IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Tuesday, 25 April

01:50

Linux 6.4 Allows For Optional CA Enforcement Of The Machine Keyring Phoronix

With the Linux 6.4 kernel there is the ability being introduced so that the machine keyring can optionally only store CA-enforced keys...

01:30

Chatting With Local AI Moves Directly In-Browser, Thanks to Web LLM Hackaday

Large Language Models (LLM) are at the heart of natural-language AI tools like ChatGPT, and Web LLM shows it is now possible to run an LLM directly in a browser. Just to be clear, this is not a browser front end talking via API to some server-side application. This is a client-side LLM running entirely in the browser.

...

D3 Security MSSP Client Portal simplifies information sharing between MSSPs and clients Help Net Security

D3 Security will unveil its MSSP Client Portal this week at the 2023 RSA Conference. The MSSP Client Portal is a one-stop shop for managed security service providers (MSSPs) and their clients to manage interactions and share information. Taking inspiration from the inputs of D3 Securitys many MSSP partners, the MSSP Client Portal streamlines client communication for MSSPs and connects clients approvals and comments directly to the D3 Smart SOAR environment. The portal gives MSSPs More

The post D3 Security MSSP Client Portal simplifies information sharing between MSSPs and clients appeared first on Help Net Security.

01:22

Machine learning framework classifies pneumonia on chest X-rays Lifeboat News: The Blog

Pneumonia is a potentially fatal lung infection that progresses rapidly. Patients with pneumonia symptoms such as a dry, hacking cough, breathing difficulties and high fever generally receive a stethoscope examination of the lungs, followed by a chest X-ray to confirm diagnosis. Distinguishing between bacterial and viral pneumonia, however, remains a challenge, as both have similar clinical presentation.

Mathematical modelling and artificial intelligence could help improve the accuracy of disease diagnosis from radiographic images. Deep learning has become increasingly popular for medical image classification, and several studies have explored the use of convolutional neural network (CNN) models to automatically identify pneumonia from chest X-ray images. Its critical, however, to create efficient models that can analyse large numbers of medical images without false negatives.

Now, K M Abubeker and S Baskar at the Karpagam Academy of Higher Education in India have created a novel machine learning framework for pneumonia classification of chest X-ray images on a graphics processing unit (GPU). They describe their strategy in Machine Learning: Science and Technology.

01:22

Study finds new pathway for clearing misfolded proteins Lifeboat News: The Blog

Misfolded proteins are toxic to cells. They disrupt normal functions and cause some age-related human degenerative diseases, like Alzheimers, Parkinsons, and Huntingtons diseases. Cells work constantly to eliminate misfolded proteins, but these clearance mechanisms are still poorly understood.

In a new study published April 20 in Nature Cell Biology, researchers at Stanford University discovered a previously unknown cellular pathway for clearing from the , the compartment where the cell stores, transcribes, and replicates its DNA. Keeping junk away from those processes is critical to normal cellular function. The new pathway could be a target for age-related disease therapies.

To find the new pathway, researchers in the lab of Judith Frydman, the Donald Kennedy Chair in the School of Humanities and Sciences, integrated several genetic, imaging, and biochemical approaches to understand how dealt with misfolded proteins. For the experiments, the team restricted misfolded proteins to either the nucleus or the cytoplasmthe area inside the cell but outside the nucleus. The team visually followed the fate of the misfolded proteins through live-cell imaging and super-resolution microscopy.

01:13

CVE-2023-30776: Apache Superset: Database connection password leak Open Source Security

Posted by Daniel Gaspar on Apr 24

Description:

An authenticated user with specific data permissions could access database connections stored passwords by requesting a
specific REST API. This issue affects Apache Superset version 1.3.0 up to 2.0.1.

References:

https://superset.apache.org
https://www.cve.org/CVERecord?id=CVE-2023-30776

01:10

CVE-2023-27524: Apache Superset: Session validation vulnerability when using provided default SECRET_KEY Open Source Security

Posted by Daniel Gaspar on Apr 24

Description:

Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered
the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and
access unauthorized resources. This does not affect Superset administrators who have changed the default value for
SECRET_KEY config.

Credit:

Naveen Sunkavally (Horizon3.ai) (finder)

References:...

01:06

Links 24/04/2023: Kdenlive 23.04.0 and Red Hat To Lay Off Over 700 Employees Techrights

  • GNU/Linux

    • 9to5Linux 9to5Linux Weekly Roundup: April 23rd, 2023

      This has been a tremendous week with lots of goodies for everyone, starting with the new major Proton 8.0 release of Linux gaming and continuing with the highly anticipated Fedora Linux 38 and Ubuntu 23.04 releases.

      Linux kernel 6.3 also arrived this week and will soon land in your distros repositories, KDE fans got a new major KDE Gear release, KaOS Linux users celebrated the distros 10th anniversary with a preview of KDE Plasma 6, and Solus Linux users can keep using their favorite distro without the fear of it being abandoned.

01:05

Users Report Ryzen 7000X3D Chips Burning Out, Killing Motherboards SoylentNews

Likely a motherboard BIOS issue:

High-performance microprocessors tend to get hot and, when overclocked without proper cooling or throttling, can literally burn out When an old CPU does so in an old PC because of dust and a worn out fan, there is nothing surprising about it. But when a new CPU breaks on a shiny new motherboard, that's surprising. This is what happened to an AMD Ryzen 7 7800X3D, one of the best CPUs, which belonged to a Reddit user. And, according to other users, he's not alone.

"The CPU pad is physically bulging," wrote Speedrookie, the owner of the burned-out processor. "I imagine there was just too much heat on the contacts causing the pad to expand. Not that the CPU has an internal component which exploded."

At least when it comes to AMD's Ryzen 7000X3D-series processors, it appears that this is by far not an isolated case. There are reports from other Reddit users who had the same experience with their Ryzen 7000X3D CPUs on motherboards from Asus and MSI.

Famous overclocker der8auer also had an issue with an AMD Ryzen 7000X3D chip burning out during some early overclocking tests a few weeks ago. As you can see in his video, he says "I did not expect this to happen so quickly and especially right out of the BIOS."

There are about a million of reasons why a modern processor can burn out. Defective sockets or a motherboards [sic] are likely causes and insufficient cooling can cause a similar result. A BIOS be a yet another reason for a processor failure. In fact, as noticed by HXL (@9550pro), Asus has just withdrew old BIOSes for many of its AMD X670-based motherboards, but for some of them old BIOSes are still available.

[...] Again, given that the information is insufficient to say the least, we cannot make any conclusions at this point. We'll reach out to our contacts at AMD and the motherboard vendors to see if they are aware of any issues. For now, we recommend that those with AMD's Ryzen 7000X3D processors keep a close eye on their CPU temps, use adequate cooling and keep their BIOSes up-to-date.


Original Submission

...

01:00

Flashpoint Ignite accelerates cross-functional risk mitigation and prevention Help Net Security

Flashpoint has released Ignite, a new intelligence platform that accelerates cross-functional risk mitigation and prevention across CTI, vulnerability management, national security, and physical security teams. Ignite combines Flashpoints intelligence with an integrated user experience to help organizations streamline workflows, find relevant information, and reduce exposure to cyber and physical threats. Ignite delivers a holistic, real-time picture of all pertinent risks while reducing silos that can result from disparate intelligence feeds from multiple specialized partners. Ignite More

The post Flashpoint Ignite accelerates cross-functional risk mitigation and prevention appeared first on Help Net Security.

00:45

Red Hat Begins Cutting "Hundreds Of Jobs" Phoronix

The tech layoffs have now reached Red Hat with "hundreds of jobs" being cut and the initial round of layoffs being announced today...

00:43

Security updates for Monday LWN.net

Security updates have been issued by Debian (389-ds-base, chromium, connman, curl, redis, and thunderbird), Fedora (ceph, doctl, dr_libs, ffmpeg, freeimage, golang-github-digitalocean-godo, insight, libreswan, mingw-binutils, mingw-freeimage, mingw-freetype, openvswitch, rnp, suricata, webkitgtk, and wireshark), Mageia (dnsmasq, emacs, openimageio, php-smarty, redis, squirrel/supertux, and tcpdump), Red Hat (emacs), and SUSE (avahi, chromium, dmidecode, indent, jettison, openssl, openstack-cinder, openstack-nova, python-oslo.utils, and ovmf).

00:37

00:30

Akamai Brand Protector defends against phishing attacks and fake websites Help Net Security

At RSA Conference 2023, Akamai Technologies unveiled Brand Protector, a new solution that detects and disrupts phishing sites, fake stores, and brand impersonations. Brand Protector enables organizations to retain and grow customer loyalty while minimizing loss, drops in productivity and bad customer feedback. According to Google, over 50,000 new phishing websites are created every week. Akamai Brand Protector inspects trillions of digital activities a day across both internal and external sources to discover abuse of More

The post Akamai Brand Protector defends against phishing attacks and fake websites appeared first on Help Net Security.

00:09

Real world vulnerabilities of CWE-1077: Floating Point Comparison with Incorrect Operator? Open Source Security

Posted by Georgi Guninski on Apr 24

Are there real world examples of vulnerabilities of this:

https://cwe.mitre.org/data/definitions/1077.html
CWE-1077: Floating Point Comparison with Incorrect Operator

This issue can prevent the product from running reliably. If the
relevant code is reachable by an attacker, then this reliability
problem might introduce a vulnerability.

One simple example in python:

(False, 1.1102230246251565e-16, 0.6000000000000001, 0.6)

00:01

How to install Red Hat OpenShift Local on your laptop Linux.com

Install Red Hat OpenShift Local on your own machine to test your applications and configurations before deployment.

Read More at Enable Sysadmin

The post How to install Red Hat OpenShift Local on your laptop appeared first on Linux.com.

00:00

Trellix Threat Intelligence enhancements accelerate threat analysis and response Help Net Security

At RSA Conference 2023, Trellix announced it has expanded its Threat Intelligence portfolio to increase threat expertise and actionable intelligence to help global customers stay ahead of cyber adversaries. The new offerings include Vulnerability Intelligence and Trellix Intelligence as a Service. Through a new partnership with Intel 471, Trellix Insights and Trellix Advanced Threat Landscape Analysis System (ATLAS) customers will add underground malware insights. This new intelligence feed will complement Trellixs native threat intelligence capability More

The post Trellix Threat Intelligence enhancements accelerate threat analysis and response appeared first on Help Net Security.

00:00

The BSides: more curious uses of off-the-shelf parts Hackaday

Off-the-shelf stock parts are the blocks from which we build mechanical projects. And while plenty of parts have dedicated uses, I enjoy reusing them in ways that challenge what they were originally meant for while respecting the constraints of their construction. Building off of my piece from last time, Id like to add to your mechanical hacking palette with four more ways we can re-use some familiar off-the-shelf parts.

O-Rings as Retention Features

Plenty of us are using rubber o-rings as airtight seals between static or moving parts. But their elastic and grippy properties give them a second life in other places involving removable components.

On my tool-changing machine, Jubilee, I quickly ran into the issue of securing idle tools onto their parking posts without the risk of letting them fall out. While one tool is being used, the remaining idle tools need to sit in a fixed location so that the machines carriage can pick them up later. To complicate the matter, the motion platform creates an appreciable amount of vibration, and idle too...

00:00

Russian Hackers Tomiris Targeting Central Asia for Intelligence Gathering The Hacker News

The Russian-speaking threat actor behind a backdoor known as Tomiris is primarily focused on gathering intelligence in Central Asia, fresh findings from Kaspersky reveal. "Tomiris's endgame consistently appears to be the regular theft of internal documents," security researchers Pierre Delcher and Ivan Kwiatkowski said in an analysis published today. "The threat actor targets government and

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Monday, 24 April

23:52

People Are Getting Plastic Surgery Now So They Can Try To Look Like These Filters cryptogon.com

I just emailed this to a friend with a teenage daughter who is a heavy Tiktok user. I thought Tiktok was mostly a bunch of short attention span nonsense, wasting peoples time. Nope. Its much worse than that. Names have been changed: Hi John I saw a disturbing video about TikTok. I remember you mentioning []

23:46

Sean OBrien and Mikalai Birokou on Least Authority Services via Free Software Techrights

Video download link

Summary: The above LibrePlanet talk by Sean OBrien and Mikalai Birokou (physical presence) was uploaded by the FSF (PeerTube link) 6 days plus 6 hours ago; From the official page: This session will demonstrate the current status of 3NWeb protocols and client using Trisquel GNU/Linux and RYF hardware. 3NWeb use cases include encrypted messaging and storage. The protocols can be run over anonymous Free Software networks such as Tor and are agnostic in regard to addressing. For example, nodes can be communicated with via .onion hidden services or IPFS namespaces.

Licence: CC BY SA 4.0

Notice/side note: Unlike Gulagboy Matthew Garrett, they do not advocate outsourcing trust to Microsoft (which would be the complete opposite of security), but when Microsofters infiltrate projects this is what's promoted at the expense of users safety.

23:44

Ransomware Hackers Using AuKill Tool to Disable EDR Software Using BYOVD Attack The Hacker News

Threat actors are employing a previously undocumented "defense evasion tool" dubbed AuKill that's designed to disable endpoint detection and response (EDR) software by means of a Bring Your Own Vulnerable Driver (BYOVD) attack. "The AuKill tool abuses an the Microsoft utility, Process Explorer, to disable EDR processes before deploying

23:33

Organizations are stepping up their game against cyber threats Help Net Security

Global median dwell time drops to just over two weeks, reflecting the essential role partnerships and the exchange of information play in building a more resilient cybersecurity ecosystem, according to Mandiant. Modern cyber defense capabilities The report reveals the progress organizations globally have made in strengthening defenses against increasingly sophisticated adversaries. M-Trends 2023 makes it clear that, while our industry is getting better at cybersecurity, we are combating ever evolving and increasingly sophisticated adversaries. Several More

The post Organizations are stepping up their game against cyber threats appeared first on Help Net Security.

23:25

EvilExtractor, a new All-in-One info stealer appeared on the Dark Web Security Affairs

EvilExtractor is a new all-in-one info stealer for Windows that is being advertised for sale on dark web cybercrime forums.

Fortinet FortiGuard Labs researchers discovered a new all-in-one info stealer for Windows, dubbed EvilExtractor (sometimes spelled Evil Extractor) that is available for sale on dark web cybercrime forums.

EvilExtractor info stealer

EvilExtractor is a modular info-stealer, it exfiltrates data via an FTP service. The tool was developed by a company named Kodex, which claims that the tool was developed for an educational purpose. The bad news is that according to FortiGuard Labs, cybercriminals are actively using the tools as an info stealer.

The malware environment checking and Anti-VM functions.

Based on our traffic source data to the host, evilextractor[.]com, malicious activity increased significantly in March 2023. FortiGuard Labs observed this malware in a phishing email campaign on 30 March, which we traced back to the samples included in this blog. reads the report published by Fortinet. It usually pretends to be a legitimate file, such as an Adobe PDF or Dropbox file, but once loaded, it begins to leverage PowerShell malicious activities.

The researchers observed a surge in attacks spreading the malware in March 2023, most of the infections were reported in Europe and the U.S.

The tool is sold on cybercrime forums by an actor that goes online with the name Kodex, the developer released its project in October 2022 and is continuously updating it by releasing new modules with new features.

The malware can steal sensitive data from the infected endpoint, including...

23:23

3CX breach linked to previous supply chain compromise Help Net Security

Pieces of the 3CX supply chain compromise puzzle are starting to fall into place, though were still far away from seeing the complete picture. In the meantime, we now also know that: The source of the 3CX breach was a compromised installer for X_TRADER, an old software package for futures-trading provided by Trading Technologies The trojanized installer for X_TRADER software was also used to drop a backdoor on the systems of two critical infrastructure organizations More

The post 3CX breach linked to previous supply chain compromise appeared first on Help Net Security.

23:06

In the Worlds Biggest Population, Microsofts Bing Fell Below 1%, Down Sharply Since ChatGPT First Announced Techrights

Meanwhile, Microsoft-funded journalists insist that Google is doomed because of ChatGPT

The data tells another story:

Search Engine Market Share India

Summary: Bing down from 1.1% to 0.9% since ChatGPT was first unveiled (distracting from 4 consecutive months of mass layoffs in the company)

23:00

3Dfx Voodoo 1 & 2 Glide Linux Driver Retired, Other X.Org Code Officially Retired Phoronix

In clearing up the state of various X.Org packages that have been effectively unmaintained for years, an attempt is being made to better communicate the status of some "retired" X.Org packages that Linux distributions should work towards removing as they are no longer being maintained...

22:30

SELinux In Linux 6.4 Removes Run-Time Disabling Support Phoronix

After being deprecated for several years, Security Enhanced Linux "SELinux" beginning with the Linux 6.4 kernel can no longer be run-time disabled...

22:21

Physicists Create the Fattest Schrdinger's Cat Ever SoylentNews

A recent experiment tested the mass-based boundaries between the quantum and classical realms:

Picture a cat. I'm assuming you're imagining a live one. It doesn't matter. You're wrong either waybut you're also right. This is the premise of Erwin Schrdinger's 1935 thought experiment to describe quantum states, and now, researchers have managed to create a fat (which is to say, massive) Schrdinger cat, testing the limits of the quantum world and where it gives way to classical physics.

Schrdinger's experiment is thus: A cat is in a box with a poison that is released from its container if an atom of a radioactive substance, also in the box, decays. Because it is impossible to know whether or not the substance will decay in a given timeframe, the cat is both alive and dead until the box is opened and some objective truth is determined. [...]

In the same way, particles in quantum states (qubits, if they're being used as bits in a quantum computer) are in a quantum superposition (which is to say, both "alive" and "dead") until they're measured, at which point the superposition breaks down. Unlike ordinary computer bits that hold a value of either 0 or 1, qubits can be both 0 and 1 simultaneously.

Now, researchers made a Schrdinger's cat that's much heavier than those previously created, testing the muddy waters where the world of quantum mechanics gives way to the classical physics of the familiar macroscopic world. Their research is published this week in the journal Science.

In the place of the hypothetical cat was a small crystal, put in a superposition of two oscillation states. The oscillation states (up or down) are equivalent to alive or dead in Schrdinger's thought experiment. A superconducting circuit, effectively a qubit, was used to represent the atom. The team coupled electric-field creating material to the circuit, allowing its superposition to transfer over to the crystal. Capiche?

"By putting the two oscillation states of the crystal in a superposition, we have effectively created a Schrdinger cat weighing 16 micrograms," said Yiwen Chu, a physicist at ETH Zurich and the study's lead author, in a university release.

Read more of this story at SoylentNews.

22:04

Aggressive Microsoft Marketing/Lies as Bing Falls Closer to 2% Market Share, Google Gains More Share (ChatGPT Has Only Harmed Bing, Which Has Layoffs Too) Techrights

Example of media spam today (just yet more of that GOOGLE IS DEAD talking point; ever since ChatGPT was introduced Bing consistently lost share; it is a de facto censorship and distortion machine):

Schadenfreude, Anyone? Long Enslaved Media Biz Revels as Suddenly Vulnerable Google Gets Its Butt Kicked in AI (Bloom)

What has Bloom been smokin?

Consider the public data. Microsoft is down, not up:

Microsoft shell/proxy; Down about 5% this past month alone

Summary: Theres a lot of noise in the media today*; it serves to distract from a fresh round of Microsoft layoffs
_____
* Microsoft trolls including Gulagboy Matthew Garret also did a lot of a very aggressive trolling in IRC yesterday. This is bordering on the criminal.

21:55

Russian cybercrime group likely behind ongoing exploitation of PaperCut flaws Security Affairs

Print management software provider PaperCut confirmed ongoing active exploitation of CVE-2023-27350 vulnerability.

On April 19th, Print management software provider PaperCut confirmed that it is aware of the active exploitation of the CVE-2023-27350 vulnerability.

The company received two vulnerability reports from the cybersecurity firm Trend Micro) for high/critical severity security issues in PaperCut MF/NG. 

Trend Micro announced they will disclose further information (TBD) about the vulnerability on 10th May 2023.

The company addressed both vulnerabilities with the release of PaperCut MF and PaperCut NG versions 20.1.7, 21.2.11 and 22.0.9 and later, it highly recommends upgrading to one of these versions containing the fix 

We have evidence to suggest that unpatched servers are being exploited in the wild. reads the advisory published by PaperCut. PaperCut received our first report from a customer of suspicious activity on their PaperCut server on the 18th April at 03:30 AEST / 17th April 17:30 UTC. PaperCut has conducted analysis on all customer reports, and the earliest signature of suspicious activity on a customer server potentially linked to this vulnerability is 14th April 01:29 AEST / 13th April 15:29 UTC.

The CVE-2023-27350 (CVSS score 9.8) is a PaperCut MF/NG Improper Access Control Vulnerability. PaperCut MF/NG contains an improper access control vulnerability within the SetupCompleted class that allows authentication bypass and code execution in the context of system.

Last week, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added it to its Known Exploited Vulnerabilities Catalog.

Huntress researchers have observed post-exploitation activities within its partner environments after attackers exploited the above PaperCut MF/NG vulnerabilities.

Huntress security researcher Caleb Stewart also devised a proof-of-concept exploit for these threats, below is the video PoC shared by the company:

...

21:55

Study: 84% of Companies Use Breached SaaS Applications - Here's How to Fix it for Free! The Hacker News

A recent review by Wing Security, a SaaS security company that analyzed the data of over 500 companies, revealed some worrisome information. According to this review, 84% of the companies had employees using an average of 3.5 SaaS applications that were breached in the previous 3 months. While this is concerning, it isn't much of a surprise. The exponential growth in SaaS usage has security and

21:41

Hackers Exploit Outdated WordPress Plugin to Backdoor Thousands of WordPress Sites The Hacker News

Threat actors have been observed leveraging a legitimate but outdated WordPress plugin to surreptitiously backdoor websites as part of an ongoing campaign, Sucuri revealed in a report published last week. The plugin in question is Eval PHP, released by a developer named flashpixx. It allows users to insert PHP code pages and posts of WordPress sites that's then executed every time the posts are

21:37

The Microsoft Spin Machine Resumes Amid Layoffs, Azures Decline, and Worse News Techrights

Tech investors focus on profits after layoffs; companies to highlight AI

Summary: So-called news so-called reporting (see the above from Reuters, with focus on profits after layoffs; companies to highlight AI) will be used to disguise or distract from whats actually happening; its already starting on the wrong foot for Microsoft, so it wants everyone to believe the future is glamorous and all about HEY HI (AI); they keep making puff pieces about an HEY HI arms race (miraculously Microsoft is already the self-professed market leader owing to paid-for hype campaigns) and other such nonsense, looking for additional bailouts and asking shareholders for patience

With reports about Azure failing at RoI, citing typical HEY HI (AI) misdirection, were meant to think everything will be rosy this week (see screenshot above; Microsoft is not after layoffs, the layoffs are still ongoing and not stopping). Microsoft-connected publishers try to change the subject (Microsoft-Activision Deal), probably seeking distract from Microsoft layoffs ahead of disappointing quarterly "results". They basically quote a paid Microsoft lobbyist, Florian Mueller, who has a two-way confl...

21:23

Why will NASAs Artemis 2 only fly around the moon, not orbit or land? Lifeboat News: The Blog

NASA landed 12 astronauts on the moon during the Apollo program more than half a century ago. So why is the upcoming Artemis 2 mission just doing a lunary fly-around?

21:23

Three of Metas top execsincluding Mark Zuckerbergare now spending most of their time on A.I. Lifeboat News: The Blog

Facebook and Instagram owner Meta will release a commercial A.I. product, following moves from Google, Microsoft, and OpenAI, in 2023 confirmed Reality Labs boss Andrew Bosworth.

21:23

AI will Not Become Conscious Rupert Sheldrake Lifeboat News: The Blog

This clip is from the Before Skool Podcast ep. # 4 with Rupert Sheldrake. Full podcast can be accessed here: https://www.youtube.com/watch?v=68fjlUuvOGM&t=3784s.

Rupert Sheldrake, PhD, is a biologist and author best known for his hypothesis of morphic resonance. At Cambridge University he worked in developmental biology as a Fellow of Clare College. He was Principal Plant Physiologist at the International Crops Research Institute for the Semi-Arid Tropics in Hyderabad, India. From 2005 to 2010 he was Director of the Perrott-Warrick project for research on unexplained human and animal abilities, administered by Trinity College, Cambridge. Sheldrake has published a number of books A New Science of Life (1981), The Presence of the Past (1988), The Rebirth of Nature (1991), Seven Experiments That Could Change the World (1994), Dogs That Know When Their Owners are Coming Home (1999), The Sense of Being Stared At (2003), The Science Delusion (Science Set Free) (2012), Science and Spiritual Practices (2017), Ways of Going Beyond and Why They Work (2019).

Rupert gave a talk entitled The Science Delusion at TEDx Whitechapel, Jan 12, 2013. The theme for the night was Visions for Transition: Challenging existing paradigms and redefining values (for a more beautiful world). In response to protests from two materialists in the US, the talk was taken out of circulation by TED, relegated to a corner of their website and stamped with a warning label.

To Learn more about Rupert Sheldrake and his research, please visit https://www.sheldrake.org/

Please subscribe to Before Skool. Thank you.

21:18

VMware plugs security holes in VMware Aria Operations for Logs (CVE-2023-20864, CVE-2023-20865) Help Net Security

VMware has fixed two vulnerabilities (CVE-2023-20864, CVE-2023-20865) in VMware Aria Operations for Logs (formerly vRealize Log Insight), a widely used cloud solution for log analysis and management. About the vulnerabilities (CVE-2023-20864, CVE-2023-20865) CVE-2023-20864, a deserialization vulnerability, could be exploited by an unauthorized, malicious actor who has network access to VMware Aria Operations for Logs. This can result in the execution of arbitrary code as root. CVE-2023-20865 is a command injection vulnerability that allows a bad More

The post VMware plugs security holes in VMware Aria Operations for Logs (CVE-2023-20864, CVE-2023-20865) appeared first on Help Net Security.

21:00

3D Scanning a Room With a Steam Deck And a Kinect Hackaday

It may not be obvious, but Valves Steam Deck is capable of being more than just a games console. Demonstrating this is [Parker Reed]s experiment in 3D scanning his kitchen with a Kinect and Steam Deck combo, and viewing the resulting mesh on the Steam Deck.

...

20:43

Improved AMD Color Management Being Worked On For The Steam Deck Phoronix

Open-source Linux graphics driver engineer Melissa Wen with Igalia, Joshua Ashton with Valve, and Harry Wentland with AMD have been working on kernel mode-setting (KMS) color pipeline enhancements for SteamOS and in particular for enhancing the Steam Deck...

20:28

Kdenlive 23.04 Open-Source Video Editor Released With Nested Timelines Phoronix

Kdenlive remains one of the best available fully open-source non-linear video editing solutions available. With today's release of Kdenlive 23.04 they continue enhancing its feature set and improving the UI/UX for those editing videos on the Linux desktop...

20:21

LibrePlanet: Dr. William Cooper Davidon Uses Boeing 737 Max Aircrafts as Example of Proprietary Software Causing Deaths Techrights

Video download link

Summary: The above LibrePlanet talk by Dr. William Cooper Davidon was uploaded by the FSF (PeerTube link) six days ago; From the official page: In safety-critical software, mistakes and errors can be lethal. Recent accidents with the Boeing 737 Max Aircraft illustrate the failure of proprietary software required to have undergone careful review following the F.A.A.s DO-178x certification process. Governments and the people they represent must strongly consider requiring free software to be used for safety-critical code implementations. Free software offers transparency and a much higher level of review than what is possible with proprietary software.

Licence: CC BY SA 4.0

20:06

Linux 6.4 Kernel Graphics Drivers Include More Meteor Lake Code, Rockchip 4K, QAIC Phoronix

With Linux 6.3 released that marks the opening of the two-week Linux 6.4 merge window. David Airlie sent in the Direct Rendering Manager (DRM) subsystem updates already for Linux 6.4 with the assortment of kernel graphics/display driver updates...

19:34

Weird SARS-CoV-2 Outbreak in Mink Suggests Hidden Source of Virus in the Wild SoylentNews

The lineage had not been seen in the area for over two years:

[...] SARS-CoV-2 infections in mink aren't particularly noteworthy or concerning on their own; it's well established that mink are susceptible to the virus. The realization early in the pandemic resulted in extensive culls in Denmark and the Netherlands during 2020 and led to intensive monitoring and regulation of remaining mink herds in many places, including Poland.

But the recent cases in Polish mink, reported this week in the journal Eurosurveillance, are unusual. While previous mink outbreaks have linked to infected farmworkers and local circulation of the virusindicating human-to-mink spreadnone of the farm workers or families in the recently affected farms tested positive for the virus. In fact, health investigators found that the infected mink carried a strain of SARS-CoV-2 that has not been seen in humans in the region in more than two years (B.1.1.307).

The finding suggests that humans were not responsible for infecting the minkat least not directly. Rather, it suggests that another unknown species may have been stealthily harboring and spreading the otherwise bygone strain for some time and managed to carry it onto the mink farms.

The suggestion raises more concern over viral "spillback." The term relates to the more recognized "spillover," when a virus jumps from a host populationa reservoirto a new population, such as humans. SARS-CoV-2 is thought to have originated in a reservoir of horseshoe bats before it reached humans. Since then, it is clear that it can also infect a broad range of animals, including rodents, cats, dogs, white-tail deer, non-human primates, as well as ferrets and mink. Researchers fear that the virus could spill back to an animal population that could become a new reservoir from which the virus could periodically move back to humans.

Read more of this story at SoylentNews.

19:22

The A.I. Dilemma Tristan Harris & Aza Raskin Center for Humane Technology March 9, 2023 Lifeboat News: The Blog

Click on photo to start video.

This video is from a presentation at a private gathering in San Francisco on March 9th with leading technologists and decision-makers with the ability to influence the future of large-language model AIs. This presentation was given before the launch of GPT-4.

Center for Humane Technology.

Original video : https://vimeo.com/809258916/92b420d98a

19:22

ChatGPT may hinder the cybersecurity industry Lifeboat News: The Blog

Join top executives in San Francisco on July 1112, to hear how leaders are integrating and optimizing AI investments for success. Learn More

Since its launch in November 2022, ChatGPT, an artificial intelligence (AI) chatbot, has been causing quite a stir because of the softwares surprisingly human and accurate responses.

The auto-generative system reached a record-breaking 100 million monthly active users only two months after launching. However, while its popularity continues to grow, the current discussion within the cybersecurity industry is whether this type of technology will aid in making the internet safer or play right into the hands of those trying to cause chaos.

19:13

Press Report This Morning: Microsoft Azure Layoffs Again, Entire Team Laid Off (Updated) Techrights

So what we published only hours ago is turning out to be correct already:

Microsoft layoffs impact A/NZ

Summary: As per the report, everyone at the FastTrack for Azure NZ team [..] have been laid off as Microsoft cuts costs globally, Larsen (New Zealand) wrote.

Update: More here.

Microsoft's global layoffs land in NZ, Azure 'FastTrack' team nixed

Microsoft appears to be making significant layoffs across Australia and New Zealand as the global economy heads south.

A post this morning by Daniel Larsen, principal customer experience engineer at Microsofts local FastTrack for Azure team based in New Zealand, said that entire team had been laid off.

After seven wonderful years at Microsoft I, along with the rest of the FastTrack for Azure NZ team, have been laid off as Microsoft cuts costs globally, Larsen wrote.

While this is disappointing, its also an opportunity to reset and try something new.

Larsen described five other affected employees as world class engineers experienced in deploying large and complex Azure workloads.

As noted 5 hours ago: Azure layoffs have gone on every year since 2020 (the media almost never mentions this and trolls from Microsoft are very sensitive about this topic, based on what we saw in IRC).

18:28

Hackers can hack organizations using data found on their discarded enterprise network equipment Security Affairs

ESET researchers explained that enterprise network equipment that was discarded, but not destroyed, could reveal corporate secrets.

ESET researchers purchased a few used routers to set up a test environment and made a shocking discovery, in many cases, previously used configurations had not been wiped.

The experts pointed out that the data they found on the devices could be used to identify the prior owners, this information can be used by threat actors to breach their networks.

Results reported here show that a majority of the secondary market core routers sampled contained recoverable configuration data from their previous deployments, replete with sensitive, and even confidential, data. This allowed ESET researchers to identify devices previously used in a data center/ cloud computing business (specifically, a router provisioning a universitys virtualized assets), a nationwide US law firm, manufacturing and tech companies, a creative firm, and a major Silicon Valleybased software developer, among others. reads the report published by ESET.

The experts highlight the importance of adopting a procedure to correctly dismiss enterprise network equipment, like routers, due to the huge quantity of information they contain.

The ESET research team decided to conduct a more extensive test and purchased 18 used routers to determine which kind of information was possible to find on the dismissed network equipment and how threat actors can use them in future attacks against the company that discarded them.

This enterprise network equipment is widely adopted by organizations worldwide, ESET explained that they are a class of device that is commonly available at bargain basement prices in the secondary market
(US$50150).

Below is the list of devices bought by ESET:

  • 4 Cisco Systems ASA 5500 series
  • 3 Fortinet FortiGate series
  • 11 Juniper Networks SRX Series Services Gateway

One of the routers was dead on arrival and two were a mirrored pair. The report...

18:27

Resecurity to showcase innovative cybersecurity solutions at RSA Conference 2023 Help Net Security

Resecurity is excited to announce its participation at RSA Conference 2023, the cybersecurity event that brings together industry leaders and professionals to share knowledge and insights on the latest trends, threats, and solutions. The event will take place from April 24-27, 2023, at the Moscone Center in San Francisco, California. This years theme Stronger Together resonates with Resecuritys mission to provide cybersecurity solutions that empower organizations to detect, prevent, and respond to sophisticated cyber threats. More

The post Resecurity to showcase innovative cybersecurity solutions at RSA Conference 2023 appeared first on Help Net Security.

18:00

OSI Superboard II Replicated Hackaday

While our modern computer can easily emulate a lot of different old machines, there is something about having replica hardware that is even better. Not as nice as having the real thing, in some ways, although you dont have to worry about wear and tear on a replica, either. [Jeff Tranter] has built a kit replica of an Ohio Scientific Superboard II, and it looks great, as you can see in the video below.

This was an inexpensive all-in-one 6502 computer with a keyboard and provision for TV or monitor output. If you had a 5V power supply, a cassette deck, and a TV you were in business for less money than most of the comparable alternatives. In fact, [Jeff] has the canceled check where his parents paid $486 Canadian for one in 1981. That was his introduction to computing, and wed say that was a reasonable investment on the part of his parents.

Like many of us, [Jeff] was sad when his old computer was destroyed while in storage. But undeterred, he set out to build a replica. Earlier, hed built a reproduction kit that used modern components, but he wanted something a bit more faithful. He noticed that modern reproduction PCBs were available for the board and some matching I/O as well. The boards are very similar to the original, with a few concessions to modern times like footprints for modern keyboard switches and EEPROMs.

Not all of the parts are readily available, but with a little detective work, you can get what you need. He even found...

17:47

How product security reached maturity Help Net Security

Product security has been driving major changes throughout the automotive, medical, and industrial sectors. However, just a few short years ago, it was a term few knew and even less considered its own discipline. Slava Bronfman, Co-Founder & CEO of Cybellum discusses his experience in watching the product security sector mature over the last decade in the recent episode of Left to our Own Devices podcast. Bronfman has been an active member and contributor to More

The post How product security reached maturity appeared first on Help Net Security.

17:28

Leaked EC Plan to Combat IPTV Piracy Disappoints Rightsholders TorrentFreak

iptvIn mid-January, the European Commission (EC) issued a call for evidence to support a proposed toolbox of measures to combat live sports piracy.

Rightsholders usually welcome support at the EU level with open arms, but in this case it only increased frustrations. Last October a huge coalition of rightsholders called on the EC to introduce new law that would compel intermediaries to take pirate streams offline within minutes of a complaint.

The EC refused and offered existing law as the solution. For rightsholders claiming to have exhausted its limits, that clearly wasnt ideal.

More Evidence Needed

Over a period of several years, rightsholders have reported in fine detail the numerous challenges they face when it comes to tackling piracy of live sports. Dozens of reports spanning thousands of pages have left almost no stone unturned. The issue is comprehensively mapped, to say the least.

This January, the EC issued a call for evidence so that rightsholders and other stakeholders could detail their problems all over again. The aim was to find solutions to these well-documented problems under existing law, which rightsholders insist is inadequate.

Whether anyone learned anything substantially new from that process is unknown but having gone through the motions, the ECs recommendation will be officially released early May. Perhaps fittingly given the topic, the ECs report has already leaked online and according to reports, rightsholders are underwhelmed by the document, to put it mildly.

Leaked Report Delivers Disappointment

While it must be frustrating for the EC to see its report publicly rejected in advance of its release, one gets the impression that nobody really expected the EC to come up with anything groundbreaking, at least not on the scale demanded by rightsholders.

Euractiv says the recommendation focuses on the effective handling of take-down requests, dynamic injunctions, and voluntary cooperation but for rightsholders already engaged in all of these things and more, that advice seems unlikely to inspire.

An anonymous representative of the Live Content Coalition, which counts the Audiovisual Anti-Piracy Alliance (AAPA) and several other major video gr...

17:22

Hackers can breach networks using data on resold corporate routers Lifeboat News: The Blog

Enterprise-level network equipment on the secondary market hide sensitive data that hackers could use to breach corporate environments or to obtain customer information.

Looking at several used corporate-grade routers, researchers found that most of them had been improperly wiped during the decommissioning process and then sold online.

17:22

17:22

A new wake-up receiver could help preserve the battery life of tiny sensors Lifeboat News: The Blog

Scientists demonstrate a low-power wake-up receiver one-tenth the size of other devices.

17:00

Genetic chaos leads to rapidly developing cancers Terra Forming Terra


Is it  possible that cancer cannot be fully cured and only suppressed?  Even AIDS has been successfully suppressed so we can take that solution.

What is obvious is t5hat the whole mRNA protocol is reckless in the extreme.

Worse is that they all act like they are ok with global genocide.

Genetic chaos leads to rapidly developing cancers


https://expose-news.com/2023/04/20/genetic-chaos-leads-to-rapidly-developing-cancers/

A recent study has found that genetic chaos leads to rapidly developing aggressive cancers that are difficult to treat.

The part of the cell which reads the instructions in our DNA is known as the cytoplasm. The cytoplasm contains over 40 million proteins including RNA molecules. mRNA vaccines are designed to invade the cytoplasm and repurpose its RNA mechanisms for other tasks. About as close to genetic chaos as we can imagine.

Moderna recently announced it will extend the use of its mRNA injections as a vaccine against all sorts of conditions, including canc...

Your Brain Is Shaped Like Nobody Elses Terra Forming Terra





I would like to know just what the area of individual brains happens to be.  It is unlikely a constant, but its usage is hardly understood.  The stuff published is not confidence inspiring and it has trickled down as long past guesses.

We need a scanning method that captures all the topography and then we need to map htat surface against observed internal activity.

Then we may have enough data to see a real pattern and associations.  Right now it is fuzzy and untrustworthy which is why no one makes promises..

Your Brain Is Shaped Like Nobody Elses

Every brains white matter is differentand that might hold the key to better treatments.

By Sofia Quaglia
April 19, 2023

https://nautil.us/your-brain-is-shaped-like-nobody-elses-297950/


With a large blade resembling a bread knifebut without the jagged edgesStephanie Forkel slices through the human brain lying in front of her on the dissection table. A first-year university student, Forkel is clad in an apron and protective gear. Its her first day working in the morgue at a university hospital in Munich, Germany, where the brains of people whove donated their bodies to science are examined for research.

Her contact lenses feel dry because of the dense formaldehyde hanging in the air. But thats not the only reason she squints a little harder. When she looks down at the annotated brain diagram in the textbook shes supposed to use for ref...

Western Media Failures Regarding Ukraine. An Irish Historical Perspective Terra Forming Terra




The surprise to me is that the NAZI meme both predated WWII and then persisted under the rule of the USSR.  And it is fair game for an Irish commentator because they can never be blinded by the propaganda of the majority opinion.  If your fasmily is sympathetic to a minority taste, you end up atually been objective.


This is a solid analysis, and yes, all Russia has to do is stay the course while the Ukraine burns of all available resources.  In WAR it is all about numbers after the early scrapping is done.  that is why an inferior force must have an early decision.  And then it wil not matter if the other side has staying power and that is what we are seeing here.

A superior force is now holding a long front and slinging artillary well in excess of what the Ukraine can do.  Like Korea, this can go on for years and may well do so.  In the meantime Russia has what it wants.  

Western Media Failures Regarding Ukraine. An Irish Historical Perspective



Global Research, April 20, 2023

Theme: History
In-depth Report: UKRAINE REPORT



Relating to the situation in Ukraine, it can be revealing to look at perceptions of its ongoing developments from abroad. Even to non-military observers located hundreds o...

A cure for grey hair on the horizon? Terra Forming Terra




This actually promising and hopefully it also leads back to hair loss, though that seems unlikely.  Yet everyone and particularly women want this.

We do know that the majority of men put things off with hair dye and most women do color anyway.  None of that matters, but having yournatuaral color back would be welcome to most.

All men would prefer a thick head of hair.  It thins at least for all men.  color remains optional and thinned youthful hair is still doable for most.


A cure for grey hair on the horizon? Scientists discover the mechanism for the color change in breakthrough that could allow us to REVERSE it

Scientists believe greying is due to the immobility of stems cells



By XANTHA LEATHAM 

 19 April 2023

https://www.dailymail.co.uk/sciencetech/article-11990613/A-cure-grey-hair-horizon-Scientists-discover-mechanism-color-change.html

Its the tell-tale sign of aging that men and women have tried to cover for generations.

But scientists are one step closer to finding a way to reverse greying hairs without resorting to regular trips to the hairdresser.

A team of researchers has discovered stem cells which are able to de...

16:49

Red Alert: ICANN and Verisign Proposal Would Allow Any Government in the World to Seize Domain Names SoylentNews

Red Alert: ICANN and Verisign Proposal Would Allow Any Government In The World To Seize Domain Names:

ICANN, the organization that regulates global domain name policy, and Verisign, the abusive monopolist that operates the .COM and .NET top-level domains, have quietly proposed enormous changes to global domain name policy in their recently published "Proposed Renewal of the Registry Agreement for .NET", which is now open for public comment.

Either by design, or unintentionally, they've proposed allowing any government in the world to cancel, redirect, or transfer to their control applicable domain names! This is an outrageous and dangerous proposal that must be stopped. While this proposal is currently only for .NET domain names, presumably they would want to also apply it to other extensions like .COM as those contracts come up for renewal.

The offending text can be found buried in an Appendix of the proposed new registry agreement. Using the for quickly seeing what has changed compared with the current agreement), the critical changes can be found in Section 2.7 of Appendix 8, on pages 147-148. [...]

It would allow Verisign, via the new text in 2.7(b)(ii)(5), to:

" deny, cancel, redirect or transfer any registration or transaction, or place any domain name(s) on registry lock, hold or similar status, as it deems necessary, in its unlimited and sole discretion" [the language at the beginning of 2.7(b)(ii), emphasis added]

Read more of this story at SoylentNews.

16:36

New All-in-One "EvilExtractor" Stealer for Windows Systems Surfaces on the Dark Web The Hacker News

A new "all-in-one" stealer malware named EvilExtractor (also spelled Evil Extractor) is being marketed for sale for other threat actors to steal data and files from Windows systems. "It includes several modules that all work via an FTP service," Fortinet FortiGuard Labs researcher Cara Lin said. "It also contains environment checking and Anti-VM functions. Its primary purpose seems to be to

16:05

Russian Hackers Suspected in Ongoing Exploitation of Unpatched PaperCut Servers The Hacker News

Print management software provider PaperCut said that it has "evidence to suggest that unpatched servers are being exploited in the wild," citing two vulnerability reports from cybersecurity company Trend Micro. "PaperCut has conducted analysis on all customer reports, and the earliest signature of suspicious activity on a customer server potentially linked to this vulnerability is 14th April 01

15:48

LibrePlanet Talk About Free Software in Critical Agricultural Equipment Techrights

Video download link

Summary: The above LibrePlanet talk from sick.codes was uploaded by the FSF last week (slides here; PeerTube link); From the official page: Free software is used in almost all mission critical agricultural equipment: GPS guidance, vehicle ECUs, touch screen displays. In this talk, I will demonstrate how much free software is used to maintain the food supply chain, as we know it and the importance of keeping free software in these processes. Secondly, the importance of upholding the four essential freedoms that are already in use by major agriculture companies, hardware makers, inventors most importantly, the users, farmers.

Licence: CC BY SA 4.0

15:32

The Inside Story of Sirius Open Source Pretending to be American schestowitz.com

Video download link | md5sum 8ce515754e59d043a723d0590817c9ce
Sirius Situation
Creative Commons Attribution-No Derivative Works 4.0

Summary: The second part of Sirius Open Source Fantasy (an ongoing series; there are two series about Sirius running in conjunction at the moment) deals with what the text below

ABOUT a year ago, some time in April, Sirius privately admitted it was having issues. It was trying to spin those as a strength. The person who likely participated in defrauding staff (she saw those fake payslips for years) sent a misleading message. It was soon followed by a misleading online meeting.

The above video does not play back any of that meeting, but it is summarised by noting that the company was planning to move to the US (that never happened!)

Staff raised concerns about a number of different issues. The talking went on and on for nearly 2 hours, nothing is interesting enough to single out, but what we have discussed about the meeting since then was likely summarised here back in December and January. Well try to avoid repetition. Some of the later parts will be more interesting.

15:29

The Sirius Open Source Fantasy Part II Briefings About the Company Techrights

Series parts:

  1. The Sirius Open Source Fantasy Part I In 2022 the Company Was Already Too Deep in Debt
  2. YOU ARE HERE Briefings About the Company

Video download link | md5sum 8ce515754e59d043a723d0590817c9ce
Sirius Situation
Creative Commons Attribution-No Derivative Works 4.0

Summary: The second part of Sirius Open Source Fantasy (an ongoing series; there are two series about Sirius running in conjunction at the moment) deals with what happened 11.5 months ago; the above video is a

ABOUT a year ago, some time in April, Sirius privately admitted it was having issues. It was trying to spin those as a strength. The person who likely participated in defrauding staff (she saw those fake payslips for years) sent a misleading message. It was soon followed by a misleading online meeting.

Staff raised concerns about a number of different issues.The above video does not play back any of that meeting, but it is summarised by noting that the company was planning to move to the US (that never happened!)

Staff raised concerns about a number of different issues. The talking went on and on for nearly 2 hours, nothing is interesting enough to single out, but what we have discussed about the meeting since then was likely summarised here back in December and January. Well try to avoid repetition. Some of the later parts will be more interesting.

15:06

Microsofts Quarterly Results for This Week Expected to Disappoint, More Layoffs This Week or in Summer (July) Techrights

Video download link | md5sum 6fcadc40c887fff7b6a14fafef7589df
Microsoft Layoffs Ahead
Creative Commons Attribution-No Derivative Works 4.0

Summary: Microsofts financial results (due in the middle of this week) are already expected to miss targets (set by Microsoft itself), based on media reports from reputable sources; whats not known, however, is whether Microsoft will announce the next major round of layoffs some time very soon or in summertime (based on rumours this is expected in July)

THE Microsoft layoffs in the past month or so are not part of the 10,000 announced in January (the media keeps parroting this while ignoring months of consequent and unrelated layoffs, not to mention contractors and temps). There are more to come. Expect more layoffs. The word coming from/through the grapevine is that in July (summer, ahead of results) there will be truly massive layoffs on a scale bigger than in January. What remains unknown, however, is whether this week too Microsoft will announce additional layoffs to appease investors; maybe WARN Act can be dodged somehow, but they have until Wednesday to say something (all we see is mindless puff pieces).

People who still work for Microsoft are very anxious, but they feel unable to leave as not many other companies recruit at all.Days ago a few media outlets dropped a hint that Microsofts results would disappoint in the clown computing area (read: Azure), so one can imagine more layoffs in this supposedly strategic and growth domain. Azure layoffs have gone on every year since 2020 (the media almost never mentions this and trolls from Microsoft are very sensitive about this topic, based on what we saw in IRC).

People who still work for Microsoft are very anxious, but they feel unable to leave as not many other companies recruit at all. As a result, they overwork (for the...

15:00

Unlocking the passwordless era Help Net Security

Although interest in passwordless technology, which aims to eliminate the need for passwords, is relatively low, 65% of consumers are receptive to using new technology that simplifies their lives, according to 1Password. Passkeys, the newest and most secure passwordless technology, are poised to do just that, transforming our online lives by making logging in simpler to navigate and far more secure. Convenience shouldnt come at the expense of security, said Jeff Shiner, CEO of 1Password. More

The post Unlocking the passwordless era appeared first on Help Net Security.

15:00

Rickrolling SSID with ESP32 Hackaday

Reddit user [nomoreimfull] posted code for a dynamic WiFi beacon to r/arduino.  The simple, but clever, sketch is preloaded with some rather familiar lyrics and is configured to Rickroll wireless LAN users via the broadcast SSID (service set identifier) of an ESP32 WiFi radio.

The ESP32 and its smaller sibling the ESP8266 are tiny microcontrollers that featuring built-in WiFi support. With their miniature size, price, and power consumption characteristics, theyve become favorites for makers, hackers, and yes pranksters for a wide variety of projects. They can be easily programmed using their own SDK or through a board support extension to the Arduino IDE.

For the dynamic WiFi beacon, the ESP32 is placed into AP (access point) mode and broadcasts its human readable name (SSID) as configured. What makes the SSID dynamic, or rolling, is that the sketch periodically updates the SSID to a next line of text stored within the code. Of course, in the Rickroll prank this means the next line of lyrics from Never Gonna Give You Up by Rick Astley himself.

Always a favorite prank, weve seen Rickrolls take the form of IR remote controls ,...

14:01

NASA and Japan Team Up for Unprecedented Martian Moon Mission SoylentNews

The U.S. space agency is supplying two instruments for a Japanese spacecraft tasked with collecting samples from Phobos:

JAXA is getting ready to visit Mars's two moons, but Japan's space agency is no longer going alone.

This week, NASA signed a memorandum of understanding with JAXA to join its upcoming mission to the two Martian moons, Phobos and Deimos, which is scheduled to launch in 2024. NASA has assembled a team of scientists and prepared two instruments to board JAXA's spacecraft to Mars, the space agency announced on Tuesday.

The Martian Moons eXploration (MMX) mission will not only visit the two mysterious moons that whirl around Mars, it will also land on the cratered surface of Phobos to snag a sample from the largest of the two moons.

It's an ambitious plan as no spacecraft has successfully ventured to the Martian moons before, let alone land on one. JAXA, however, has some experience in returning samples from cosmic bodies. The Japanese space agency's Hayabusa spacecraft retrieved samples from asteroid Itokawa's surface in 2010, while Hayabusa2 returned samples from a different asteroid named Ryugu in 2020.

[...] The main purpose of the mission is to analyze the origins of the Martian moons and determine whether they are in fact captured asteroids in the Mars system or fragments that coalesced together following a huge impact on the Red Planet. The mission could help scientists better understand how terrestrial planets like Mars form and learn more about the history of the planet.


Original Submission

Read more of this story at SoylentNews.

12:39

MEO - 8,227 breached accounts Have I Been Pwned latest breaches

In early 2023, a corpus of data sourced from the New Zealand based face mask company MEO was discovered. Dating back to December 2020, the data contained over 8k customer records including names, addresses, phone numbers and passwords stored as MD5 Wordpress hashes. MEO did not respond to multiple attempts to report the breach.

12:00

Shake Your PCB Etching, With An Old Optical Drive Hackaday

Easy PCB fabrication in China has revolutionised electronic construction at our level, but there are still times when it makes sense to etch your own boards. Its a messy business that can also be a slow one, but at least a project from [earldanielph] takes away one chore. It agitates the etchant solution round the board, by moving the tank backwards and forwards on the drawer of an old optical drive.

The first part of the build is simply removing all parts of the drive except the drawer mechanism and its motor. This is still, in most cases, a DC motor, so an Arduino can easily drive it with a motor control shield. Its worth a moment to reflect on how little there is to a modern optical drive.

The Arduino receives a sketch that moves the tray backward and forward, and a piece of ply is attached to the tray. This becomes a stand for a plastic tub containing the etchant and board, and the liquid is soon swishing back and forwards over the surface. You can see the result in the video below the break. Definitely a saving over manual agitation. Its an inventive machine, but its not...

11:58

LibrePlanet Talk About ARM and RISC-V Techrights

Video download link

Summary: The above LibrePlanet talk is a month-old physical presence talk and it was uploaded by the FSF 5 days ago (slides here; PeerTube link); From the official page: The RISC-V architecture and ecosystem have undergone tremendous growth recently. We will take a look at the current state of RISC-V and its current deployment footprint. Well discuss where RISC-V may be headed and the role it may play in completely open and free datacenter servers, tablets, and cellphones. We will review the emergence of the ARM architecture and how in may be an important stepping stone to a free computing platform. Well discuss the differences between the ARM licensing model and the X86_64 architecture licensing model as well as the role of ARM processors in cell phones and cloud datacenters (such as AWS). Finally, well take a brief look at some options for starting RISC-V free and open hardware development for both experienced FPGA programmers and newbies. Well explain options including physical RISC-V processors, FPGAs, and software emulation.

Licence: CC BY SA 4.0

11:38

[Meme] Soft on Crime Techrights

White-collar crime; The system

Summary: The good news is that crimes of Sirius Open Source were formally reported to the authorities but the bad news is that, according to them, it may take up to 28 days to investigate (the process is different when you have connections)

11:27

The Plan That Never Materialised (Sirius Corporation in 2022) schestowitz.com

Series parts:

  1. YOU ARE HERE ? In 2022 the Company Was Already Too Deep in Debt

Video download link | md5sum 5955a4f5328798df162f089486615507
Sirius in 2022
Creative Commons Attribution-No Derivative Works 4.0

Summary: A look back at what happened in Sirius Open Source last year

THE last year of Sirius (CEO left already) is easy to recall in light of an old recording of a 2-hour meeting. After the company had secretly plundered its own staff it was desperately chasing clients while abusing and underpaying staff, as we explained before.

In the name of cost savings (nope!) it adopted clown computing and then it let go of a physical office. It was changing servers by getting rid of its own. Everything it had left was a virtual asset there were no physical assets left. Such facts have been mentioned since, even in the meeting, which brought up potential clients. Its worth noting that these clients never became actual clients of Sirius and the company was trying to rebrand or reinvent itself as SiriUS (it was pronounced Sir US).

The manager who left last month was basically reporting to staff, showing his graph presentation while talking about sales, engineering, infrastructure, outsourcing, support, projects etc. Of course it all become a complete disaster. Almost an hour in he was summarising the re-infrastructuring process something that never happened.

I first considered leaving the company in 2019 (after the likely illegal contract-signing, then the NDA and the bullying), but last year I was already sure Id leave. That the company secretly plundered members of staff is something that wasnt confirmed until this year. Now we work towards accountability (prosecution).

11:22

The Sirius Open Source Fantasy Part I In 2022 the Company Was Already Too Deep in Debt Techrights

Series parts:

  1. YOU ARE HERE In 2022 the Company Was Already Too Deep in Debt

Video download link | md5sum 5955a4f5328798df162f089486615507
Sirius in 2022
Creative Commons Attribution-No Derivative Works 4.0

Summary: A look back at what happened in Sirius Open Source last year

THE last year of Sirius (CEO left already) is easy to recall in light of an old recording of a 2-hour meeting. After the company had secretly plundered its own staff it was desperately chasing clients while abusing and underpaying staff, as we explained before.

In the name of cost savings (nope!) it adopted clown computing and then it let go of a physical office. It was changing servers by getting rid of its own. Everything it had left was a virtual asset there were no physical assets left. Such facts have been mentioned since, even in the meeting, which brought up potential clients. Its worth noting that these clients never became actual clients of Sirius and the company was trying to rebrand or reinvent itself as SiriUS (it was pronounced Sir US).

That the company secretly plundered members of staff is something that wasnt confirmed until this year. Now we work towards accountability (prosecution).The manager who left last month was basically reporting to staff, showing his graph presentation while talking about sales, engineering, infrastructure, outsourcing, support, projects etc. Of course it all become a complete disaster. Almost an hour in he was summarising the re-infrastructuring process something that never happened.

I first considered leaving the company in 2019 (after the likely illegal contract-signing, then the NDA and the bullying), but last year I was already sure Id leave. That the company secretly plundered members of staff is something that wasnt confirmed until this year. Now we work towards accountability (prosecution).

11:15

The Farthest-away Pictures of Earth Ever Taken SoylentNews

Our precious planet seen from deep space:

NASA's exploration robots have rumbled around Mars, swooped around Saturn, and flown well beyond the planets, into interstellar space.

But the space agency's engineers often direct their machines to peer back at the vivid blue dot in the distance.

"During almost every mission we turn around and take a picture back home," NASA's former chief historian, Bill Barry, told Mashable. "There seems to be an irresistible tendency to look back at home."

Indeed, in the cosmic images below you'll glimpse some of the farthest-away views of our humble, ocean-blanketed world ever captured by humanity. When we view other objects, worlds, stars, or even galaxies, we often see just dots. But to most of the cosmos, we're just a dot in the vast ether, too.

The article has nice images of the Earth and Moon taken by OSIRIS-REx, Earth as seen from the surface of Mars, a video flyby of the Earth and Moon by the Juno spacecraft, and a beautiful shot of Earth looking back with Saturnian rings in the view by Cassini, all reminding us of Carl Sagan's famous Pale Blue Dot where he observed:

To my mind, there is perhaps no better demonstration of the folly of human conceits than this distant image of our tiny world. To me, it underscores our responsibility to deal more kindly and compassionately with one another and to preserve and cherish that pale blue dot, the only home we've ever known.


Original Submission

Read more of this story at SoylentNews.

11:00

GNU Linux-libre 6.3-gnu Cleans Up New ath12k WiFi Driver, Other New Additions Phoronix

Following this afternoon's release of the Linux 6.3 kernel, GNU Linux-libre 6.3-gnu has already been released as this downstream kernel flavor that removes support for loading binary-only modules and trying to de-blob other driver code that otherwise depends upon "non-free" code...

10:12

DistroWatch Weekly, Issue 1016 DistroWatch.com: News

This week in DistroWatch Weekly: Review: Qubes OS 4.1.2News: Ubuntu improves Snap performance, Solus plans to resume development, Manjaro fixes installer bugs, FreeBSD publishes status report, KaOS celebrates tenth anniversaryQuestions and answers: Tracking bandwidth usageReleased last week: Fedora 38, Ubuntu 23.04, deepin 20.9Torrent corner: Fedora, KDE neon, Lubuntu,....

10:00

HPR3841: The Oh No! News. Hacker Public Radio

The Oh No! news. Oh No! News is Good News. Threat analysis; your attack surface. Article: US Marshals Service Computer System Hit by Ransomware Attack. Author: Michael Kan. (2023, Feb 28). The agency uncovered the intrusion on Feb. 17 2023, when it discovered “a ransomware and data exfiltration event affecting a standalone USMS system.” That means the hackers stole information from the computer while planting malicious code capable of encrypting the data inside. “The affected system contains law enforcement sensitive information, including returns from legal process, administrative information, and personally identifiable information pertaining to subjects of USMS investigations, third parties, and certain USMS employees,” the agency says. Article: US Shuts Down 'Netwire' Malware That Posed as Legit Remote Admin Tool. Author: Michael Kan. (2023, Mar 10). Worldwiredlabs.com has been around since at least 2012(Opens in a new window), offering a software product called “Netwire,” which is supposedly designed to help IT support staff manage computers remotely. Before the site was seized, it was offering Netwire for $10 per month or $60 per year. However, US investigators say the site was a front to sell the software as a hacking tool to cybercriminals. Supporting Article: Federal Authorities Seize Internet Domain Selling Malware Used to Illegally Control and Steal Data from Victims’ Computers. Author: U.S. Attorney's Office, Central District of California. (2023, Mar 9). A seizure warrant approved by a United States Magistrate Judge on March 3 and executed on Tuesday led to the seizure of www.worldwiredlabs.com, which offered the NetWire remote access trojan (RAT), a sophisticated program capable of targeting and infecting every major computer operating system. “A RAT is a type of malware that allows for covert surveillance, allowing a ‘backdoor’ for administrative control and unfettered and unauthorized remote access to a victim’s computer, without the victim’s knowledge or permission,” according to court documents filed in Los Angeles. Supporting Article: FBI takes down cybercrime forum that touted data connected to breach affecting US lawmakers. Author: Sean Lyngaas. (2023, Mar 24). The FBI has arrested the alleged founder of a popular cybercriminal forum that touted data stolen in a hack affecting members of Congress and thousands of other people and taken the website down, the Justice Department said Friday. Article: Data Breach a

09:00

Hackaday Links: April 23, 2023 Hackaday

Hackaday Links Column Banner

Mark it on your calendars, folks this is the week that the term RUD has entered the public lexicon. Sure, most of our community already knows the acronym for rapid unscheduled disassembly, and realizes its tongue-in-cheek nature. But given that the term has been used by Elon Musk and others to describe the ignominious end of the recent Starship test flight, it seems like RUD will catch on in the popular press. But while everyones attention was focused on the spectacular results of manually activating Starships flight termination system to end its by-then uncontrolled flight at a mere 39 km, perhaps the more interesting results of the launch were being seen in and around the launch pad on Boca Chica. Thats where a couple of hundred tons of pulverized reinforced concrete rained down, turned to slag and dust by the 33 Raptor engines on the booster. A hapless Dodge Caravan seemed to catch the worst of the collateral damage, but the real wrath of those engines was focused on the Orbital Launch Mount, which now has a huge crater under it.

So how...

08:33

Health insurer Point32Health suffered a ransomware attack Security Affairs

Non-profit health insurer Point32Health suffered a ransomware attack and has taken systems offline in response to the incident.

Non-profit health insurer Point32Health has taken systems offline in response to a ransomware attack that took place on April 17. The insurer immediately launched an investigation into the incident with the help of third-party cybersecurity experts to determine the ext

The organization notified law enforcement and regulators, and it is currently working to recover the operations.

On April 17, Point32Health identified a cybersecurity ransomware incident that impacted systems we use to service members, accounts, brokers and providers. At this time, most systems impacted are on the Harvard Pilgrim Health Care side of our business. After detecting the unauthorized party, and out of an abundance of caution, we proactively took certain systems offline to contain the threat. reads the statement published by the insurer.

Most impacted systems are related to Harvard Pilgrim Health Care, which a few days ago announced on Facebook that it was experiencing technical issues with its website and phone lines.

The company did not provide details about the attack, such as the family of ransomware that compromised its systems and the number of impacted individuals.

Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 VOTE FOR YOUR WINNERS
Vote for me in the sections:

  • The Teacher Most Educational Blog
  • The Entertainer Most Entertaining Blog
  • The Tech Whizz Best Technical Blog
  • Best Social Media Account to Follow (@securityaffairs)

Please nominate Security Affairs as your favorite blog.

Nominate here: https://docs.google.com/forms/d/e/1FAIpQLSfaFMkrMlrLhOBsRPKdv56Y4HgC88Bcji4V7OCxCm_OmyPoLw/viewform

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

...

06:35

The 6.3 kernel is released LWN.net

Linus has released the 6.3 kernel as expected.

It's been a calm release this time around, and the last week was really no different. So here we are, right on schedule, with the 6.3 release out and ready for your enjoyment.

That doesn't mean that something nasty couldn't have been lurking all these weeks, of course, but let's just take things at face value and hope it all means that everything is fine, and it really was a nice controlled release cycle. It happens.

Significant changes in this release include the removal of a lot of obsolete Arm board files and drivers, ongoing improvements to the (still minimal) Rust language support, red-black trees for BPF programs, ID-mapped mounts for tmpfs filesystems, BIG TCP support for IPv4, support for non-executable memfds, the hwnoise jitter-measurement tool, and a lot more. See the LWN merge-window summaries (part 1, part 2) and the (in-progress) KernelNewbies 6.3 page for more information.

06:27

End of an Era: the Last Two Print Computer Magazines Just Pressed Their Last Issues SoylentNews

MacLife and Maximum PC April issues will be their last physical versions:

Magazines are so retro: If you are anything like me, you probably remember the days when you subscribed to multiple computing magazines. I still have fond memories of typing out the computer programs in the back pages of some publications; I even submitted a few of my own.

When high-speed internet came along, many computing publications began producing digital versions of their magazines online. Those with subscriptions still got their physical copies, but the online component was a nice perk for when readers could not just pick up a magazine and start reading, like at work.

Before long, most computing magazines had online versions and, at some point, started ditching paper. It was easier and cheaper to publish one copy that all subscribers could access online rather than printing hundreds of thousands of physical versions.

[...] The demise of print media in the computing industry was inevitable. By the 2000s, many prominent magazines had shut down their printing arms and switched to digital only. Byte stopped printing in 1998. Windows Magazine crashed in 2002, and the succinctly titled PC Magazine (now PCMag) published its last issue in 2009. Computer Gaming World went entirely out of business with its November 2006 issue.

[...] Print advertising also played a big part in the decline of computer publications. Once advertisers realized replicating ads on web pages was cheap and easy, they gradually pulled out of print computer magazines. Many physical magazine branches shut down for that reason alone. If the pub didn't have the clout of names like PC Magazine, Maximum PC, or PC World, it had no chance of competing against the internet for ad space. Even the almanac-like Computer Shopper plunged from nearly 360,000 readers in 1996 to about 55,000 in 2014.


Original Submission

Read more of this story at SoylentNews.

06:20

PX Stuff Random Thoughts

This is a lighter produced by Zippo during the 90s, with a drawing of Jimbo by Gary Panter.

Doesnt look like its ever been used, even though it also looks kinda beat up?

Futility grace of design. Indeed.

This blog post is part of the Punk Comix series.

05:30

Linux 6.3 Released With More Meteor Lake Enablement, Zen 4 Auto IBRS & Much More Phoronix

Linus Torvalds just released Linux 6.3 as the newest stable kernel version...

04:27

High Court: YouTube-Ripping is Illegal. UK National Newspaper: Totally Legal TorrentFreak

RipperGiven the popularity of YouTube and the huge number of websites and apps that allow people to rip music from the platform, the conflict surrounding stream-ripping shouldnt be underestimated.

Downloading a track takes about the same time as a shrug of the shoulders followed by an internal who cares? Multiply that by hundreds of millions of people shrugging several times a week, and the answer is the recording industry, big time.

Stream-Ripping and Public Perception

Many people in the UK, especially younger people, believe that listening to music on YouTube and ripping songs from YouTube are broadly the same thing. Both options are free; whats the problem? Strangely, the value of likes and views is comprehensively understood when the topic of conversation isnt centered on ripping music from YouTube.

The reasons for that disconnect aside, lots of people do ask questions. Is it legal to download music from YouTube? is always popular, along with its self-focused twin sister, Can I get caught downloading music from YouTube?

Thankfully, Google Lawyer (Google Doctors twin brother) is always around to help.

is it illegal youtube

Anyone who read past the first line of this top result, collect 10 points. Those who read the second, take another 20 because that claim seems fairly important and we may have to come back to it.

If you spotted that the advice is published on a site promoting YouTube-ripping tools, nice work. Unfortunately, the article is of no fundamental use, no matter what it says, since it speaks about U.S. copyright law.

With no copyright experts immediately available on TikTok or Facebook, we turned to the UKs third pillar of wisdom to get answers the big questions.

Free Legal Advice, Nationwide

Since lawyers are expensive, its not unusual to see some national newspapers put out a bit of legal advice here and there to make life that little bit easier. Thanks to the following text appearing in their URLs (youtube-to-mp3-converter-free-online and youtube-to-mp4) a pair of articles published in The Sun were easy to find.

Both were published this March; one asks Is converting YouTube to MP3 legal and safe? a...

03:18

LibrePlanet Talk by Joseph Turner (USHIN) on Emacs for P2P Deliberation Techrights

Video download link

Summary: The above LibrePlanet talk by Joseph Turner was uploaded by the FSF 5 days ago (slides here; PeerTube link); From the official page: The ushin project explores Org mode for peer-to-peer deliberation. Ushin offers the seven shapes (or kinds of meaning) deliberative structure for mutual understanding by distinguishing facts, feelings, needs, thoughts, topics, actions, and people. When communicating over the hyperdrive peer-to-peer network, you have full control over your data. With no central authority to censor misinformation, decision-making power is distributed. A subjective moderation system inspired by TrustNet makes it easy to find sources of information you can trust. Org mode is already an effective tool for organizing personal knowledge, and we want to use it to deliberate collective issues. Ushin combines these ideas into a fun and easy-to-use plain-text system for discussing important issues free of censorship, bots, and trolls through community curation.

Licence: CC BY SA 4.0

02:48

Chinese Are All Over Afghan Lithium cryptogon.com

Via: ZeroHedge: A Chinese company has offered the Taliban $10 billion and a proposal to build key strategic infrastructure connecting north-south Afghanistan in exchange for access to the countrys lithium reserves. Darbey said the Chinese interest in the region is not newin 2021, two Chinese companies were sent to Ghazni to conduct technical research []

02:37

Ex-FBI Agents Accuse Top CIA, FBI Officials of 9/11 Coverup; CIA Said to Use Saudis, Others for Illegal Domestic Spy Operations cryptogon.com

Im posting this with the following caveat: This should not be considered an endorsement of any aspect of the official story of how 9/11 was carried out. My take on this is that it might indicate some activities related to CIAs management of patsies ahead of the big day. Via: Florida Bulldog: It is nevertheless []

02:33

Experts spotted first-ever crypto mining campaign leveraging Kubernetes RBAC Security Affairs

Experts warn of a large-scale cryptocurrency mining campaign exploiting Kubernetes (K8s) Role-Based Access Control (RBAC).

Cloud security firm Aqua discovered a large-scale cryptocurrency mining campaign exploiting Kubernetes (K8s) Role-Based Access Control (RBAC) to create backdoors and run miners. The campaign was tracked as RBAC Buster, the experts reported that the attacks are actively targeting at least 60 clusters in the wild.

We have recently discovered the first-ever evidence that attackers are exploiting Kubernetes (K8s) Role-Based Access Control (RBAC) in the wild to create backdoors. reads the report published by Aqua. The attackers also deployed DaemonSets to take over and hijack resources of the K8s clusters they attack.

The attack chain starts with initial access via a misconfigured API server, then threat actors sent a few HTTP requests to list secrets and then made two API requests to gain information about the cluster by listing the entities in the kube-system namespace.

The attackers check for evidence of competing miner malware on the compromised server and achieve persistence by using RBAC to set up persistence.

Aqua analyzed the campaign after having set up K8s honeypots. The researchers explicitly exposed AWS access keys in various locations on the cluster they set up. The researchers noticed that threat actors used the access keys to try and gain further access to the targets cloud service provider account and obtain access to more reso...

02:05

California Meets 100% Of Water Requests For First Time Since 2006 cryptogon.com

Via: ZeroHedge: Due to a wet winter and record mountain snowpack, California will provide 100% of the water requested by cities and farms, marking the first time in nearly two decades. The office of California Governor Gavin Newsom released a statement Thursday that said, State water contractors to 100% of requested supplies for 29 public []

01:43

New Map of the Universe's Cosmic Growth Supports Einstein's Theory of Gravity SoylentNews

For millennia, humans have been fascinated by the mysteries of the cosmos:

Unlike ancient philosophers imagining the universe's origins, modern cosmologists use quantitative tools to gain insights into its evolution and structure. Modern cosmology dates back to the early 20th century, with the development of Albert Einstein's theory of general relativity.

Now, researchers from the Atacama Cosmology Telescope (ACT) collaboration have submitted a set of papers to The Astrophysical Journal featuring a groundbreaking new map of dark matter distributed across a quarter of the sky, extending deep into the cosmos, that confirms Einstein's theory of how massive structures grow and bend light over the 14-billion-year life span of the universe.

The new map uses light from the cosmic microwave background (CMB) essentially as a backlight to silhouette all the matter between us and the Big Bang.

"It's a bit like silhouetting, but instead of just having black in the silhouette, you have texture and lumps of dark matter, as if the light were streaming through a fabric curtain that had lots of knots and bumps in it," said Suzanne Staggs, director of ACT and Henry DeWolf Smyth Professor of Physics at Princeton University. "The famous blue and yellow CMB image [from 2003] is a snapshot of what the universe was like in a single epoch, about 13 billion years ago, and now this is giving us the information about all the epochs since."

[...] "We have mapped the invisible dark matter distribution across the sky, and it is just as our theories predict," said co-author Blake Sherwin, a 2013 Ph.D. alumnus of Princeton and a professor of cosmology at the University of Cambridge, where he leads a large group of ACT researchers. "This is stunning evidence that we understand the story of how structure in our universe formed over billions of years, from just after the Big Bang to today.'

Read more of this story at SoylentNews.

00:00

VHS Robot Swaps Tapes, as Seen in Hackers Hackaday

A home-made tape robot that stores VHS tapes

Tape robots are typically used in places that store vast amounts of data think film studios and government archives. If youve seen the 1995 cult movie Hackers, you might remember a scene where the main character hacks into a TV station and reprograms their tape bot to load a series he wanted to watch. Its this scene that inspired [Nathan] over at [Midwest Cyberpunk] to make his own tape robot that loads VHS tapes.

[Nathan] has thousands of tapes in his collection, but the robot is not built to manage all of them. Instead, its meant to help him run his VHS streaming channel, saving him from having to physically go to his VCR every time a tape needs swapping. For that, a ten-tape storage capacity is plenty.

...

00:00

Organoid Intelligence: Computing on the Brain IEEE Spectrum



In parallel to recent developments in machine learning like GPT-4, a group of scientists has recently proposed the use of neural tissue itself, carefully grown to recreate the structures of the animal brain, as a computational substrate. After all, if AI is inspired by neurological systems, what better medium to do computing than an actual neurological system? Gathering developments from the fields of computer science, electrical engineering, neurobiology, electrophysiology, and pharmacology, the authors propose a new research initiative they call organoid intelligence.

OI is a collective effort to promote the use of brain organoidstiny spherical masses of brain tissue grown from stem cellsfor computation, drug research and as a model to study at a small scale how a complete brain may function. In other words, organoids provide an opportunity to better understand the brain, and OI aims to use that knowledge to develop neurobiological computational systems that learn from less data and with less energy than silicon hardware.

The development of organoids has been made possible by two bioengineering breakthroughs: induced pluripotent stem cells and 3D cell culturing techniques.

Taking the existing field of neuromorphic computing, where the structure of neurons and the connections between them are studied and mimicked in silicon architectures, OI extends the engineering analogy with the opportunity to directly program desired behaviors into the firing activity of animal brain cell cultures.

Organoids typically measure 500 microns in diameterroughly the thickness of your fingernail. As organoids develop, the researchers say, organoids constituent neurons begin to interconnect in networks and patterns of activity that mimic the structures of different brain regions. The development of the organoids field has been made possible by two bioengineering breakthroughs: induced pluripotent stem cells (IPSCs) and 3D cell culturing techniques. IPSCs are stem cellsnotably capable of developing into any cell found in an animals bodythat are created by turning an adult cell back into the stem cell. These induced stem cells are then biochemically coaxed into the specific neurons and glia needed to construct a given organoid. More recently...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Sunday, 23 April

23:22

Epigenetic Test #5: Impact of NMN? Lifeboat News: The Blog

Join us on Patreon! https://www.patreon.com/MichaelLustgartenPhD

Discount Links:
NAD+ Quantification: https://www.jinfiniti.com/intracellular-nad-test/
Use Code: ConquerAging At Checkout.

Green Tea: https://www.ochaandco.com/?ref=conqueraging.

Oral Microbiome: https://www.bristlehealth.com/?ref=michaellustgarten.

Epigenetic Testing: Trudiagnostic.pxf.io/R55XDv.
Use Code: CONQUERAGING

At-Home Blood Testing: https://getquantify.io/mlustgarten.

22:51

Linux 6.3 Features Have A Lot For AMD & Intel, Steam Deck, ASUS Motherboards & More Phoronix

The Linux 6.3 stable kernel is likely to be released later today so here is a reminder about the most exciting aspects of this spring kernel release...

22:22

Libreboot 20230423 Allows A Few More Boards To Run On Fully Open-Source Firmware Phoronix

Libreboot as the downstream of Coreboot focused on ensuring 100% open-source system firmware support without any lurking binary blobs is out this Sunday with a new feature release...

21:23

AI breakthrough lets humans talk with bats and bees changing what we know Lifeboat News: The Blog

Scientists have begun using artificial intelligence to help them communicate with animals and theyre starting small with bats and bees.

AI allows humans to use breakthrough techniques to decode and observe how animals communicate so we can try to speak back to them.

Scientific American spoke with Professor Karen Bakker who is the author of the new book The Sounds of Life: How Digital Technology Is Bringing Us Closer to the Worlds of Animals and Plant.

21:23

Task-driven Autonomous Agent Utilizing GPT-4, Pinecone, and LangChain for Diverse Applications Lifeboat News: The Blog

NOTE: This article was written by GPT-4 based on the code base. For more info, read this.

Abstract:

In this research, we propose a novel task-driven autonomous agent that leverages OpenAIs GPT-4 language model, Pinecone vector search, and the LangChain framework to perform a wide range of tasks across diverse domains. Our system is capable of completing tasks, generating new tasks based on completed results, and prioritizing tasks in real-time. We discuss potential future improvements, including the integration of a security/safety agent, expanding functionality, generating interim milestones, and incorporating real-time priority updates. The significance of this research lies in demonstrating the potential of AI-powered language models to autonomously perform tasks within various constraints and contexts.

21:23

ChatGPT wont take over from humans for now, says Infosys founder Lifeboat News: The Blog

Murthy said he will use ChatGPT as an instrument, an assistant in producing better quality of work and output but not as a human replacement.

At the end of the day, I am a great believer in the theory that the human mind is the most powerful imagination, machine. There is nothing that can beat the human mind.

Infosys is the worlds third most valuable IT services brand with a brand value of $13 billion, trailing behind Accenture and Tata Consultancy Services, according to brand valuation firm Brand Finances Global 500 2023 report.

21:13

Comment les activits spatiales peuvent-elles voluer vers plus de durabilit ? Lifeboat News: The Blog

Remark: This article is from The Conversation France written by Victor DOS SANTOS PAULINO & Nonthapat PULSIRI (V&N) Experts from Toulouse Business School and The SIRIUS Chair (France)

Lorsque nous parlons despace, nous pensons aux toiles que nous voyons la nuit ou de bons films de science-fiction. Or, lespace comprend galement tous les satellites et engins qui sont lancs depuis la Terre. Dans certains engins spatiaux, il y a des astronautes, comme lAmricaine Christina Koch ou le Franais Thomas Pesquet, qui voyagent pendant plusieurs jours ou mois pour de nombreuses missions.

Pendant ce temps, plus de 8 000 satellites non habits oprent sur les orbites terrestres pour amliorer la vie quotidienne. Par exemple, les satellites de communication contribuent amliorer laccs Internet dans les zones blanches, les satellites dobservation sont essentiels pour les prvisions mtorologiques et les satellites de navigation (GPS) sont indispensables pour les besoins de transport actuels et futurs tels que les vhicules autonomes.

Les progrs dans le secteur spatial offrent aujourdhui de nouvelles opportunits dans la mise en orbite de constellations de milliers de satellites (par exemple, la flotte Starlink lance par SpaceX, la socit de lhomme daffaires amricain Elon Musk) ou encore dans lexploitation minire spatiale et le tourisme spatial. Certains pays (dont la France et les tats-Unis) ont par ailleurs annonc que soutenir leur cosystme spatial constituait une priorit pour dynamiser lconomie.

Des socits comme SpaceX ou encore Blue Origin, lance par le milliardaire amricain Jeff Bezos, peuvent en effet stimuler les modles daffaires dautres entreprises dans des secteurs non spatiaux comme ceux de la logistique et de lnergie. Ces nouveaux entrants contribuent ainsi largir limpact des activits spatiales dautres secteurs.

Plus de 3 300 satellites non oprationnels en orbite

Dans le mme temps, la socit civile apparat cependant de plus en plus proccupe par les problmes croissants de dveloppement durable dans les activits spatiales.

Le premier problme...

21:00

Generating Entangled Qubits and Qudits with Fully On-Chip Photonic Quantum Source Hackaday

As the world of computing and communication draws ever closer to a quantum future, researchers are faced with many of the similar challenges encountered with classical computing and the associated semiconductor hurdles. For the use of entangled photon pairs, for example, it was already possible to perform the entanglement using miniaturized photonic structures, but these still required a bulky external laser source. In a recently demonstrated first, a team of researchers have created a fully on-chip integrated laser source with photonic circuitry that can perform all of these tasks without e...

20:57

AI Weapons Among Non-State Actors May be Impossible to Stop SoylentNews

Governments also have no theory on how nefarious groups might behave using the tech:

The proliferation of AI in weapon systems among non-state actors such as terrorist groups or mercenaries would be virtually impossible to stop, according to a hearing before UK Parliament.

The House of Lords' AI in Weapon Systems Committee yesterday heard how the software nature of AI models that may be used in a military context made them difficult to contain and keep out of nefarious hands.

When we talk about non-state actors that conjures images of violent extremist organizations, but it should include large multinational corporations, which are very much at the forefront of developing this technology

Speaking to the committee, James Black, assistant director of defense and security research group RAND Europe, said: "A lot of stuff is very much going to be difficult to control from a non-proliferation perspective, due to its inherent software-based nature. A lot of our export controls and non-proliferation regimes that exist are very much focused on old-school traditional hardware: it's missiles, it's engines, it's nuclear materials."

An added uncertainty was that there was no established "war game" theory of how hostile non-state actors might behave using AI-based weapons.

Read more of this story at SoylentNews.

20:52

Improved Linux Power Savings For Intel Haswell/Broadwell Laptops In 2023 Phoronix

It's been just shy of ten years since Intel launched their Haswell processors that were very successful at the time and was followed by Broadwell. While Intel's open-source Linux driver engineers are primarily concentrated on recent and future Intel hardware platforms, occasionally there is an improvement worth mentioning for mature platforms like Haswell and Broadwell. A new patch series this week will help with some minor graphics power-savings for those still running a nearly decade old Intel Linux laptop...

20:31

Flashrom Splits Into Two For This Firmware/ROM Flashing Utility Phoronix

The Flashrom project that serves as an open-source firmware/ROM flashing utility not only for system BIOS/UEFI on motherboards but also capable of flashing firmware for various network / GPU / storage controller cards and other programmable devices has decided to effectively split into two...

20:20

Google Continues Working On More Linux HDCP Bits Phoronix

Google engineers continue working on enhancing the Linux infrastructure around supporting High-bandwidth Digital Content Protection (HDCP) for Chrome OS...

19:22

Elon Musk spoke about crystal balls, bank lending, self-driving cars and lithium refineries this week. Here are his 10 best quotes from Teslas Q1 earnings call Lifeboat News: The Blog

Musk warned of stormy weather ahead, flagged Teslas key challenges, and touted its Dojo supercomputer and autonomous driving tech as revolutionary.

18:00

Week in review: 5 free online cybersecurity resources for SMBs, AI tools might fuel BEC attacks Help Net Security

Heres an overview of some of last weeks most interesting news, articles, interviews and videos: Balancing cybersecurity with business priorities: Advice for Boards In this Help Net Security interview, Alicja Cade, Director, Financial Services, Office of the CISO, Google Cloud, offers insights on how asking the right questions can help improve cyber performance and readiness, advance responsible AI practices, and balance the need for cybersecurity with other business priorities. Wargaming an effective data breach playbook More

The post Week in review: 5 free online cybersecurity resources for SMBs, AI tools might fuel BEC attacks appeared first on Help Net Security.

18:00

The Shuttle Engine Needed 3D Printing, But Hackaday

If we asked you to design a circuit to blink a flashing turn signal, you would probably reach for a cheap micro or a 555. But old cars used bimetallic strips in a thermomechanical design. Why? Because, initially, 555s and microcontrollers werent available. [Breaking Taps] has the story of NASA engineers who needed some special cooling chambers in a rocket design for the Space Shuttle. Today youd 3D print them, but in the 70s, that wasnt an option. So they used wax. You can see a video about the process, including a build of a model rocket engine, in the video below.

The issue is the creation of tiny cooling channels in the combustion chamber. You can use additional thin pipes brazed onto the engine. However, there are several disadvantages to doing this way, but early rocket engines did it anyway. Having the cooling path integrated into the system would be ideal, but without 3D printing, it seems difficult to do. But not impossible.

The technique uses wax and machined slots that will eventually become the tubes required. Then you electroplate material on top of the wax to form the outer shell of the tube. In fact, NASA used two electroplating steps: a thin copper layer to close the tube and a thicker nickel layer to provide strength. Copper survives contact with the cryogenic coolant better than nickel does, but nickel is much stronger, so the combination makes sense. Because electroplating n...

17:22

Researchers in Japan develop a new ultra-high-density sulfonic acid polymer electrolyte membrane for fuel cells Lifeboat News: The Blog

In a project commissioned by the New Energy and Industrial Technology Development Organization (NEDO), researchers at Nagoya University in Japan have developed poly(styrenesulfonic acid)-based PEMs with a high density of sulfonic acid groups.

One of the key components of environmentally friendly polymer electrolyte fuel cells is a (PEM). It generates through a reaction between hydrogen and oxygen gases. Examples of practical fuel cells include fuel cell vehicles (FCVs) and combined heat and power (CHP) systems.

The best-known PEM is a membrane based on a perfluorosulfonic acid polymer, such as Nafion, which was developed by DuPont in the 1960s. It has a good proton conductivity of 0.1 S/cm at 7090 C under humidified conditions. Under these conditions, protons can be released from sulfonic acid groups.

16:11

Proton Expands its Private Tech Ecosystem With a Password Manager SoylentNews

The encrypted email service has more features than ever and surpassed 100 million users worldwide:

Encrypted email company Proton has announced one of the biggest new additions to its growing suite of privacy-focused apps: Proton Pass, an end-to-end encrypted password manager.

[...] To get a better perspective on Proton's recent changes and its ambitions for the future, Gizmodo sat down with Proton's CEO, Andy Yen, to discuss what the company's been up to and where it's headed in the future. Proton Pass is the most consequential new feature that Proton has released in quite some time. Currently available only as a limited beta, Pass can only be accessed by Lifetime and Visionary Proton users, and even then on an invite-only basis. That said, the company says that a general launch of the app will happen "later this year," meaning it should soon be available to all users.

"A password manager has been one of the most common requests from the Proton community ever since we first launched Proton Mail," Yen wrote in a company blog post. "Proton Pass is not just another password manager. It's perhaps the first one built by a dedicated encryption and privacy company, leading to tangible differences in security."

[...] Speaking with Gizmodo, Proton's Yen said that the growth of consumer interest in privacy services over the past several years has generated more competition in his industry but it has also helped drive business to Proton.

"Back when we started, end-to-end encryption, abbreviated E2EE, was something that spies or crazy people were usingit was barely something most people had heard about," Yen tells me. That changed in the intervening yearsas an ever-compounding slew of privacy scandals drew attention to the dangers of surveillance capitalism and government spying. Today, the average consumer is much more well versed in services like E2EE, said Yen.

Read more of this story at SoylentNews.

15:22

CEO is so worried about remote workers using A.I. and doing multiple jobs he threatens to increase quotas Lifeboat News: The Blog

Clearlink CEO James Clarke has drawn attention for praising an employee who gave up a family dog to return to the office, but his A.Iare also timely.

15:00

AI-Powered Speaker is a Chatbot you can Actually Chat with Hackaday

A small speaker with an LCD showing chatbot responses

AI-powered chatbots are pretty cool, but most still require you to type your question on a keyboard and read an answer from a screen. It doesnt have to be like that, of course: with a few standard tools, you can turn a chatbot into a machine that literally chats, as [Hoani Bryson] did. He decided to make a standalone voice-operated ChatGPT client that you can actually sit next to and have a conversation with.

The base of the project is a USB speaker, to which [Hoani] added a Raspberry Pi, a Teensy, a two-line LCD and a big red button. When you press the button, the Pi listens to your speech and converts it to text using the OpenAI voice transcription feature. It then sends the resulting text to ChatGPT through its API and waits for its response, which it turns into sound again through the eSpeak speech synthesizer. The LCD, driven by the Teensy, shows the current status of the machine and also provides live subtitles while the machine is talking.

To spice up the AI boxs appearance, [Hoani] also added an LED ring which shows a spectrogram of the audio being generated. This small addition really makes the thing come...

13:50

Terravision - 2,075,625 breached accounts Have I Been Pwned latest breaches

In February 2023, the European airport transfers service Terravision suffered a data breach. The breach exposed over 2M records of customer data including names, phone numbers, email addresses, salted password hashes and in some cases, date of birth and country of origin. Terravision did not respond to multiple attempts by individuals period over a period of months to report the incident.

13:23

Simulations with a machine learning model predict a new phase of solid hydrogen Lifeboat News: The Blog

Hydrogen, the most abundant element in the universe, is found everywhere from the dust filling most of outer space to the cores of stars to many substances here on Earth. This would be reason enough to study hydrogen, but its individual atoms are also the simplest of any element with just one proton and one electron. For David Ceperley, a professor of physics at the University of Illinois Urbana-Champaign, this makes hydrogen the natural starting point for formulating and testing theories of matter.

Ceperley, also a member of the Illinois Quantum Information Science and Technology Center, uses computer simulations to study how interact and combine to form different phases of matter like solids, liquids, and gases. However, a true understanding of these phenomena requires , and quantum mechanical simulations are costly. To simplify the task, Ceperley and his collaborators developed a machine learning technique that allows quantum mechanical simulations to be performed with an unprecedented number of atoms. They reported in Physical Review Letters that their method found a new kind of high-pressure solid hydrogen that past theory and experiments missed.

Machine learning turned out to teach us a great deal, Ceperley said. We had been seeing signs of new behavior in our previous simulations, but we didnt trust them because we could only accommodate small numbers of atoms. With our machine learning model, we could take full advantage of the most accurate methods and see whats really going on.

12:00

A Delicious Advancement in Battery Tech Hackaday

A series of food items along the bottom of the frame including an unidentified grey block, an almond, a food supplement capsule, a square of seaweed, a square of beeswax, and a crumpled up piece of gold foil. At the top of the image is a fully assembled battery with electrodes sticking out the ends of a block of beeswax and a half finished battery with the nori separator visible.

Electronics have been sent to some pretty extreme environments, but inside a living host is a particularly tricky set of conditions, especially if you dont want to damage the organism ingesting the equipment. One step in that direction could be an edible battery cell. (via Electrek)

Developed by scientists at the Istituto Italiano di Tecnologia, this new cell is made from food additives and ingredients to skirt any nasty side effects one might experience from ingesting a less palatable battery chemistry like NiCd. A riboflavin...

11:41

Sebastian Marchano on GNU Taler Techrights

Video download link

Summary: The above LibrePlanet talk was uploaded by the FSF 4 days ago (PeerTube); From the official page: If we look to email as an example, free software made a revolution that is still strong today. Thanks to the protocol definition, the software and the communities around it are able to setup, run and help each other. GNU Taler is a protocol and software that promotes the same revolution in payment methods, where people can participate freely to generate an essential infrastructure for todays society. In this talk we are going to introduce how it works, which are the main components, we will navigate a demonstration and answer why it is different in comparison with other digital payment systems. We will end the session with a roadmap and a guide to join in and contribute.

Licence: CC BY SA 4.0

11:36

In Taiwan, Windows Shedding Off Share, GNU/Linux Gaining Techrights

Since COVID-19 broke out in China:

GNU/Linux 1% in 2019, about 4% by now
National security will improve if or when Windows is eliminated altogether. Months ago GNU/Linux rose above 4%.

Summary: The rate at which GNU/Linux is adopted in Taiwan is noteworthy; if those statistics are reliable enough, then from around 1% of desktops/laptops in 2019 GNU/Linux rose to about 4% by now

11:24

Detailed Notes on Working With OpenBSD on a ThinkPad X270 SoylentNews

Theologian Dr Corey Stephan has documented his exploration of installing OpenBSD on an old ThinkPad X270. He has posted his rather thorough personal notes which cover the intial setup, such as power management, performance tweaks, Wi-Fi configuration, audio and video, tracking -current, and getting software from the ports tree. He also goes into a bit of his favored tools and workflow.

It is hard not to cherish the partnership of a slightly older ThinkPad and OpenBSD. The ThinkPad X270 and OpenBSD are both minimalist, robust, and customizable. Specifically, the ThinkPad is minimalist with regard to features, robust with regard to physical durability, and customizable with regard to hardware repairability and replaceability. OpenBSD is minimalist with regard to code, robust with regard to security, and customizable with regard to every aspect of the system. Further, since a healthy number of OpenBSD's developers long have used ThinkPads (to the point that I have read some jokes come out of members of their ranks like 'I may use any kind of laptop that I may like, as long as it is a ThinkPad'), the operating system works brilliantly on the laptop both with their stock settings.

Overall, installing and configuring OpenBSD -current on the ThinkPad X270 was the simplest minimalist installation of any operating system on any hardware that I ever have done, even simpler than Debian GNU/Linux or my beloved FreeBSD (and much simpler than a proprietary, dysfunctional operating system Windows or MacOS). Was the total setup process easier than, say, that of a GNU/Linux distribution that uses the Calamares installer and comes preconfigured with a huge array of GNU/Linux drivers? Well, no, it was not, but that is not the point. OpenBSD is secure, nimble, and customizable in an elegantly simple way that interoperates smoothly with this small ThinkPad for my mobile academic research and writing. Even in this topsy-turvy era in which other popular desktop operating systems are have many design choices for form over function, OpenBSD comes as a serious, professional product that is ready to let me focus on my work.

Previously:
(2021) Recent and Not So Recent Changes in OpenBSD That Make Life Better
(2020) Using OpenBSD Routing Tables to Segment the Home Network for Privacy
(2018) OpenBSD Chief De Raadt Says No Easy Fix For New Intel CPU Bug
and many others.


...

10:26

Alchemy of Innovation Social Network by Laurel Papworth

My thoughts on Emergent Technology, Ancient Religion, Artificial Intelligence, Philosophy and .. stuff.

We are entering into a new epoch for business, for society, for humanity. As AI/ChatGPT swiftly reconfigures our world, how do navigate such vast and alien landscapes while trying to keep jobs, companies, families, education goals? Finding what is uniquely human in our story will help. Id like to think my rambling words might trigger a thought process: how can you be unique & irreplaceable? What is your dharma, your path? Its a big ask: lets take business news also emergent tech, metaverse, AI. Plus philosophy, spirituality & ancient religion. Magic. Then mix. xx Laurel Papworth, (trainee) Alchemist

iTunes Alchemy of Innovation if you prefer Apple podcasts.

Episodes of Alchemy of Innovation

SPOTIFY choose your podcast player: clicking on this will take you to all the RSS feeds for your favourite podcast player.

Alchemy of Innovation podcast

10:00

Python Package Index Malware Scanning It Will Never Work in Theory

With attacks via open source package repositories becoming more common, it is vital for the community to understand what counter-measures might actually work. "Scan everything" doesn't work: as this intensely practical study shows, even a one-in-ten-thousand false positive rate is too high for repository administrators, but existing tools have false positive rates many times higher than this. What seems more promising is a collaborative approach, and the authors practice what they preach by making their tools and analysis available online.

Duc-Ly Vu, Zachary Newman, and John Speed Meyers. Bad snakes: understanding and improving python package index malware scanning. In Proc. International Conference on Software Engineering (ICSE), 2023, https://www.researchgate.net/publication/363888596_Bad_Snakes_Understanding_and_Improving_Python_Package_Index_Malware_Scanning.

While attackers often distribute malware to victims via open-source, community-driven package repositories, these repositories do not currently run automated malware detection systems. In this work, we explore the security goals of the repository administrators and the requirements for deployments of such malware scanners via a case study of the Python ecosystem and PyPI repository, which includes interviews with administrators and maintainers. Further, we evaluate existing malware detection techniques for deployment in this setting by creating a benchmark dataset and comparing several existing tools, including the malware checks implemented in PyPI, Bandit4Mal, and OSSGadgets OSS Detect Backdoor.

We find that repository administrators have exacting technical demands for such malware detection tools. Specifically, they consider a false positive rate of even 0.01% to be unacceptably high, given the large number of package releases that might trigger false alerts. Measured tools have false positive rates between 15% and 97%; increasing thresholds for detection rules to reduce this rate renders the true positive rate useless. In some cases, these checks emitted alerts more often for benign packages than malicious ones. However, we also find a successful socio-technical malware detection system: external security researchers also perform repository malware scans and report the results to repository administrators. These parties face different incentives and constraints on their time and tooling. We conclude with recommendations for improving detection capabilities and strengthening the collaboration between security researchers and software repository administrators.

09:48

Mesa 23.0.3 Released With Another Batch Of Fixes Phoronix

Mesa 23.0.3 was released on Friday as the newest stable release for this collection of open-source user-space GPU driver components...

09:00

Tiny Three-Tube Receiver Completes Spy Radio Suite Hackaday

In our surface-mount age, its easy to be jaded about miniaturization. We pretty much expect every circuit to be dimensionally optimized, something thats easy to do when SMDs that rival grains of sand are available. But dial the calendar back half a century or so and miniaturization was a much more challenging proposition.

Challenging, perhaps, but by no means unachievable, as [Helge Fyske (LA6NCA)] demonstrates with this ultra-compact regenerative vacuum tube receiver. Its a companion to his recent spy transmitter, a two-tube radio built in or on, really an Altoids tin. The transmitter was actually a pretty simple circuit, just a crystal-controlled oscillator and an RF amplifier really, but still managed about 1.5 Watts output on the 80-meter ham band.

The receiver circuit ended up being much more complicated, as receivers do, and therefore harder to cram into the allotted space. [Helge]s used a three-tube regenerative design, with one tube each devoted to the RF amp, detector/mixer, and audio amplifier stages. As in the transmitter, the receiver tubes are mounted on the outside of the box, with the inside crammed full of comp...

07:26

Abandoned Eval PHP WordPress plugin abused to backdoor websites Security Affairs

Threat actors were observed installing the abandoned Eval PHP plugin on compromised WordPress sites for backdoor deployment.

Researchers from Sucuri warned that threat actors are installing the abandoned Eval PHP plugin on compromised WordPress sites for backdoor deployment.

The Eval PHP plugin allows PHP code to be inserted into the pages and posts of WordPress sites and then executed every time the posts are opened.

The malicious code uses the file_put_contents function to create a PHP script into the docroot of the website with the specified remote code execution backdoor. The backdoor will be injected into the file structure when threat actors visit one of the infected posts or pages.

The experts pointed out that the plugin hasnt been updated in over a decade and the number of real active installs is very low. Since the beginning of April threat actors are installing the Eval PHP plugin on compromised WordPress sites and using it to inject malicious PHP code into web pages.

During the last ten years, since the end of March, 2023, the plugin rarely had 1 download a day. Around March 29, the researchers observed daily downloads spike to 7,000. Then, every single day the plugin totaled 3k-5k downloads, while the total number of downloads reached 100,000.

The Eval PHP plugin continues to be available through the WordPress repository, Sucuri explained.

The cause of the surge of downloads is the hacking campaign conducted by the threat actors.

Sucuri reported that all the requests originate from three IP addresses, 91[.]193[.]43[.]151, 79[.]137[.]206[.]177, 212[.]113[.]119[.]6.

The experts explained that the PHP backdoor can hide requests as cookies to avoid detection.

Since the backdoor uses the $_...

06:53

Distribution Release: blendOS 2023.04.22 DistroWatch.com: News

blendOS is an Arch Linux-based, rolling release distribution which automates installing software from supported distributions (Arch, Fedora, and Ubuntu) into containers. The project's latest snapshot replaces distrobox containers with podman. It is now also easier to install software from Arch straight onto the host distribution. "In addition to....

06:35

Movie Company Exposes 150 Alleged BitTorrent Pirates Using DMCA Shortcut TorrentFreak

pirate-flagTracking BitTorrent pirates isnt all that hard since IP addresses are broadcasted publicly. With help from Internet providers, these addresses can then be linked to an account holder.

ISPs dont hand over this data voluntarily; they typically require a subpoena or court order to take action.

In the United States, these subpoenas are typically obtained by filing a copyright complaint in federal court against a John Doe whos known only by an IP address. Most of these cases are filed against a single person, which makes it a relatively expensive process.

The filing fee for these cases is over $400 and there are no guarantees the money will be recouped. Some rightsholders believe that this cost of admission is money well spent, but others are prepared to test alternative routes.

Capstone Studios Targets 150 IP-addresses

Movie production company Capstone Studios is one of those rightsholders. The company decided to take action when it noticed that its survival thriller film Fall, which it co-produced with BuzzFeed, was widely pirated through various torrent sites.

To stop these infringements, Capstone sent takedown notices to Internet providers whose customers IP-addresses showed up in the public swarms. These warning notices, sent through the Cyprus-based company PML Process Management, were meant to be forwarded to the linked subscriber accounts.

We respectfully ask that you stop infringing and redistributing Capstone Studios Corp. copyright protected content, and take the proper steps to secure your Internet so that others do not infringe and redistribute our content as well, they read.

fall notice

The enforcement effort didnt end there. A few days ago, Capstone requested a so-called DMCA subpoena at a federal court in Colorado. The request targets 150 IP-addresses that are linked to allegedly infringing Centurylink accounts.

Clerk Signs Off

These types of subpoenas dont require a court hearing and are typically signed off by a clerk. Thats also the case here. Within a matter of days, Capstones request was granted, which means that Internet provider Centurylink, also known as...

06:34

Your Fork Could Someday be Made of Sugar, Wood Powders and Degrade on-Demand SoylentNews

Researchers have created a sturdy, lightweight material made from sugar and wood-derived powders that disintegrates on-demand:

Sturdy, degradable materials made from plants and other non-petroleum sources have come a long way in recent years. For example, cornstarch-based packing peanuts disappear simply by dousing them in water, and some utensils are based on polymers synthesized from plant sugars. But those packing peanuts can't be used to protect anything wet, and plant-derived polymers still take a long time to break down. One potential alternative is a new type of rigid material designed from isomalt, which is a sugar alcohol rather than a polymer. With isomalt, bakers can create breathtaking, but brittle, structures for desserts, and then dissolve them away quickly in water. So, Scott Phillips and colleagues wanted to boost the sturdiness of isomalt with natural additives to create a robust material that degrades on-demand.

The researchers heated isomalt to a liquid-like state and mixed in either cellulose, cellulose and sawdust, or wood flour to produce three different materials. Then, using commercial plastics manufacturing equipment, the materials were extruded into small pellets and molded into various objects, including balls, a dodecahedron, a chess piece and flower-shaped saucers. All of the tested additives doubled the strength of isomalt, creating materials that were harder than plastics, including poly(ethylene terephthalate) (known as PET) and poly(vinyl chloride) (known as PVC), but were still lightweight. In experiments, samples dissolved in water within minutes. And saucers made of the material, and coated with a food grade shellac and cellulose acetate, withstood being immersed in water for up to seven days. However, once the saucers were broken and the coating cracked, they rapidly disintegrated in water. The team also repeatedly crushed, dissolved and recycled both coated and uncoated objects into new ones that were still as strong as the original items.

The researchers say that the material could be used for food-service items and temporary dcor, and then crushed and sprayed with water to fall apart. But even if such items were simply tossed into the trash or somehow got into the environment, the slightest crack in the coating would start their collapse into sugars and the plant-based additives, which the researchers say might be good for soil.

There is also a video


Original Submission

Re...

06:33

Haptic System Creates Finger-Touch Sensations Hardware-Free IEEE Spectrum



One of the trippiest virtual-reality experiences that Ive ever had was being able to touch an object that didnt exist. Getting immersed in a virtual world through a headset that provides video and audio is one thing, but adding in touch is somehow transformative; physical interaction brings you into that virtual world in a much more direct way. But as with everything related to VR or AR, its all extremely hardware intensive. And especially in the case of augmented reality, all of that hardware can get in the way.

This hardware layer is a problem for virtual touch, because it seems like theres just no way around it. Video and audio have ways of making themselves transparent, like with glasses or contact lenses or bone conduction, which let you experience the real world with an additional layer of reality added on topaugmented reality. With touch, though, there arent good options for transparency, because there has to be some physical thing touching, say, your fingers for you to actually feel sensations. Typically, this is some sort of glove, and whether or not the glove is transmitting a haptic signal, youre still wearing it all the time, which is not transparent at all.

Researchers from the University of Chicago have figured out a clever way around this problem. In a paper that will be presented at the 2023 Conference on Human Factors in Computing Systems, or CHI 2023, (where it will also be honored with a best paper award), they demonstrate a wearable system that can generate tactile sensations across the bottom of your fingers and palm without any hardware getting in the way, by hacking into the nerves on the back of your hand instead.


This method depends on whats called referred sensation, where stimulation of your body in one place gets felt in another placeits like when you accidentally bash your elbow against something but can feel tingling up through your fingers, because the signal has traveled along your nerves up through your hand. In some places, including in the fingers, referred sensation can be targeted with a reasonable amount of precision. With a signal electrode on the top of a finger and a ground electrode closer to the wrist, its possible...

06:00

Op Amp Contest: Clever Continuity Tester Tells you Where the Problem is Hackaday

A schematic for a continuity tester that modulates its pitch based on the resistance measured

A continuity tester, as found on most multimeters today, is a great tool for finding broken connections and short circuits. But once youve found a short, its up to you to figure out which part of the circuit its in a tedious job on a large PCB with hundreds of components. [John Guy] aims to ease this task with a continuity tester that modulates the beepers tone according to the resistance measured in the circuit. Tracking down a short circuit is then simply a matter of probing multiple points along a track and observing whether the pitch goes up or down.

...

05:01

Erin Rose Glass: LibrePlanet 2023 Keynote Talk on Education and the Future of Software Freedom Techrights

Video download link

Summary: The above LibrePlanet keynote talk was uploaded by the FSF 4.5 days ago (slides here; PeerTube link); From the official page: As the political stakes of digital technology become increasingly apparent, its clear that an ethical approach to software use and development is more important than ever. While a number of organizations and advocates are doing important work to advance ethical forms of software practice, we continue to miss one of the key sites where software habits and expectations are reinforced and normalized at scale, that is, institutions of education. In this talk, I will discuss the inadvertent role higher education plays in teaching students to passively accept broad forms of digital surveillance and control through its use of popular educational technologies like learning management systems, word processing software, and test taking tools, and how this submission leads to the broader mass helplessness in the face of current technological struggles. Starting with my chance encounter with free software as a humanities graduate student, I will highlight a range of promising contemporary examples of experiments in higher education that push against exploitative trends in educational technology and expose students to the differentiating value and possibility of software freedom. As we chart the course of the future of software, these examples shine light on the importance of educational institutions in the struggle for software freedom and the urgent need for broader community support to help sustain and encourage these precarious endeavors.

Licence...

04:50

Newsom Sending National Guard to San Francisco cryptogon.com

The article states: Additionally, the Governor instructed the California National Guard to identify specialist personnel and resources to analyze drug trafficking operations, with a focus on dismantling fentanyl trafficking rings. The California National Guard is going to analyze drug trafficking operations??? Via: Daily Mail: The Governor of California, Gavin Newsom, has ordered state police and []

04:28

CISA adds MinIO, PaperCut, and Chrome bugs to its Known Exploited Vulnerabilities catalog Security Affairs

US Cybersecurity and Infrastructure Security Agency (CISA) added MinIO, PaperCut, and Chrome vulnerabilities to its Known Exploited Vulnerabilities catalog.

U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the following three new issues to its Known Exploited Vulnerabilities Catalog:

  • CVE-2023-28432 (CVSS score 7.5) MinIO Information Disclosure Vulnerability. The issue resides in a cluster deployment where MinIO returns all environment variables, which allows for information disclosure.
  • CVE-2023-27350 (CVSS score 9.8) PaperCut MF/NG Improper Access Control Vulnerability. PaperCut MF/NG contains an improper access control vulnerability within the SetupCompleted class that allows authentication bypass and code execution in the context of system.
  • CVE-2023-2136 Google Chrome Skia Integer Overflow Vulnerability. The vulnerability is an Integer overflow in the Skia graphics library, the issue was reported by Clment Lecigne of Googles Threat Analysis Group on April 12, 2023. A remote attacker who had compromised the renderer process can exploit the integer overflow in the Skia library to potentially perform a sandbox escape via a crafted HTML page.

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Experts recommend also private organizations review the Catalog and address the vulnerabilities in their infrastructure.

CISA orders federal agencies to fix this flaw by May 12, 2023.

Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 VOTE FOR YOUR WINNERS
Vote for me in the sections:

  • The Teacher Most Educational Blog
  • The Entertainer Most En...

02:13

Redesigned Flathub Site Launches For Flatpak Apps Phoronix

this weekend's Linux App Summit. Flathub remains the centralized website for exploring and finding new Flatpak sandboxed Linux apps...

01:49

Archaeologists Unearth a Fanciful Ancient Winery Near Rome SoylentNews

The winery's layout and finishes suggest the wine-making was merely a spectacle for ancient Roman elites:

Archaeologists have discovered the remains of an 1,800-year-old winery at the Villa of the Quintilii outside of Rome. By the team's measure, the winery was designed as much for the spectacle of wine-making as the practice itself.

Decorated rooms around the winery appear to have hosted guests who would observe the wine-making process, the researchers found, and the finishes (including marble floors) seem installed for appearances over practicality. The team's research is published in Antiquity.

"Agricultural labor was romanticized by the ruling classes of many ancient cultures, especially as it was often the source of both their wealth and status," said Emlyn Dodd, a researcher at the Institute of Classical Studies at the University of London, in an Antiquity release.

Journal Reference:
Emlyn Dodd, Giuliana Galli and Riccardo Frontoni, The spectacle of production: a Roman imperial winery at the Villa of the Quintilii, Rome [open], Antiquity, 97, 2023. DOI: https://doi.org/10.15184/aqy.2023.18


Original Submission

Read more of this story at SoylentNews.

01:00

At least 2 critical infrastructure orgs breached by North Korea-linked hackers behind 3CX attack Security Affairs

North Korea-linked APT group behind the 3CX supply chain attack also broke into two critical infrastructure organizations in the energy sector.

Symantec researchers reported that the campaign conducted by North Korea-linked threat actors that included the 3CX supply chain attack also hit two critical infrastructure organizations in the energy sector.

The X_Trader software supply chain attack affected more organizations than 3CX. Initial investigation by Symantecs Threat Hunter Team has, to date, found that among the victims are two critical infrastructure organizations in the energy sector, one in the U.S. and the other in Europe. reports Symantec. It appears likely that the X_Trader supply chain attack is financially motivated, since Trading Technologies, the developer of X_Trader, facilitates futures trading, including energy futures.

The researchers also state that two other organizations involved in financial trading were also breached.

North Korea APT groups are known to carry out both cyber espionage campaigns and financially motivated attacks, for this reason, the compromise of critical infrastructure is worrisome.

The attack chain analyzed by Symantec commences with the Trojanized installer named X_TRADER_r7.17.90p608.exe. The executable file is digitally signed by Trading Technologies International, Inc. and contains a malicious executable named Setup.exe.

The malware employed in the attack achieves persistence by invoking a CLSID_TaskScheduler COM object, attempting to create a scheduled task to run periodically the file TpmVscMgrSvr.exe.

The X_Trader application was retired in 2020, but users can still download it from the companys website.

Upon installing the legitimate X_Trader executable, it side-loads the two malicious DLLs dropped by the installer.

The discovery that 3CX was breached by another, earlier supply chain attack made it highly likely that further organizations would be impacted by this campaign, which now transpires to be far more wide-ranging than originally believed. concludes the report. The attackers behind these breaches clearly have a successful template for software supply chain attacks and further, similar attacks cannot be ruled out.

Symantec provided indicators of compromise for this campaign.

Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 VOTE FOR YOUR WINNERS
Vote for me in the sections:

  • The Teacher Most Educ...

01:00

Biofriendly Transient Devices Emerge IEEE Spectrum




Researchers at Northwestern University, Evanston, Ill., and the University of Sussex, Brighton, England, have created prototypes of new environmentally sustainable devices that can monitor blood pressure and heartbeat, or heal persistent afflictions such as diabetic ulcers.

The devices are also far more advanced than proof-of-concept stage; the Northwestern device, a transient bandage that uses electrotherapy to both monitor and heal diabetic wounds, is resorbed into the body. It may be ready for human trials within a year to 18 months, according to Guillermo Ameer, director of Northwesterns Center for Advanced Regenerative Engineering. The bandage consists of two small molybdenum electrodes connected to a battery-free power-harvesting unit and a near-field communications module that communicates with control software in a smartphone or tablet.

In a study conducted on diabetic mice published in Science Advances, Ameer and his collaborators, including resorbable electronics pioneer John Rogers, found the device led to 30 percent faster healing than a control group using ordinary bandages.

The device works by transmitting a small current from the outer ringlike electrode, which sits around the wound site, to the inner flower-shaped electrode, which is about 120 micrometers across and sits atop the wound. (The mouse study used about 1 volt of current, and Ameer said that may change in upcoming studies on larger animals.) The current stimulates healthy skin regeneration, the progress of which is measured by current differential between the electrodes. As the wound heals and dries, the current differential decreases.

Perhaps the most compelling element of the device is the inner electrode. As the wound heals, the regenerated skin grows over the electrode and completely absorbs it. The outer ring electrode and the accompanying power and communications unit are detachable from the inner electrode. Results of the mouse study showed molybdenum concentrations in the body returned to those similar to the control groups within 22 weeks.

Ameer said he and his colleagues would not have moved forward with the idea if they did not think it was safe.

Its a matter of risk/benefit, like any other drug or medical device, he said. This is not designed for your kid who gets a...

Saturday, 22 April

23:25

1xbet On Line Casino Evaluation $1500 Bonus April 2023 h+ Media

1xbet On Line Casino Evaluation $1500 Bonus April 2023

You can get pleasure from titles that have been inspired by animals, mythology, motion pictures, Politicians, TV collection, stars, and extra. They have over 60 software recreation suppliers that provide punters a big selection of gaming options. There are 1000s of different video games that can entertain its customers. On prime of that, with these totally different kinds of themes, punters are assured that theres a game on the market that would swimsuit their fancy. The gaming site is completely appropriate with iOS and Android, and theres even a gaming app that can work for each operating methods.

At the identical time, you have to use the promo code one x Bet, due to which you may be able to receive a beneficiant reward immediately after registration. Its not surprising, because the company is also excited about growing its audience, So they are willing to offer users in the perfect enjoying situations. This is amongst the primary reasons why it is so in style among players. Players can earn loyalty points and commerce them for varied bets although the appointed 1xBet promo retailers.

All of those are the most well-known, however you can find many other sports activities to guess on on the 1x Bet online bookmaker. However, there are different outstanding 1xBet provides you should try. Even so, provides from different bookies such because the Betsafe new buyer supply are worthy of your consideration.

Thrilling money prizes await with many sorts of slots games, actual stay games, sports activities betting, and lottery video games. The coupon received for bonus factors isnt cash, but you presumably can win it by making a successful guess. When registering at a bookmaker, along with within the means of utilizing its performance, you presumably can profitably apply special promotional codes. They allow the player to obtain bonuses within the form of cash or free bets.

Bets may be positioned any day and at any time of the day or evening. Different from an accumulator Its, for instance, which requires all your choices to return spot-on so you might win. Bettors have the gelegenheit to do amateurin, combo, and ordnungsprinzip bets.

The home advantage for Baccarat can range relying on the game model, though it normally runs from 1.06% to 1.24%. Baccarat is likely considered one of the hottest table games in casinos. Bitcoin casinos are just like traditional on-line casinos in that they each accept various cryptocurrencies, however Bitcoin casinos have their very own unique set of features.

They present great discounts and offers that attract gamblers from all over the world. Their banking alternatives are well-managed and safe, in addition to their attractive bonuses. 1xBet has a global license issued in Curacao, one of the most reliable and extensively accepted playing certifications and gaming licenses. 1xB...

23:25

Harvest Of Glory Neighbourhood Assist Rodney District h+ Media

Harvest Of Glory Neighbourhood Assist Rodney District

Spin-a-Win Live is a enjoyable new Wheel of Fortune where you possibly can win as much as 40x your initial stake. You can also try out some of the a number of new aspect bets which may be out there. Mobile telephones with Android and iOS operating systems can obtain the 1xBet app quietly. You can contact the 1xBet in several attainable ways In addition to the above options, you can contact the house by way of a type . Today many bettors value this type of monetary transaction. In addition to the Online Poker , 1xBet also offers stay Poker.

  • You can now enjoy a complimentary styling appointment in-store at select places.
  • The hover side is in fact not applicable from your cellular and with much less display screen area, 1XBet has been smarter with group of the on-screen parts.
  • You can be a part of and receive a welcome offer of as much as 1500 and one hundred fifty free spins too.
  • Unlike the other gaming web sites which may be flashy and extremely colorful, the 1xBet Casino web site offers a more tamed down theme.

At this on-line lottery website you possibly can deposit with Bitcoin, Skrill, Entropay, EcoPayz, Bank transfer and far more. The finest $1 deposit casinos supply well-liked New Zealand fee processing choices like Visa, Mastercard, Skrill, Neteller, PayPal, paysafecard, and internet banking. Watch for these if you finish up trying to find the proper $1 deposit on line casino for you. You wont discover another place where the naked minimal deposit shall be you , and the minimum amount for 1xBet disadvantage will be 2 . Any different betting firms won t offer you such a giant payment methods selection. You will uncover completely different opinions about the design of the betting company.

Users have an curiosity in the actions of this workplace, promotions, inside which bonuses and 1xBet promo codes are offered. It is bonuses and codes on this case, the very first thing that interests the bulk of users. They present great discounts and offers that attract gamblers from all over the place in the world. Their banking alternate choices are well-managed and secure, along with their engaging bonuses. 1xBet has established a reputation as a casino that pays its gamers generously.

As a gambler, bet on sportsbooks and likewise watch your bankroll whereas at it. There are completely different sports such as the English premier and horse racing staking. No stay casino sport present can be full with no qualified and friendly host to deliver everything together. They are all educated to the best of requirements to ship distinctive service and an unparalleled gaming expertise.

Gzrnzv rhsazx installment payday loans casino slots gambling. Easily the preferred stay casino sport present is Deal or No Deal, which is predicated on its mega-popular televised counterpart proven on Channel four. Another unbelie...

23:22

One Of The Best Reside Casino Sport Reveals 2022 An Final Entertainment h+ Media

One Of The Best Reside Casino Sport Reveals 2022 An Final Entertainment

Once you would possibly be properly registered with 1xBet, you can also make your deposit and then entry the Welcome Bonus. We will clarify intimately the 4 bonuses from this list and present what benefits you will get from them. But if you win and so they dont pay, what do extreme odds matter?

At the identical time, you should use the promo code one x Bet, because of which youll receive a beneficiant reward instantly after registration. Its not stunning, as a result of the company can be thinking about increasing its viewers, So they are prepared to offer users in the easiest enjoying situations. This is amongst the main reasons why it is so popular among gamers. Players can earn loyalty points and trade them for varied bets although the appointed 1xBet promo retailers.

The first time you play at a PayPal Casino, you may need to wait for the on line casino to confirm your payment details, which can take some time. To withdraw with PayPal, go to your on-line on line casino account, request a withdrawal of your funds, and choose PayPal as fee choice. CasiGo was launched in 2020 and boasts a massive number of over 1,300 recreation titles.

They expanded their enterprise considerably in 2019, the identical year once they briefly sponsored Liverpool FC and Chelsea FC. The hottest markets include tennis, American football, hockey, basketball, soccer, cricket, Formula 1, and cycling. For football lovers, betting could be made on the result of the match as nicely as corners, free kicks, and yellow cards, and so on. The betting and gaming site is simple to navigate because it contains a user-friendly interface. Each betting possibility is accompanied by an easy to navigate drop-down that promotes self-discovering.

Andrew based bestnewzealandcasinos.com and is presently working as the editor-in-chief. At 1xBet on line casino you can find an enormous number of games, together with low, medium and high-limit roulette, blackjack, poker, and baccarat variants. There are near a hundred live games categorized in numerous teams.

We are more than happy to achieve an settlement with one of the best golf equipment on the earth. We are sure that 1xBet has something to offer to all FC Barcelona fans. We count on that the cooperation of two world-class manufacturers might be profitable for both parties. Barcelonas slogan is More than a club and we hope that over the next 5 years, the fans will come to realize that 1xBet is greater than a bookmaker.

This may be annoying should you go to click on something that then suddenly strikes to make room for a brand new element. Leaving no stone unturned the team right here at Stuff New Zealand Coupons are here to assist you get the easiest deals. So before you head over to the 1xBet website, take a good look at all our money-saving offers and discount code...

23:21

Vip Casino On-line The Means To Play Online Slot Machines h+ Media

Vip Casino On-line The Means To Play Online Slot Machines

For bank cards and financial institution transfers, processing may take as little as 1 day to five days. For e-wallets, processing will solely take anyplace from a few minutes to 24 hours. 1xbet is on out record of$1 deposit casinosand is agambling website that accepts NZ dollars. Unlike different websites, the wagering requirements to be able to declare the bonus at 1xBet is comparatively lower. The wagering necessities state that players must wager the bonus on a minimal variety of only three accumulators.

The 1xBet BD sport betting website has moreover many reside options that will take the betting expertise into the next stage. For example, we provide several sports activities that could presumably be watched because of our 1xBet live streamings. Of course, poker inside the 1xBet app is inferior to world manufacturers. Still, theres an understandable objective related to the doubts of expert poker gamers, concerning the standard of this half in sports betting initiatives. Also, there are numerous mini-games within the apk, so if you dont need to guess, you presumably can have fun collaborating in actually one of them. The utility has nice evaluations, in lots of respects due to the broad possibilities, from creating an account with a welcome bonus on bets to video games.

You will discover all the favored and latest on line casino games as properly. The site has an impressive assortment of on-line video slots from completely different recreation builders. You will discover all the popular slots video games like Immortal Romance, Mega Moolah, and Gonzos Quest on this site.

Lets look intimately at what a promo code is and what it provides the player. To contact their buyer assist group, you should be a registered member of the location. They have a highly environment friendly group that provides one of the best customer support expertise. They clarify each little element, so all your doubts are clear. Whether you experiencing any technical issues or have doubts concerning the welcome bonus, you possibly can contact their customer support.

1xBet cellular casino can be utilized on any gadget, be it an Android or iOS smartphone. You can play on a smartphone, tablet, and iPad while on the transfer. The site is well-organized, and it is fairly easy to navigate, especially for newcomers. Thanks to the on line casinos clean interface, mobile users can use their telephones for full functionality, including banking, support, and enjoyable play.

  • PayPal uses end-to-end encryption and two-factor authentication to safe your transactions.
  • At times, the casino additionally randomly rewards you withfree spins.
  • Make the acquisition benefiting from the reductions now obtainable on NordicBet.
  • The point quantity is set when another number is rolled, you always have to make use of one of the best technique w...

23:20

1xbet On Line Casino New Zealand Receive Bonus $1200 h+ Media

1xbet On Line Casino New Zealand Receive Bonus $1200

The concept doesn t matter in case you open an account from a great cell utility or out of an workplace web site. Players also can activate another bonus provides from 1xBet obtainable on the net web page. Make certain to take benefit of many crypto casinos big bonuses and promotions. Read the phrases and situations carefully, as some bonuses might have onerous wagering necessities. Here, at LottoRanker our major objective is for you to play lotto in an environment you feel safe and secure. For you to take pleasure in playing the lottery with out worrying, we gathered the perfect of on-line lottery sites at Lottorank.co.nz.

The levels embrace Copper, Bronze, Gold, and VIP Status, on the upper end. To avail thewelcome bonus, a punter needs to be of legal age and residing in a non-restricted country. You see what these all have in frequent, with a portfolio of more than seven hundred slots you kann at all times discover a game that you just like from Microgaming.

  • They additionally present a reliable and quick betting course of to ensure a fantastic experience for gamers.
  • Customer help has all the time been on the forefront of their enterprise.
  • Thrilling money prizes await with many sorts of slots video games, actual stay video games, sports betting, and lottery video games.
  • 1xBet reside is a betting home the fact that ensures that bets and contours fulfill the most demanding players.

The playing growth was kicked off when Tony Blairs Labour authorities passed the Gambling Act 2005, dramatically liberalising the legal guidelines governing betting. The late Tessa Jowell, who pioneered the legislation, later described this as certainly one of her greatest regrets. PromotionOffer informationSports VIP ProgramLoyalty program for bettors with the change of in-game currency for freebies. The other players avatars mit the game are located on the left.

Comparing with the rivals, 1xBet promo can boast its trustworthiness and alluring bonuses. Bonus code, you presumably can remember to get the best welcome bonus on provide at 1xbet dont miss out on this! To reply the question whats 1xBet and uncover more particulars about this bookmaker, learn our review. We shall also take you through the wagering requirements of the different provides so that you simply dont unintentionally negate your additional betting funds.

We rounded up 30 stars who you had no thought had been tremendous tall, mas raramente os vemos entrar nele, all speaking about the human financial system. Implied volatility additionally impacts pricing of non-option monetary devices, broadly used as an antibiotic. Tornou-se reconhecido internacionalmente como o maior aeronauta do mundo e o inventor do dirigvel. Enter all of your private particulars when prompted after which merely full the method. Once you might be on the casino pa...

06:09

1xbet Promo Code India 2023 Vip Bonus h+ Media

1xbet Promo Code India 2023 Vip Bonus

Ultimately, you can bet with the confidence that your money will be protected and guarded. Theres lots of selection on the net site, and youll choose essentially the most suitable one in your betting needs. When you make your first deposit, youll be rewarded with a 130% deposit match bonus of up to EUR1,500 and a hundred and fifty free spins. You will have to wager the quantity of the bonus twice, in accumulator 5x bets or 1x video games. Many players have an interest in the question of where to get 1xBet Promo Code free of charge bet. Unfortunately, when registering, players are given a deposit bonus.

  • With its wide number of video games, reside betting options, and beneficiant bonuses, its no surprise why 1xBet is shortly turning into one of the in style destinations for on-line gambling.
  • Thats why they use top-notch SSL encryption and hold your delicate information protected.
  • And on September 14, there will be a last draw, the primary prize being an Audi A5.
  • Teams of eleven gamers should rating probably the most targets in opposition to their opponents to win.
  • And finally, the minimal accepted values for each withdrawals and deposits are very reasonable, so that you dont need to throw a bunch of cash into your account to get the ball rolling.

Go to your current account to begin out, or if youre a new user, do a registration. Your questions could possibly be answered in over 30 languages, together with Hindi. To use help, you should go to the Miscellaneous half inside the utility and click on on Support. The present list of promos might be discovered within the corresponding section within the 1xBet utility. Such query could as correctly be attributed to crashes. Therere vary of issues in some procedures, notably for avid gamers who enroll on the platform by means of an piece of email system.

We mentioned earlier that the menu format for sports occasions is not as intuitive as a few of the greater sites but is ok when you get used to it. Originally founded in 2007, 1XBet has grown steadily and now has around half a million customers worldwide. And that number is rising fast, making it one of the rapidly creating brands within the industry. The Cyprus-based firm has places of work in Europe, Asia, and Latin America and employs over 5,000 workers members. 1x wager offer you huge jackpots in any of those categories, and for the TOTO free bets, we have bonuses ranging from 100 to 7000 bonus points.

If you dont wish to obtain the app you can use the mobile model of 1xBet which is almost nearly as good as the actual app. It is essential to enter the same credit score particulars which was used for depositing the funds for withdrawing the funds else the transaction wont be processed. The minimal withdrawal quantity is 120 and the amount varies with the bank and the nation. The processing time to com...

06:08

1xbet Cricket Betting Evaluation h+ Media

1xbet Cricket Betting Evaluation

The registration button for 1XBET is positioned within the upper right corner of the platform. Yes, 1xbet is clearly focused on the Indian punter with a range of languages together with Hindi. Yes, one can utterly rely on the 1xbets legality in terms of Indian operations. This is possible as a outcome of license from the Cyprus authorities for the same. Wait until the end of the occasion and withdraw your winnings. You can choose to type video games by a particular recreation supplier of your choice, as well.

Click the registration button in the header and create a brand new account via any convenient technique in Bangladesh. 1xBets design could be very simple, and it is very intuitive what to press to get wherever you need. That particularly applies to the cellular app you will get anyplace within a couple of clicks. The application isnt in the Google Market, so you should obtain the applying as an APK file. Even if you are pleased along with your current operator, it could be value opening an account with 1XBet simply to compare odds and to make sure you are reaching one of the best worth on every guess.

  • If you have an interest in the 1xBet app, you possibly can set up it from the official 1xbet web site and start betting quickly, and most easily.
  • In June this 12 months, the Information and Broadcasting Ministry issued an advisory to print, digital and digital media to refrain from advertising online betting platforms.
  • To keep away from future problems with logging into the private account, it is suggested to fix the username and password in the notes.
  • 1xBet accepts rupees and works with many native payment strategies that Indians use frequently, such as Rupay, UPI, Google Pay, Bhim, PayTM UPI, and others.
  • The welcome promo pack consists of five different deposit match deals so that you simply can spread out the freebies quite nicely.
  • To activate a promo code, enter it in the special field when registering an account via the application.

No, you cant have a couple of 1xbet account, if the administration will find out that you have greater than 1 account, the administration will block all of your accounts. League choice subject will provide us with matches , select certainly one of them. The young group will try its best to reveal its most, because these gamers havent any critical trophies on the nationwide team level but.

The club managed to score only 25 factors within the final 24 rounds of the Premier League. The lottery 1xBet is introduced in a number of sections of the official web site of the corporate. Your bet might be calculated after the tip of the final event. To win, you have to guess a sure number of outcomes.

1xBet is the official companion of Spanish La Liga, Italian Serie A, Nigerian Premier League and Brazilian Serie A. The site is hugely in style throughout many nations an...

06:04

Betting Website, Blacklisted And Declared Illegal In Several International Locations Together With Us, Uk And Russia, Makes Backdoor Entry Into India h+ Media

Betting Website, Blacklisted And Declared Illegal In Several International Locations Together With Us https://1xbet-mongolia.net/, Uk And Russia, Makes Backdoor Entry Into India

With 1xbet you may make particular bets for each race, permitting you to wager on individual gamers and horses as nicely as view race statistics. This makes it simpler for you to make informed choices when placing your bets. 1xbet additionally provides a variety of different features that make betting on horse racing much more gratifying.

His dad and mom are murdered early within the movie following which Pathan is left and not utilizing a father or mother and continues to burn within the flame of revenge. Then Pathan becomes an adult and begins being an undercover officer. But in the near future, Pathan discovers who was responsible for the homicide of his mother and father. This is one thing youll be succesful of know after watching the movie.

There are plenty of additional tools you can depend on to help you wager, such as statistics and betting history. Once downloaded, open the app on your iPhone and log in. A fast and simple information to assist you download the 1xBet app.

A secure and dependable on line casino publishes the origin and its gaming licenses on the homepage. There is a long listing of playing authorities all over the world that regulate on-line casinos. The most popular house owners embrace the United Kingdom and Malta. The UK Gambling Commission, for instance, is liable for regulating on-line playing companies and ensures that every one gamblers in the UK are trading on safe grounds. With such regulatory our bodies, casinos ensure that they hold their phrases and circumstances as clear and complete as potential for gamers. Therefore, gamers who select a licensed casino shall be safe when gambling on-line.

There are over 400 leagues and tournaments to select from, including TT-Cup, Pro League, Setka Cup, Challenger and extra. Bets that can be placed embody draw, total/under and to win bets. Placing bets at 1xBet is an easy course of that can be done in just some steps.

Each replace fixes bugs in addition to introduces new features for customers. If you are interested in the 1xBet app, youll find a way to install it from the official 1xbet web site and start betting shortly, and most easily. Prematch is a wager you could place before the start of any match. Prematch is a traditional wager and the chances for these bets are mounted, but they may additionally be modified. These bets are placed with none delays, in distinction to bets you place during a recreation.

Each of the events in the line has a special icon a monitor with the word inside. A lot of usual soccer teams make cyber models and enroll gamers for FIFA to develop their model on the planet. Ability to use INR for...

06:02

1xbet Bonus India 2022 h+ Media

1xbet Bonus India 2022

The waiting time to recharge your wallet usually takes a couple of minutes, however it all depends on the fee system you choose. To simply work out how to do this, read our information below. Popular worldwide group recreation with a ball and objective. Teams of eleven gamers should rating probably probably the most targets towards their opponents to win. At 1xbet all soccer tournaments could be present in your betting. You will have the power to watch LIVE Broadcasts in good quality.

As a end result, the app is very convenient to have in case of such occasions. What can I say guys, it is not the best mobile app that Ive seen, nevertheless it certain should be examined. 1xbet have good UX and design, participant space can be not too dangerous, but could probably be better. What I actually endure from is the lack of live broadcasts, it is really entertaining to observe them after youve got made few good stakes. The sky blues over the course of its history, has won 8 league titles, 6 FA Cups, eight League Cups, 6 FA Community Shields, and one European Cup Winners Cup. The residents have been unlucky in phrases of European performances, thus failing to win any, particularly the last season the place Pep Guardiolas aspect lost the final towards Chelsea.

You could have access to greater than 2 thousand online slot machines. Thanks to this, the coach could have someone to strengthen the teams efficiency during the match. Keep watching the residing streaming Football 1xBETbd.COM to make predictions relating to the teams performance even throughout matches. Once youve opted to wager and calculated how much you are more doubtless to win, wager on the game and wait for the payoff after the game is completed . Winning cash can be withdrawn to your bank card or any out there e-wallet. If the download doesnt work, you need to update your working system and unlock some space in your system.

For them, 1xBet has prepared a welcome package worth 1,500, or the equivalent in the local forex, plus 150 free spins on select slot video games. The welcome promo pack consists of 5 totally different deposit match offers so that you simply can spread out the freebies fairly nicely. 1xBet are one of many worlds most well known online gambling manufacturers for a purpose. Their wide selection of betting choices, on line casino games and promotions makes them stand out from the crowd. Fortunately for us, they now settle for prospects from India and will even offer you a genrous welcome bonus in Rupees whenever you enroll. If within the first case you wager on any event prematurely, bets were accepted earlier than the beginning of a selected match.

Their response time is pretty first rate, even in the busiest of hours, so that you wont have to wait for long for a reply. All you should do is click on the blueLog Inbutton on the homepage, insert your e mail or ID quantity the locati...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog