut off the mouth-piece end of the balloon. Stretch it over the open end of the Pringles can and pull it as tight over the end as you can. When I say the open end I mean the end from which you removed the lid and chomped on the chips. Use the parcel tape to wrap the balloon tightly around the circumference of the cylinder, anchoring it in position so that the open end of the can is now like a drum formed by the stretchy membrane of the balloon. Nice and tight. The cannon is now ready to fire. Firing the cannon Pinch the centre of the balloon membrane and pull it back as far as you can. This might be easier if you push some kind of (blunt ended) rod into the can from the hole end and push out the membrane until you can pinch it. Some other stretchy latex device which has a little bulb at the end might be easier to get hold of, but I can't think of such an item, can you? When you let go of the membrane with it stretched out as far as you can go, what happens? Well, if you made the small circular hole at the metal-plate end of the cylinder nice and clean and central, the cannon fires a coherent vortex of air. What do I mean by a 'vortex'? Imagin a ring doughnut compromised of air shooting out of the end of the tube like a smoke ring out of a Hobbit. The vortex is spinning. Not like the bullet fired from a rifled barrel, but as if it is constantly trying to turn itself inside-out. This spinning keeps the torus (this is what the shape of a ring doughnut is called) coherent and intact for several feet. If you made the hole in the metal plate end of the tube nice and clean, and you stretched the balloon membrane out as far as you possibly can,...

Minimal Overhead Monitoring It Will Never Work in Theory

Today's solar panels are significantly more efficient than those made twenty years ago, but the improvement isn't the result of a single major breakthrough. Instead, it is the result of dozens of small changes to materials, coating, and power coupling. The same is true of the tools we program with: web servers, compilers, operating systems, and other pieces of software are faster or more energy efficient because of years of incremental advances by small groups of rather obsessive people.

This new paper describes one such advance. Most programmers never bother to profile their code, but when performance matters, it's vital to have tools that can do this accurately. By applying four complementary optimizations, the authors of this work manage to reduce the overhead per monitoring call by more than a factor of 12. The average user might never notice the difference, but they will reap the benefits nonetheless.

David Georg Reichelt, Stefan Khne, and Wilhelm Hasselbring. Towards solving the challenge of minimal overhead monitoring. 2023. arXiv:2304.05688

The examination of performance changes or the performance behavior of a software requires the measurement of the performance. This is done via probes, i.e., pieces of code which obtain and process measurement data, and which are inserted into the examined application. The execution of those probes in a singular method creates overhead, which deteriorates performance measurements of calling methods and slows down the measurement process. Therefore, an important challenge for performance measurement is the reduction of the measurement overhead.

To address this challenge, the overhead should be minimized. Based on an analysis of the sources of performance overhead, we derive the following four optimization options: (1) Source instrumentation instead of AspectJ instrumentation, (2) reduction of measurement data, (3) change of the queue and (4) aggregation of measurement data. We evaluate the effect of these optimization options using the MooBench benchmark. Thereby, we show that these optimizations options reduce the monitoring overhead of the monitoring framework Kieker. For MooBench, the execution duration could be reduced from 4.77 s to 0.39 s per method invocation on average.

09:40

Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution Open Source Security

Posted by Steffen Nurpmeso on Apr 17

Jakub Wilk wrote in
<20230417064047.dhrrkuzjmtx4yhgj () jwilk net>:
|* Steffen Nurpmeso <steffen () sdaoden eu>, 2023-04-16 22:57:
|>have you verified that they do not use isatty(3)
|
|I'm pretty sure they do. But isatty(3) is implemented using the TCGETS
|ioctl, so that doesn't help.

Well everbody knows how this is implemented, most of the time.
There never was any systemcall that comes otherwise near of doing...

09:30

Intel's OpenGL & Vulkan Linux Drivers Now Build On ARM Phoronix

Intel's open-source OpenGL "Iris" and Vulkan "ANV" Linux drivers are now part of the auto-generated set of drivers set to be built for 64-bit ARM (AArch64) when compiling this code inside Mesa...

09:25

Imperva collaborates with Fortanix to provide end-to-end data security Help Net Security

Imperva and Fortanix signed a partnership agreement, and have each joined the others strategic partner program. This partnership brings together two innovative and trusted cybersecurity companies focused on multicloud data protection. The joint offerings from Imperva and Fortanix will provide the ability to manage the entire data security workflow for customers ensuring data privacy and compliance. Imperva now offers Fortanix Data Security Manager (DSM), a highly scalable data security platform that delivers unified cryptographic and More

The post Imperva collaborates with Fortanix to provide end-to-end data security appeared first on Help Net Security.

09:00

Bust Out That Old Analog Scope For Some Velociraster Fun! Hackaday

[Oli Wright] is back again with another installation of CRT shenanigans. This time, the target is the humble analog oscilloscope, specifically a Farnell DTV12-14 12 MHz dual-channel unit, which features a handy X-Y mode. The result is the Velociraster, a simple (in hardware terms) Raspberry Pi Pico based display driver.

Using a Pico to drive a pair of AD767 12-bit DACs, the outputs of which drive the two scope input channels directly, this breadboard and pile-of-wires hack can produce some seriously impressive results. On the software side of things, the design is a now a familiar show, with core0 running the applications high-level processing, and core1 acting in parallel as the rendering engine, determining static DAC codes to be pushed out to the DACs using the DMA and the PIO.

The first demo is in vector mode, simply showing some simple shapes,...

09:00

Mobb raises $5.4 million and launches community tool Help Net Security

Mobb has raised $5.4M in seed funding led by Angel Investor Ariel Maislos and joined by MizMaa Ventures, Cyber Club London and additional investors from US, EU, and Israel. The company has also automated vulnerability remediation technology. The application security market has been desperate for innovation that doesnt just detect problems, but fixes them. I invested in Mobb so its talented founding team could More

The post Mobb raises $5.4 million and launches community tool appeared first on Help Net Security.

08:26

Germany and Intel Both Want More From Planned Mega-fab SoylentNews

Chipzilla reportedly wants more cash. Germany wants a bigger facility. And the EU is lurking with a bigger offer:

If Intel wants larger subsidies for its Magdeburg mega-fab, German officials think the x86 giant should increase its investments to match.

Citing people familiar with the matter, the Financial Times reported on Thursday that the German government is willing to consider boosting subsidies, but only if Intel is willing to spend more on infrastructure too.

"It's logical that if the scale of the investment is increased, then the level of subsidy would also rise," Sven Schultze, the economy minister for Saxony-Anhalt, told the FT.

The debate over the size of Chipzilla's assets comes after multiple reports that Intel had pressured the German government for larger subsidies to offset rising energy and material costs, and hinted at delaying the project. Intel now expects the facility to cost somewhere in the neighborhood 20 billion ($22.1 billion) to complete.

Rising costs have also impacted the cost of Intel's two Arizona plants, which are now expected to cost 50 percent more than when first announced.

To date, the German government has committed 6.8 billion ($7.5 billion) to the Intel's planned builds about 40 percent of the project's original 17 billion ($19 billion) price tag. However, last month, Bloomberg reported that Intel pushed for an additional 4-5 billion in subsidies.

[...] However, Intel's position could soon improve. The European Commission is expected to sign its own CHIPs funding bill into law any day now. The bill would unlock roughly 43 billion ($48 billion) to attract semiconductor investment in the region.


Original Submission

Read more of this story at SoylentNews.

07:00

Melbet App Download For Android Apk & Ios In India h+ Media

Melbet App Download For Android Apk & Ios In India

Unlike other casinos identified for his or her exciting colour combinations like Royal Panda, Melbet isnt shiny. On your first deposit, MelBet will provide a bonus that is matched up to 50% of your deposit to a limit of roughly 30,000 . Your account may also be credited with 30 Free Spins for Down the Pub after the bonus amount has been redeemed. Melbet is a broadly known gambling service with a huge status in India. Moreover, MelBet has all the necessary licenses for gambling activities, so you dont have to worry about your cash with Melbet. Melbet service has in its arsenal functions for Android and iOS devices.

Among these online casinos, Melbet stands out as an exceptional platform with an impressive collection of games from prime software providers within the industry. The casinos diverse range of games ensures that players will all the time have something new and thrilling to discover, making their gaming expertise much more thrilling. [newline]Whether gamers prefer slots, table video games, or stay dealer video games, Melbet has it all coated, guaranteeing that each player finds their excellent recreation. A sturdy welcome on line casino bonus can create an gratifying setting for enjoying at an internet casino. Melbet is aware of its players needs and welcomes all new members by giving them a 100 percent Welcome deposit bonus of as much as 8,000 rupees. Regardless of whether you prefer to play on line casino video games or sports, that is supplied to all new players. Melbet occasionally supplies a big number of promo codes for followers of the Indian Premier League , notably through the IPL season.

Then you can get free bets, a bonus for one hundred bets, and a lot of other promotions. Melbet must enhance its number of betting options because users dont get many. The casino can be obtainable to all gamers in a particular section. All slots are optimized for taking half in with mobile gadgets. Also, in style reside on line casino leisure is available to you.

With such a broad variety ofcasino banking options, enjoying at MELbet casino is completely convenient. With Melbet, youll have the ability to place your bets and play on line casino games utilizing quite lots of gadgets. The firm presents a casino and sportsbook app that may work for desktops and your iOS and Android units. To take pleasure in mobile services, you should obtain first the casino app particular to the system. Also, if youre having issues accessing the Melbet web site, you can obtain the Melbet Access App. This acts as an elective address when accessing the platform.

The wordsmith of the group, Shruti is busy enjoying her newfound ardour for online casino video games. When shes pleased, she would guess the ranch to plan and create killer on line casino content the ones that urge you to play. If things dont go the means in which she needs them to, she would con...

06:58

Melbet Casino India Review Ll 100% Bonus As Much As 145,000 h+ Media

Melbet Casino India Review Ll 100% Bonus As Much As 145,000

With all this leisure youre certain to seek out one thing for you. Plus the site includes a handy slot filter by topic, the place yow will discover the most well-liked, new, and other slots, in addition to always see your recent slots and tagged favorites. Melbets stay betting lets individuals take advantage of the competition. By placing bets on the team of your choice at Melbet on-line on line casino, youll have the ability to win attractive bonuses and cash awards. Fans of on-line casino gaming from India wont be let down by this top-notch website when it comes to profitable interaction, whether or not its the welcome bonuses or promo codes. Melbet stay casino is powered by a host of builders, together with Evolution Gaming and Eguzi.

Our portal specialists have analyzed all of the Melbet casino India options corresponding to ease of registration and profile verification, bonus program, and the choice of slot machines. It is protected to say that the gambling operator is loyal to Indian customers. Melbet Bangladesh locations nice emphasis on buyer help, providing a dependable and timely help service that could be accessed at any time through live chat, e mail, or cellphone.

Melbet prides itself on letting gamers to play their video games anywhere, anytime. To accentuate their vision, its devoted iPhone and Android apps allow enjoying for real cash and can be downloaded at no cost from their platform. The Melbet website is legendary for many sports activities out there for betting and the massive sea of on line casino leisure to fulfill all your playing wants.

You will discover English-speaking sellers in a lot of the tables, however youll additionally find languages including Arabic, German, Swedish and Russian. The reside casino games embody roulette, baccarat, blackjack, Sic Bo and Indian-dominated games like Andar Bahar and Teen Patti. Many of the video games are of their standard types, and you also change to their variations. Melbet permits players to play an overwhelming number of games for free even with out having to create an account. When hovering over the different classes, merely select Play to guess with cash or Play free of charge to test the game at zero risk.

Unlike other casinos identified for his or her exciting color mixtures like Royal Panda, Melbet isnt bright. On your first deposit, MelBet will provide a bonus thats matched as much as 50% of your deposit to a limit of approximately 30,000 . Your account may even be credited with 30 Free Spins for Down the Pub after the bonus amount has been redeemed. Melbet is a well-known gambling service with an enormous status in India. Moreover, MelBet has all the mandatory licenses for playing activities, so you dont have to worry about your cash with Melbet. Melbet service has in its arsenal functions for Android and iOS gadgets.

So, you can deal w...

06:58

Melbet On Line Casino India Review 2023 h+ Media

Melbet On Line Casino India Review 2023

The variety of factors awarded depends on the quantity of your stake and the variety of outcomes included in your guess. Stake a minimum of 100 Rupees or the equivalent in other currencies, and dont worry if you miss a day, your race might end however youll be able to at all times start again! Complete your round and your free bets will be awarded 24 hours later. Each accumulator bet needs to have three or extra occasions with at least 3 occasions having odds of 1.forty or higher. Deposit 8000 and get another 8000 from WBC champion Oleksandr Gvozdyk!

It is feasible to use this cash for betting, casino video games, and even withdrawal. Melbet is a last vacation spot for gamers on the lookout for a huge betting market with better odds. On this platform, punter will get the chance to wager on a large number of sports activities and on line casino video games.

In addition to the downloadable app, in Melbet can play the cellular model. It is automatically activated when the user opens the site from a cellular device. The useful resource adjusts to the players display screen resolution, and gadget OS and opens in a simplified mode. In terms of performance, the common and cellular versions do not differ from each other.

Especially for iPhone and iPad owners, we now have developed an to to bet on any sports from your smartphone if you have an lively Internet connection. Free spins every single day Melbet on-line on line casino will reward you with free spins daily if you play Game of the Day. What sport of the day awaits you today youll find a way to see by going to the page of this promotion. This game is unquestionably price it since free spins dont have betting requirements. Melbet understands that virtually all of consumers in India are playing on their cell gadgets.

The participant is credited with a onerous and fast amount, which he can use for gaming with out preliminary deposits. It is essential to stick to the conditions that decide the minimal bet amount and the odds that you are allowed to bet on. As of the final replace, the positioning helps a minimal of 25 cryptocurrencies for deposits and withdrawals. You can choose from Bitcoin, Dash, Ethereum, and Litecoin to finish your deposits. Other deposit choices to suppose about are on-line payments and cellular wallets like WebMoney and Siru Mobile. This web site also delivers when it comes to live-dealer games.

There are typically no fees to fret about, that means that players can take house 100% of their winnings. Most Indian gamers favor to have interaction in slots and reside on line casino video games via their cell phone. However, downloading the app is not necessary as the browser model is of wonderful high quality.

There are common contests as well, where you compete with other gamers to get larger scores i...

06:55

Melbet Casino India 2023 h+ Media

Melbet Casino India 2023

They cater to sports activities fanatics and casino lovers alike. With sports like soccer, cricket, basketball, tennis, and more obtainable for betting, theres something for everyone. Their casino part is also numerous, offering games like slots, roulette, blackjack, baccarat, and more.

By matching their top-notch online sportsbook with an in depth library of on-line casino games, MelBet has something for everyone when it comes to on-line playing in India. And it manages to do so with a clean UI / UX and excellent customer support and service. MelBet is likely certainly one of the greatest on-line bookmakers and online casinos on the planet.

New users can get a one hundred pc welcome bonus of up to 8,000 BDT on their first deposit. The platform also supplies common promotions, including cashback bonuses and free spins. These bonuses can enhance your possibilities of successful big and make your betting expertise more thrilling.

Some of the slot video games embody 777, Western Slot, Games of Thrones, Reels of Gods, Diamond Slots, and lots of extra. If you need to claim the above bonuses, take part in a bonus supply in your Melbet Account and deposit a minimum of 786 INR. You can even take pleasure in Melbet on line casino no deposit bonus which comes within the form of 20 free spin Birthday Gift. It is a popular bookmaker amongst experienced sports activities bettors.

The bonus will be automatically credited to your account. The bonus amount ought to be rolled 5 instances over in accumulator bets, where every accumulator bet ought to have 3 or more occasions. Also, three occasions within the accumulator ought to have 1.40 odds or extra. If you like playing stay blackjack card recreation or reside baccarat, then you will definitely fall in love with Melbet. And for these video poker buffs, the genre boasts with some great things.

The assist team is well-trained and capable, providing prompt and environment friendly solutions to any problems which will come up. When a deposit is made to the gaming account, it is going to be seen in the cabinet upon affirmation of the transaction on the official fee method web page. The minimal deposit quantity is 75 BDT through Perfect Money, and this quantity varies for each method. The withdrawal course of is quick, taking only 15 minutes. No casino can present worldwide legality because of the legal guidelines of local international locations.

Originated in Britain, cricket has conquered all of the colonies, but in India, it has turn out to be a nationwide treasure and attracts millions of fans. As in Europe, they fiercely bet on football, so the Indians do not miss an opportunity to wager on cricket. This is clearly the first quantity for bettors in the nation. Go to the on line casino section and click on on the sport you want to try out, and begin playing. Melbet is a authorized playing platform licensed from Curacao, which is...

06:54

Melbet Review India 2023 h+ Media

Melbet Review India 2023

So go forward and download that or theyve a completely mobile-optimized web site which appears great on tablets and all smart telephones. In fact, wed guess that the designers built the positioning with mobile first thoughts in thoughts which isnt always the case. Melbet LayoutOne excellent design element of this web site comes in the form of their Fast Games part. Essentially they have made quick hyperlinks to all of their hottest video games so you dont have to waste time within the library. This means youll find some nice themed games at the click of a button and takes away the boring task of searching by way of hundreds of casino video games.

At the second, more than 250,000 customers are registered on the Melbet India website. Thanks to the above points, the program for telephones works even with a poor connection to the cellular Internet. Melbet, like different bookmakers, doesnt fall underneath the regulation of Indian legal guidelines.

Many of them being cryptocurrencies, so in case you are looking for a bitcoin on line casino in India this may be the one for you. With glorious customer support and a user-friendly interface, 7Cric is one of the best online on line casino web site for Indian players who are looking for a top-notch playing experience. If you want to enjoy some competition and social interaction as you play, just head over to their stay on line casino section and join a room on your favourite card and table video games.

To obtain the free spins, the customers cellphone number should have been activated by the point they fulfil the bonus wagering requirement. If their telephone quantity has not been activated, the free spins wont be credited to their account. The sport choice at Melbet is quite broad, provided by various developers like PG, Authentic Gaming, Evolution Gaming, Ezugi, Asia Gaming, Vivo Gaming and lots of more. With such an enormous video games library, Melbet has a few of the best slot games on the earth. So make certain you take your time and look through to search out which slot sport suits you greatest.

Its necessary to notice that the terms and circumstances of many of the casinos bonuses require forms of ID from gamers before theyll participate. This identification course of usually includes emailing a duplicate of your license or passport to MELbet. This date coincides with the growing rise in the reputation of web casinos. Since this time, MELbets sport library has grown substantially. Players can deposit cash into their account using various strategies corresponding to bank card, e-wallet, or bank switch, even crypto such as Bitcoin. Winnings can then be withdrawn again to the participants account or used to continue playing.

We are one cease spot to get clear, dependable, and unbiased evaluations of Indian casinos and video games. We are right here to assist you with the true detai...

06:53

Melbet Casino India Evaluate Ll 100 Percent Bonus As A Lot As A Hundred Forty Five,000 h+ Media

Melbet Casino India Evaluate Ll 100 Percent Bonus As A Lot As A Hundred Forty Five,000

Many online casinos run easily on mobile gadgets and this gambling site is certainly one of them. You can access all MelBet casino on-line video games and sports betting choices on your cell browser. The website of Melbet is definitely navigable, which cuts down a lot of trouble for the players. It also features a tremendous loyalty program, which is designed to offer a personalised experience to its loyal players. This online on line casino is accepting players from all internationally including India.

You might have heard of Melbet on line casino and thought of utilizing their companies. The two issues that actually put me down was their dangerous buyer support and license. I wish their sportsbook could hold a more reputed license than Curacao. Overall, the on line casino is enjoyable and a fantastic place to take pleasure in at.

Its one of the popular of Evolution Gamings collection and provides gamers with an excellent live casino expertise. You will play with a live supplier sat in a studio and you may see them via a weblink. As properly as playing the game of Roulette youll find a way to work together with them through the chat possibility. Welcome to Melbet, a relative newcomer to the world of on-line casino in India.

We will now focus on a few of the special options that Melbet has on its site. There are numerous completely different options that other online casinos have, and its solely truthful that we do the identical review for Melbet too. Later within the review, we will focus on some of these security measures they have on the location. However, now we will safely say that Melbet is a secure and legit on-line on line casino. Payment strategies are certianly a vital side of a web-based on line casino and its no completely different with Melbet India. You want to have the flexibility to deposit and withdraw your money with a technique that youre snug with.

Melbet is quite an old betting platform that was established in 2012. Melbet login and usage are quite straightforward, which makes it in style. The owning company of this betting app is Pelican Entertainment Ltd and Tutkia Ltd, which have an Eastern European background. By turning into a member of the loyalty program, you can win factors every time you place a bet, regardless of whether or not you play blackjack or spin the reels in slots. The expertise points earned are designed to advance in an eight-level system. The refund proportion is calculated using the whole amount of cash lost by the shopper and will increase with every stage.

They created a hassle-free web site with only the best video games on supply and a unbelievable loyalty program to reward those that play there. The feeling that we get from MELbet is that the on line casino is attempting to put a powerful emphasis on its sports betting characteristic. MELbet spared...

06:52

Melbet Casino Review 2023 Get 20,000 Bonus In India h+ Media

Melbet Casino Review 2023 Get 20,000 Bonus In India

When you create an account, please enter the right data; otherwise, problems with payments might happen. Log in, go to the My Account web page, choose the Personal Profile button, and then choose Join the Club to join for the Melbet Loyalty Program. The subsequent step is to easily observe the directions displayed on the screen.

It currently provides greater than 1,000 matches day by day and for its in-play section, delivers greater than 200 live events daily. Yes, Melbet runs in India with Curacao Gaming Authority permission, which allows it to simultaneously provide sports betting and casino games on its website. Unfortunately, because of Google Plays policy against using any betting apps, Melbet prospects will be unable to download the app immediately from there. But the developers of Melbet have discovered a way out of this situation. They developed the Melbet apk particularly so that users can obtain it and set up it on any of their devices.

The newer the OS model, the extra probably it is that the Melbet app will install without any extra steps. Activation of bonuses further rewards are nonetheless available to the participant. Making a deposit or withdrawing funds making any payment transactions. If you have an iOS working system, then clicking on the banner will redirect you to the official App Store page of the app.

Up thus far gambling advice for Indian gamers who are looking to play smarter. Yes, that is definitely considered one of Melbet Indias sturdy factors. Melbet have an app obtainable for both Android and IOS users across the nation.

Our portal specialists have analyzed all of the Melbet on line casino India options corresponding to ease of registration and profile verification, bonus program, and the selection of slot machines. It is protected to say that the gambling operator is loyal to Indian customers. Melbet Bangladesh places nice emphasis on customer support, providing a reliable and well timed support service that might be accessed at any time through reside chat, e-mail, or cellphone.

Go to the official casino website within the corresponding part for downloading cellular applications. The installation will be carried out automatically, and youll need to follow the standard instructions. I was in a position to decide precisely which gambling leisure brings glorious revenue on a distance. After the set up is complete, a new Melbet icon will seem on the mobile display screen. Everything is ready, now you need to automate if you already have a recreation account, or create a model new one.

This web-based gambling establishment is operated by Pelican Entertainment Ltd and has acquired a license by the Government of Curacao. With hundreds of video games in rotation and cryptocurrency options for transactions, betting in India with MELbet couldnt be simpler for players who love a ext...

06:46

New QBot campaign delivered hijacking business correspondence Security Affairs

Kaspersky researchers warn of a new QBot campaign leveraging hijacked business emails to deliver malware.

In early April, Kaspersky experts observed a surge in attacks that QBot malware attacks (aka Qakbot, QuackBot, and Pinkslipbot). QBot has been active since 2008, it is used by threat actors for collecting browsing data and banking credentials, and other financial information from the victims.

Its modular structure allows operators to implement new features to extend their capabilities.

The Qbot malware operation had numerous collaborations in the past with other ransomware gangs, including ProLockEgregorDoppelPaymer, and MegaCortex.

The threat actors behind the campaign observed by Kaspersky used e-mail written in different languages, including English, German, Italian, and French.

The malicious code hijacks a victims email and sends itself out as a reply to an existing email thread.

The messages would be urging the recipients to open an enclosed PDF file. As an example, the attackers can attempt to trick the recipient into opening the file by asking them to provide the documentation pertaining to the attached application or to calculate the contract value based on the attached cost estimate. During the recent campaign, the enclosed PDF file masquerades as a Microsoft Office 365 or Microsoft Azure alert.

06:45

New release: digiKam 8.0.0 LWN.net

The digiKam photo-management tool has announced its 8.0.0 release, after two years of development, bug fixing, and testing. Major new features include a documentation overhaul (with a new web site), support for more file formats, a new optical character recognition (OCR) tool, improved metadata handling, a neural-net-based image quality classifier, better integration with G'MIC-Qt, a Qt6-compatible code base, and lots more. See the announcement for all the details.

06:40

RadeonSI Change Allows For Balancing RDNA3 Video Transcoding Between Multiple Engines Phoronix

A change merged today for the Mesa 23.2 graphics driver stack benefits video transcoding performance for new Radeon RX 7000 series "RDNA3" graphics cards...

06:23

ACE Shuts Down Pirate IPTV Providers as Unusual Potential Threat Looms TorrentFreak

ace logoIts not unusual for piracy groups to have dozens of domains in storage for when things go wrong, but none has a bigger collection than Hollywood itself.

The MPA still owns isoHunts domain following its legal defeat a decade ago, alongside other spoils of war following battles with Popcorn Time, YTS/YIFY (the real ones), Hotfile and Openload. These examples represent just a handful of domains from a collection that has exploded since the 2017 launch of the Alliance for Creativity and Entertainment.

Over the past few days, another dozen or so domains boosted the existing haul of several hundred domains that no longer play a part in the piracy landscape.

IPTV Targets Shutdown, Domains Stripped

As reported last November, DMCA subpoena applications filed in the United States revealed that ACE had developed an interest in pirate IPTV service MagisTV.

Early December 2022, ACE/MPA quickly took control of two domains Magisglobal.net and Magistvapk.com presumably as part of its ongoing investigation. During the last week or so, several additional domains were taken over, including magistvcostarica.com, magistvglobal.com, magistvparaguay.com, magistvbolivia.com, magistvbrasil.com,, magistvchile.com, magistvcolombia.com and magistv.global.

Late last week, signs pointed to yet another IPTV takedown. A service that had been variously known as Opt TV, Optimum IPTV, Opt Hosting and Opt Hosting IPTV, was suddenly identifiable as another ACE casualty. Offering a reported 1,300 channels, including PPV events, international and 24/7 channels, Opt IPTV had been available across multiple devices for as little as $8 per month.

With key domains opt.tv and opthosting.com now redirecting to the ACE anti-piracy portal, that rodeo is probably over. Whether the same is true for another domain redirecting to ACE is less clear, but...

05:39

NASA/JPL Snake Robot for Subsurface Planetary Exploration SoylentNews

Looking ahead to exploring inside some of the other planets and satellites in the solar system, here is a proposal for a multi-jointed snake robot https://www.bbc.com/news/av/world-us-canada-65245054 with a video animation available from the BBC, https://www.bbc.com/news/av/world-us-canada-65245054

Here's a snip,

The EELS initiative comes in the backdrop of discoveries made by the Cassini probe, which explored Saturn, its rings, and moons for nearly 13 years. The iconic mission ended in September 2017 when the spacecraft crashed into Saturn's atmosphere.

The remarkable discovery of plumes of water vapor ejected into space by Saturn's tiny icy moon Enceladus prompted the development of this EELS snake robot. This raised the possibility of a habitable liquid ocean beneath the moon's frozen crust and piqued the space community's interest in exploring this moon.

Coming soon to theaters, the sequel, "AI Snakes on a Plane" ??


Original Submission

Read more of this story at SoylentNews.

05:19

Proton 8.0-1 Published With More Games Now Running On Steam Play Phoronix

Valve and CodeWeavers have made available Proton 8.0-1 as their for enjoying Windows games on Linux...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog