IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Thursday, 12 October

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Thursday, 28 September

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Thursday, 14 September

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Saturday, 20 May

00:02

[$] Phyr: a potential scatterlist replacement LWN.net

The "scatterlist" is a core-kernel data structure used to describe DMA I/O operations from the point of view of both the CPU and the peripheral device. Over the years, the shortcomings of scatterlists have become more apparent, but there has not been a viable replacement on the horizon. During a memory-management session at the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit, Jason Gunthorpe described a possible alternative, known alternatively as "phyr", "physr", or "rlist", that might improve on scatterlists for at least some use cases.

00:01

[$] Memory passthrough for virtual machines LWN.net

Memory management is tricky enough on it own, but virtualization adds another twist: now there are two kernels (host and guest) managing the same memory. This duplicated effort can be wasteful if not implemented carefully, so it is not surprising that a lot of effort, from both hardware and software developers, has gone into this problem. As Pasha Tatashin pointed out during a memory-management-track session at the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit, though, there are still ways in which these systems run less efficiently than they could. He has put some effort into improving that situation.

00:00

This Week in Security: .zip Domains, Zip scanning Hackaday

The world may not be ready, but the .zip Top Level Domain (TLD) is here. Its a part of the generic TLD category, which was expanded to allow applications for custom TLDs. Google has led the charge, applying for 101 such new TLDs, with .zip being one of the interesting ones. Public registration for .zip domains has been open for a couple weeks, and some interesting domains have been registered, like update.zip, installer.zip, and officeupdate.zip.

The obvious question to ask is whether this new TLD can be abused for scamming and phishing purposes. And the answer is yes, sure it can. One of the trickiest ways is to use the AT symbol @ in a URL, which denotes user info at the beginning of the URL. It usually is used to include a username and password, like http://username:password@192.168.1.1/. That is pretty obvious, but what about https://google.com@bing.com? Still looks weird. The catch that really prevents this technique being abused is that slashes are disallowed in user data, so a abusive URL like ...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Friday, 19 May

23:57

Security updates for Friday LWN.net

Security updates have been issued by Fedora (cups-filters, kitty, mingw-LibRaw, nispor, rust-ybaas, and rust-yubibomb), Mageia (kernel-linus), Red Hat (jenkins and jenkins-2-plugins), SUSE (openvswitch and ucode-intel), and Ubuntu (linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gke-5.15, linux-gkeop, linux-oracle-5.15, linux-ibm, linux-oracle, and linux-oem-6.0).

23:27

NPM packages found containing the TurkoRat infostealer Security Affairs

Experts discovered two malicious packages in the npm package repository, both were laced with an open-source info-stealer called TurkoRat.

ReversingLabs discovered two malicious packages, respectively named nodejs-encrypt-agent and nodejs-cookie-proxy-agent, in the npm package repository containing an open-source info-stealer called TurkoRat.

TurkoRat is an information-stealing malware that can obtain a broad range of data from the infected machine, including account login credentials, cryptocurrency wallets, and website cookies. The malware also supports anti-sandbox and analysis functionalities to avoid detection and prevent being analyzed.

TurkoRat is just one of many open source malware families that are offered for testing purposes, but can readily be downloaded and modified for malicious use, as well. reads the analysis published by ReversingLabs. TurkoRats author clearly anticipates this, as he provides instructions on how to use malicious code, while stating that he is not responsible for any damages this software may cause and that it was only made for personal education.'

The two packages were collectively downloaded approximately 1,200 times since their upload into the repository two months before they were discovered.

The nodejs-encrypt-agent was discovered due to scanning the repository.

TurkoRAT npm repository

The researchers noticed that the nodejs-encrypt-agent contained the malware inside. The package name used by the attackers on the npm page appeared as legitimate, but it differed from the name listed in the readme.md file (agent-base). The choice of the name agent-base in the readme.md was not accidental, because agent-base is the name of a...

22:45

Mesa "Terakan" Driver Aims To Provide Vulkan Support For Old Radeon HD 6000 Series Phoronix

There's a new open-source Vulkan driver in development by an independent developer that is working on providing support for aging Radeon HD 6000 series "Northern Islands" graphics processors...

22:29

Teen Charged in DraftKings Data Breach HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

If convicted, the alleged culprit Joseph Garrison could face a maximum sentence of 57 years.

This is a post from HackRead.com Read the original post: Teen Charged in DraftKings Data Breach

22:28

Privacy Sandbox Initiative: Google to Phase Out Third-Party Cookies Starting 2024 The Hacker News

Google has announced plans to officially flip the switch on its twice-delayed Privacy Sandbox initiatives as it slowly works its way to deprecate support for third-party cookies in Chrome browser. To that end, the search and advertising giant said it intends to phase out third-party cookies for 1% of Chrome users globally in the first quarter of 2024. "This will support developers in conducting

22:23

The Group Decode ROM: The 8086 Processor's First Step of Instruction Decoding SoylentNews

http://www.righto.com/2023/05/8086-processor-group-decode-rom.html

A key component of any processor is instruction decoding: analyzing a numeric opcode and figuring out what actions need to be taken. The Intel 8086 processor (1978) has a complex instruction set, making instruction decoding a challenge. The first step in decoding an 8086 instruction is something called the Group Decode ROM, which categorizes instructions into about 35 types that control how the instruction is decoded and executed. For instance, the Group Decode ROM determines if an instruction is executed in hardware or in microcode. It also indicates how the instruction is structured: if the instruction has a bit specifying a byte or word operation, if the instruction has a byte that specifies the addressing mode, and so forth.


Original Submission

Read more of this story at SoylentNews.

21:44

Re: IPv6 and Route of Death Open Source Security

Posted by Dominique Martinet on May 19

Solar Designer wrote on Wed, May 17, 2023 at 07:13:51PM +0200:

A couple of days late, but since I wanted to read it myself, here's the
text content (as rendered by edbrowse, which looks good enough to me,
look for 'h3' to jump to next sections e.g. 'h3 The Bug'):
--------------
h3 Introduction

Sometimes I feel like exploring random areas of code.
It's a pretty good way to find a new bug pattern.
Early last year I...

21:13

Apple fixes WebKit 0-days under attack (CVE-2023-28204, CVE-2023-32373, CVE-2023-32409) Help Net Security

Apple has released security updates for iOS and iPadOS, macOS, tvOS and watchOS, delivering fixes for many vulnerabilities but, most importantly, for CVE-2023-32409, a WebKit 0-day that may have been actively exploited. The notes accompanying the updates also revealed that Apples first Rapid Security Response update, which was pushed out earlier this month, contained fixes for two WebKit 0-days (CVE-2023-28204 and CVE-2023-32373). About the vulnerabilities CVE-2023-28204 and CVE-2023-32373 can be triggered by WebKit the More

The post Apple fixes WebKit 0-days under attack (CVE-2023-28204, CVE-2023-32373, CVE-2023-32409) appeared first on Help Net Security.

21:09

Lemon Group gang pre-infected 9 million Android devices for fraudulent activities Security Affairs

The Lemon Group cybercrime ring has reportedly pre-installed malware known as Guerilla on almost 9 million Android devices.

A cybercrime group tracked has Lemon Group has reportedly pre-installed malware known as Guerilla on almost 9 million Android devices. Infected devices were used for multiple malicious activities, including traffic redirections through mobile proxies, info-stealing, click fraud, and social media and online messaging accounts and monetization via advertisements.

The network of compromised devices was discovered by Trend Micro which shared details of its investigation at the Black Hat Asia 2023 conference in May.

The threat actors infected at least 8.9 million compromised Android devices, most of them are budget phones. The highest number of infected devices in the U.S., Mexico, Indonesia, Thailand, Russia, South Africa, India, Angola, the Philippines, and Argentina.

The Triada Trojan was spotted for the first time in 2016 by researchers at Kaspersky Lab that considered it the most advanced mobile threat seen to the date of the discovery.

Triada was designed with the specific intent to implement financial frauds, typically hijacking financial SMS transactions. The most interesting characteristic of the Triada Trojan apart is its modular architecture, which gives it theoretically a wide range of abilities.

The Triada Trojan makes use of the Zygote parent pr...

21:04

Dr. Active Directory vs. Mr. Exposed Attack Surface: Who'll Win This Fight? The Hacker News

Active Directory (AD) is among the oldest pieces of software still used in the production environment and can be found in most organizations today. This is despite the fact that its historical security gaps have never been amended. For example, because of its inability to apply any security measures beyond checking for a password and username match, AD (as well the resources it manages) is

21:00

Building a Giant Vacuum Tube Smart Lamp Hackaday

Vacuum tubes are pretty, which is why theyre often showcased externally on exquisitely-expensive home Hi-Fi hardware. But if you just want to gaze at their beauty without making any noise, why not build this vacuum tube lamp from [Noel Trjk] instead?

[Noel] got into some creative reuse with this build, with the main body consisting of a bell jar and wooden bowls. The internal structure is then created from jar lids, wire, metal sheeting, steel rods, and galvanized wire mesh. Simple modelling techniques are used to assemble the internal parts of the valve, including the grid and the electrodes and so on. As for light, [Noel] employed a ZigBee LED driver that he could control over his smart home setup via a Philips Hue bridge.

The final result looks like an extra-large tube. Anyone who knows what it is will spot that its not a real one, but theyre also exactly the audience that will appreciate it for what it is. Everyone else will probably just think youve taken an interest in strange art-deco replica lighthouses. Its not the first time weve seen replica valves around these parts, though, and were sure it...

20:40

Developer Alert: NPM Packages for Node.js Hiding Dangerous TurkoRat Malware The Hacker News

Two malicious packages discovered in the npm package repository have been found to conceal an open source information stealer malware called TurkoRat. The packages named nodejs-encrypt-agent and nodejs-cookie-proxy-agent were collectively downloaded approximately 1,200 times and were available for more than two months before they were identified and taken down. ReversingLabs, which broke

20:19

Fedora To Further Evaluate vm.max_map_count Tuning For Better Linux Gaming Experience Phoronix

There's been a Fedora 39 proposal under evaluation for boosting the kernel's vm.max_map_count to help with some Windows games on Steam Play. Though concerns were raised that bumping this kernel tunable too high may not be wise. As such, further testing is to happen for tuning Fedora's stock vm.max_map_count value...

20:02

DarkBERT could help automate dark web mining for cyber threat intelligence Help Net Security

Researchers have developed DarkBERT, a language model pretrained on dark web data, to help cybersecurity pros extract cyber threat intelligence (CTI) from the Internets virtual underbelly. DarkBERT pretraining process and evaluated use case scenarios (Source: KAIST/S2W) DarkBERT: A language model for the dark web For quite a while now, researchers and cybersecurity experts have been leveraging natural language processing (NLP) to better understand and deal with the threat landscape. NLP tools have become an integral More

The post DarkBERT could help automate dark web mining for cyber threat intelligence appeared first on Help Net Security.

19:57

Big Patch Series Prepares The Linux Audio Drivers For MIDI 2.0 Phoronix

Nearly forty years after the MIDI digital music protocol was first introduced, in 2020 the MIDI 2.0 protocol was announced as a major overhaul for this widely used standard by musical devices. A big patch series sent out today prepares the Linux kernel sound drivers for MIDI 2.0...

19:45

Remembering Jim Early (1943-2023) Centauri Dreams Imagining and Planning Interstellar Exploration

Remembering Jim Early (1943-2023)

I was saddened to learn of the recent death of James Early, author of a key paper on interstellar sail missions and a frequent attendee at IRG events (or TVIW, as the organization was known when I first met him). Jim passed away on April 28 in Saint George, UT at the age of 80, a well-liked figure in the interstellar community and a fine scientist. I wish I had known him better. I ran into him for the first time in a slightly awkward way, which Jim, ever the gentleman, quickly made light of.

What happened was this. In 2012 I was researching damage that an interstellar sail mission might experience in the boost phase of its journey. Somewhere I had seen what I recall as a color image in a magazine (OMNI?) showing a battered, torn sail docked in what looked to be a repair facility at the end of an interstellar crossing. It raised the obvious question: If we did get a sail up to, say, 5% of the speed of light, wouldnt even the tiniest particles along the way create significant damage to the structure? The image was telling and to this day I havent found its source.

I think of the image as lightsail on arrival, and if this triggers a memory with anyone, please let me know. Anyway, although our paths crossed at the first 100 Year Starship symposium in Orlando in 2011, I didnt know Jims work and didnt realize he had analyzed the sail damage question extensively. When I wrote about the matter on Centauri Dreams a year later, he popped up in the comments:

I presented a very low mass solution to the dust problem at the 100 Year Starship Symposium in a talk titled Dust Grain Damage to Interstellar Vehicles and Lightsails. An earlier published paper contains most of the important physics: Early, J.T., and London, R.A., Dust Grain Damage to Interstellar Laser-Pushed Lightsail, Journal of Spacecraft and Rockets, July-Aug. 2000, Vol. 37, No. 4, pp. 526-531.

I was caught by surprise by the reference. How did I miss it? Researching my 2005 Centauri Dreams book, I had been through the literature backwar...

19:41

Intel's Vulkan Linux Driver Adds H.265 Video Decoding Support Phoronix

Intel's open-source Mesa Vulkan Video driver "ANV" has added support for H.265 (HEVC) video decoding...

19:39

Reviving Office Chatter SoylentNews

Researchers Design Tool to Enhance Workplace Socialization in Remote, Hybrid Arrangements:

About one-third of our lives are spent at work, and the relationships we build there can have personal and professional benefits. But a majority of workers indicate difficulty connecting with co-workers socially, especially in the new landscape of remote and hybrid work arrangements.

To ease the friction caused by reduced in-person interaction, a team of researchers from Carnegie Mellon University's Human-Computer Interaction Institute created a Slack application that helps to initiate casual conversations and create affinity groups in an online workspace.

"We were freshly out of the pandemic, and we realized that everyone around us was complaining about how it's hard to build genuine connections," said Shreya Bali, the project's principal investigator who earned her master's degree from CMU's School of Computer Science in 2022. "Online modes of communication do provide us with the technical tools to make connections, but there is still a lot of hesitation to actually initiate such conversations when you are not in the same room as someone."

The team's new application, called Nooks, offers users a low-risk way to start new conversations in three phases: creation, incubation and activation. It starts with someone anonymously submitting a topic of interest. Then, the topic is incubated while the system presents it to other Slack users, allowing them to indicate if they are interested in the same topic. Once the incubation period is over, a private channel or "nook" is activated for this newly identified affinity group.

Read more of this story at SoylentNews.

18:26

Anti-Piracy Program Accused of Violating Citizens Fundamental Rights TorrentFreak

Pirate KeyWhen the French government formed a new anti-piracy agency called Hadopi, the mission was to significantly disrupt BitTorrent and similar peer-to-peer file-sharing networks.

Hadopi was a pioneer of the so-called graduated response scheme which consists of monitoring a file-sharers internet activities and following up with a warning notice to deter their behavior. Any future incidents attract escalating responses including fines and internet disconnections. Between 2010 and 2020, Hadopi issued 12.7 million warning notices at a cost to French taxpayers of 82 million euros.

The programs effect on overall piracy rates remains up for debate but according to French internet rights groups, Hadopi doesnt just take citizens money. When it monitors citizens internet activities, retains huge amounts of data, and then links identities to IP addresses to prevent behavior that isnt a serious crime, Hadopi violates fundamental rights.

Protecting Rights

Despite its authorization under the new law, the official launch of the Hadopi agency in 2009 met with significant opposition. File-sharers had issues with the program for obvious reasons but for digital rights group La Quadrature du Net, massive internet surveillance to protect copying rights had arrived at the expense of citizens fundamental right to privacy.

La Quadratures opposition to the Hadopi anti-piracy program focuses on the law crafted to support it. One of the implementing decrees authorizes the creation of files containing internet users IP addresses plus personal identification data obtained from their internet service providers.

According to the digital rights groups interpretation of EU law, that is unlawful.

Legal Challenge in France

With support from the Federation of Associative Internet Service Providers, French Data Network, and Franciliens.net, in 2019 La Quadrature filed an appeal before the Council of State (Conseil dtat), requesting a repeal of the decree that authorizes the processing of personal information.

The Council of State referred the matter to the Constitutional Council and its subsequent decision gave La Quadrature the impression that Hadopis position was untenable. For their part, Hadopi and the government reached the opposite conclusion.

Legal Challenge Reach...

18:00

North Korean Karaoke Machine Teardown Hackaday

Karaoke is a very popular pastime in Seoul there are venues where you can sing on a stage, sing in rooms with your friends, and even sing solo in coin-operated karaoke booths on the bullet train. Apparently it is also popular in North Korea as well [Martyn Williams] of the North Korea Tech blog reported on an interesting teardown by web hacker [Will Scott]. It is the Tianchi v700 machine, a Chinese product tailored for North Korean users, obtained online back in 2020.

Unlike the karaoke machines encountered by this author in South Korea, the v700 form factor is a 19.5-inch Android tablet with touch-screen and all the necessary interfaces youd expect: external video, speakers, and microphone, as well as WiFi and Ethernet for content upgrade and online payment systems. Not surprisingly, the connectivity aspects of the machine are not used in the North Korean model, but with a large catalog of pre-loaded music, its perfectly usable as a stand-alone device.

[Will] dug into the innards of the machine and discovered it was powered by an Allwinner ARM processor (seemingly the H6 V200, a quad-core ARM Cortex-A53). He also found i...

17:00

SpaceX Raptor 3 Engine is Test Fired and Has 17% More Thrust Terra Forming Terra


Do look at that profile.  all the hardware disappeared.  this as much as tells you just why it is getting cheaper to build.  The nozzle itself is the same and we are notching up with performance which is reasonable.  It is the complete disappearance of the tree that stuns.  

A twenty percent improvement achieved is stunning.  losing the tree is equally stunning.  all goes to payload  We are looking at a hot boost now even to orbit if we want for payloads.

It may even mean a hot boost into orbit as well.  all good.
 

SpaceX Raptor 3 Engine is Test Fired and Has 17% More Thrust


SpaceX Raptor 3 Engine is Test Fired and Has 17% More Thrust

May 13, 2023 by Brian Wang

https://www.nextbigfuture.com/2023/05/spacex-raptor-3-engine-is-test-fired-and-has-10-more-thrust.html


SpaceX Raptor 3 is an improved and more powerful rocket enigine. It has reached 350 bar of pressure and 269 tons of thrust.

Raptor 2 engines were achieving 230 tf (510,000 lbf) of thrust consistently by February 2022, although SpaceX expects to be able to tune engine parameters and design over time to achieve at least 250 tf (550,000 lbf)....

Tiny Battery Obliterates Breast Cancer Tumors in Mice by Creating Oxygen-free Target to Better Kill Disease Terra Forming Terra


This is a really interesting method that can be easily applied as

 watch it happen and can then ensure competant coverage.

all that is then able to slowly collapse the tumor with applied meds.  likely means days in treatment to prevent accidents. but certain tumor collapse is worth it because then immune boosting should finish off remnants all while preventing any tumor progression.

It should also induce a vigorous recovery cycle.


Tiny Battery Obliterates Breast Cancer Tumors in Mice by Creating Oxygen-free Target to Better Kill Disease

-May 13, 2023



A tiny implant has placed a big target on the back of breast cancer tumors in mice, according to the results of a new study reported by South West News Service and New Scientist.

In the small study, a self-charging battery enabled a new class of medications to kill the tumorsand it took just two weeks to obliterate them, while leaving healthy tissue alone.

...

A New Way to Achieve Nuclear Fusion: Helion Terra Forming Terra


This is really good news as it appears that they are getting really good results and that power can be drawn off magnetically.  It is also going to be supper fast and i suspect keeping it cool enough will be an issue.  however even that may resolve through increasing size.

We are prepping two plasma rings and those can likely be improved upon.  then they are fired together elimiating all kinetic energy.  Talk about fine tuning.  Heat and powerful containment produces fusion reactions and a back wash back which expands the magnetic containment foields allowing power to be drwn off..


This is certainly way better than the Tokamack machine which has to solve similar problems with far more inherant design  difficulty.


A New Way to Achieve Nuclear Fusion: Helion

<iframe width="668" height="376" src="https://www.youtube.com/embed/_bDXXWQxK38" title="A New Way to Achieve Nuclear Fusion: Helion" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>

Tracking whales with existing fiber-optic cables may reduce ship strikes Terra Forming Terra




This is really neat.  We can use our undersea cables to listen to and locate surely all sorts of whales.  I do think we can largely query shipping routes and even when useful to shift traffic into monitored channels

It may not be easy but right now we have nothing.  much better than laying down a grid of cables and stations which is what is easily called for.

the best is that we will know where the whales are.

Tracking whales with existing fiber-optic cables may reduce ship strikes


May 09, 2023

https://newatlas.com/science/fiber-optic-cables-track-whales-reduce-ship-strikes/

Researchers have used existing fiber-optic cables to track fin whales in real time, which may help reduce the risk of them being struck by ships


Global warming has caused many large whales to move from warmer waters, increasing the risk of being struck by ships. Norwegian researchers have converted existing fiber-optic cables into hydrophones, enabling them to track Arctic fin whales in real time. The easy-to-adopt technique may reduce the incidence of ship strikes and help protect whales worldwide.


Climat...

16:53

Searching for AI Tools? Watch Out for Rogue Sites Distributing RedLine Malware The Hacker News

Malicious Google Search ads for generative AI services like OpenAI ChatGPT and Midjourney are being used to direct users to sketchy websites as part of a BATLOADER campaign designed to deliver RedLine Stealer malware. "Both AI services are extremely popular but lack first-party standalone apps (i.e., users interface with ChatGPT via their web interface while Midjourney uses Discord)," eSentire

Chinese Chip Industry to Focus on Perfecting Mature Nodes SoylentNews

Chinese Chip Industry to Focus on Perfecting Mature Nodes: Report:

Severe constraints on the development of the Chinese chip industry caused by strict export control rules that block People's Republic chipmakers from obtaining advanced wafer fab equipment (WFE) has triggered local specialists to rethink the nation's semiconductor strategy. While it is obvious that China will have to replace tools made abroad to make leading-edge chips in the long term, for now the country's chipmakers will have to focus on perfecting their mature nodes to stay competitive, reports DigiTimes.

Meanwhile, between 2022 and 2026, Jiwei Research estimates there will be 25 new 300-mm fabs in China, with a total capacity of over 1.6 million wafer starts per month. This could significantly increase China's chip production capacity, which will increase China's total 300-mm capacity to 2.76 million WSPM by 2026.

Without access to advanced equipment, all of these fabs will have to focus on 20nm 90nm-class technologies, but it will better be able to rely on domestic suppliers. Consequently, companies within the Chinese semiconductor supply chain, spanning from raw materials, machinery, and electronic design automation (EDA), are reportedly shifting their growth strategies, prioritizing mature processes over advanced ones. For instance, Naura has declared that it will prioritize shipments of tools for trailing processes utilized by Chinese chipmakers.

Furthermore, a provider of photoresist materials has disclosed that the current industry emphasis is on mature processes, in the hope of spurring significant advancements in mature wafer production techniques. As of now, the development of cutting-edge processes is not at the forefront of Tianxia's semiconductor industry's agenda.

Read more of this story at SoylentNews.

16:07

Links 19/05/2023: New Beta of deepin Linux and PipeWire 0.3.71 Techrights

  • GNU/Linux

    • Desktop/Laptop

      • Beebom 7 Best Linux Laptops to Buy in 2023 | Beebom

        Linux laptops are still considered pretty niche since not a lot of people are interested in using Linux, let alone purchasing a fully-fledged Linux machine. Although, we have seen the trend shifting lately with more people switching to Linux now than ever before. If you are one of those whos been using Linux for quite some time and want to buy a Linux laptop, here are all the options you have in the market right now.

        There are not many Linux laptop manufacturers out there, but the ones that are already there are doing an excellent job with the hardware selection. This list contains laptops from the likes of System76, KDE, Star Labs, and others....

16:00

Gemini Links 19/05/2023: Unclouding and Gemini Missing Good CMSes Techrights

  • Gemini* and Gopher

    • Personal

      • Strange Weather

        After 2021/2022s record snow, with our second-hand, decades-old snowblower dying for good shortly after we got back from visiting my partners parents out west, I ponied up and got a new model. And then: this last mild winter. One really big dump of snow (the snowblower made quick work of it), and thennothing. I had to shovel a bit, but not nearly as much as the previous winter. That winter, I tweaked my back, badly, around New Year 2022. This year, Ive so far got off easy.

        The mild winter became a long, cold spring. Grey days, no rain, little hint of sun. While my social media feeds showed crocuses and daffodils far south of here, the snow continued its gradually melt, only pulling back for good in mid-April. A couple weeks ago, the weather turned again. The forsythias blossomed, the irises green began to peek out, and the marsh birds returned, hovering around our feeder, picking out seeds.

    • Technical

      • Damnations

        FreeBSD for Nomads! Sensational. Like being in a future dystopian desert. This is the post Climate War OS for sure. When the rainforests are gone, the corall reefs are dead, the icecaps have melted, the bees have disappeared

        No Wi-Fi though. But do we need that? Later on, when the whole fucking world is burning? No. Fuck no. Z shell in sakura is all we need. Vim and Midnight Commander.

        An icecold Corona and a shot of your finest Tequila Blanco please and a couple of Oaxacan mushrooms, if you have any?
        This night is gonna be THE NIGHT at The Midnight!

      • Why I Hate Getting Help Online

        What the zark? I dont understand what is not clear. Well, fortunately, I do not have to provide that dude with the additional info he has requested because the previous reply was helpful.

15:24

Forgotten Antibiotic From Decades Ago Could Be a Superbug Killer Lifeboat News: The Blog

An antibiotic developed some 80 years ago before being abandoned and forgotten could again offer exciting new solutions, this time to the emerging threat of drug-resistant superbugs.

Half of the bacteria-killing drugs we use today are variations of compounds that were found nearly a century ago, during this golden age of antibiotics. One called streptothricin was isolated in the 1940s, drawing attention for its potential in treating infections caused by what are known as gram-negative bacteria.

Unlike gram-positive bacteria, these microbes lack a robust cell wall that many antibiotics target. Finding alternatives has been one of the big challenges for the pharmaceutical industry. In 2017, the World Health Organization (WHO) released a list of the most dangerous, drug-resistant pathogens out there. Most were gram-negative bacteria.

15:24

Googles New Medical AI Passes Medical Exam and Outperforms Actual Doctors Lifeboat News: The Blog

Closin in on Doctor jobs.


A medical domain AI developed by Google Researchers broke records on its ability to pass medical exam questions, but more surprisingly generated answers that were consistently rated as better than human doctors. While the study notes several caveats, it marks a significant milestone in how AI could upend a number of professions.

15:23

BuzzFeed Says AI Will Replace the Majority of Static Content Lifeboat News: The Blog

The breadth of BuzzFeed CEO Jonah Perettis AI aspirations just got a lot clearer and if he has it his way, AI use at the viral publisher wont be limited to time-killing quizzes and bottom-tier travel guides.

BuzzFeed has always lived at the intersection of technology and creativity. And recent developments in artificial intelligence represent an opportunity to take this convergence to the next level, Peretti told eager investors at the companys Investor Day last week. We view AI as an exciting new creativity tool, one that humans can harness to open up new avenues for imagination, storytelling and entertainment and explore new premium product offerings that allow us to innovate and collaborate with our clients and partners on a new frontier in media.

Over the next few years, generative AI will replace the majority of static content, and audiences will begin to expect all content to be curated and dynamic with embedded intelligence, he continued. AI will lead to new formats that are more gamified, more personalized, and more interactive.

15:22

Airport Security Is About to Get Way Faster Thanks to New Technology Being Used by TSA Lifeboat News: The Blog

New TSA screening methods will allow passengers through security without showing their boarding passes or by simply taking a picture.

15:22

A new technique to measure the expansion rate of the Universe Lifeboat News: The Blog

Their data provide insight into a longstanding debate in the field of astronomy.

15:00

Go In All The Directions With Omniwheeled ESP32 Bot Hackaday

The ability to change direction without turning is the specialty of omnidirectional wheels, which [maker.moekoe] used to their full potential on a pair of ESP32-controlled robots. Video after the break.

Thanks to the rollers on the wheels, the wheels could be arranged at 120 in relation to each other on the 3-wheeler and 90 4-wheeler. [maker.moekoe] used ChatGPT and a simple python simulation to find and verify the motor control algorithm required for smooth omnidirectional driving.

A single custom PCB incorporates all the electronics, and doubles as the robots chassis, with the geared brushed motors bolted directly to it. An ESP32-S2 runs the show, and can also stream FPV video from the same OV2640 camera used on the popular ESP32-cam modules. The LiPo battery is held by a 3D-printed support plate screws to the bottom of the PCB. The robots can controlled by a simple web-app...

14:30

New infosec products of the week: May 19, 2023 Help Net Security

Heres a look at the most interesting products from the past week, featuring releases from Bitwarden, Cloudflare, ComplyAdvantage, Enzoic, Neurotechnology, Nozomi Networks, and Satori. ComplyAdvantage Fraud Detection identifies and prevents transaction fraud Fraud Detection uses AI and machine learning algorithms to monitor monetary and non-monetary events and look for patterns that indicate possible risks. This includes identity clustering, using behavioral and personal characteristics to identify accounts that are, for example, controlled by a single individual. More

The post New infosec products of the week: May 19, 2023 appeared first on Help Net Security.

14:08

Anthropic's Claude AI Can Now Digest an Entire Book Like the Great Gatsby in Seconds SoylentNews

https://arstechnica.com/information-technology/2023/05/anthropics-claude-ai-can-now-digest-an-entire-book-like-the-great-gatsby-in-seconds/

On Thursday, AI company Anthropic announced it has given its ChatGPT-like Claude AI language model the ability to analyze an entire book's worth of material in under a minute. This new ability comes from expanding Claude's context window to 100,000 tokens, or about 75,000 words.

Like OpenAI's GPT-4, Claude is a large language model (LLM) that works by predicting the next token in a sequence when given a certain input. Tokens are fragments of words used to simplify AI data processing, and a "context window" is similar to short-term memoryhow much human-provided input data an LLM can process at once.
[...]
While it may not sound impressive to pick out changes in a text (Microsoft Word can do that, but only if it has two documents to compare), consider that after feeding Claude the text of The Great Gatsby, the AI model can then interactively answer questions about it or analyze its meaning. 100,000 tokens is a big upgrade for LLMs. By comparison, OpenAI's GPT-4 LLM boasts context window lengths of 4,096 tokens (about 3,000 words) when used as part of ChatGPT and 8,192 or 32,768 tokens via the GPT-4 API (which is currently only available via waitlist).
[...]
Notably, Anthropic received a $300 million investment from Google in late 2022, with Google acquiring a 10 percent stake in the firm.

Anthropic says that 100K context windows are available now for users of the Claude API, which is currently restricted by a waitlist.


Original Submission

Read more of this story at SoylentNews.

14:00

Exploring the tactics of phishing and scam websites in 2023 Help Net Security

Phishing scams pose an escalating danger as cybercriminals employ increasingly sophisticated techniques, rendering their detection and prevention more challenging. In this Help Net Security video, Abhilash Garimella, Head of Research at Bolster, talks about the evolution of phishing and scam websites in 2023.

The post Exploring the tactics of phishing and scam websites in 2023 appeared first on Help Net Security.

13:43

WebKit Under Attack: Apple Issues Emergency Patches for 3 New Zero-Day Vulnerabilities The Hacker News

Apple on Thursday rolled out security updates to iOS, iPadOS, macOS, tvOS, watchOS, and the Safari web browser to address three new zero-day flaws that it said are being actively exploited in the wild. The three security shortcomings are listed below - CVE-2023-32409 - A WebKit flaw that could be exploited by a malicious actor to break out of the Web Content sandbox. It was addressed with

13:30

Inadequate tools leave AppSec fighting an uphill battle for cloud security Help Net Security

AppSec teams are stuck in a catch-up cycle, unable to keep up with the increasingly rapid, agile dev pace, and playing security defense via an endless and unproductive vulnerability chase, according to Backslash Security. Costly defensive tax Notably, 58% of respondents report spending over 50% of their time chasing vulnerabilities, with a shocking 89% spending at least 25% of their time in this defensive mode. Far and wide, enterprises are victims of this costly defensive More

The post Inadequate tools leave AppSec fighting an uphill battle for cloud security appeared first on Help Net Security.

13:00

Europe: The DDoS battlefield Help Net Security

DDoS attacks appear to reflect major geo-political challenges and social tensions and have become an increasingly significant part in the hybrid warfare arsenal, according to Arelion. As the Ukrainian authorities sought a safe harbour for digital state registries and databases, Arelion saw the distribution of attacks move away from active conflict areas into global cloud centres both as a result of damage to local network infrastructure, but also as local databases and applications were More

The post Europe: The DDoS battlefield appeared first on Help Net Security.

12:00

An Entire RISC-V Operating System in 2000 Lines Hackaday

While Microsoft and Apple dont release the source code for their operating systems, a good estimate is that it takes around 50 million lines of code to run these software behemoths. The Linux kernel alone holds around 30 million lines, with systemd containing over one million lines on its own, which doesnt include estimates for the desktop environment or other parts of a standard installation. But millions of lines of code, or even hundreds of thousands, arent necessary for building a fully functioning operating system. This one sets up a complete OS in exactly 2000 lines of code.

Called egos-2000, short for Earth and Grass Operating System, the diminutive operating system is written for RISC-V computers and while it does contain most of the tools we would recognize in an OS, it was built specifically for computer science students by PhD candidate Yunhao Zhang. The slimmed-down operating system makes it possible for students to easily read and understand every feature of an operating system without it becoming too overwhelming, and can be easily used and modified to experiment with. The name itself comes from its design principles, where parts of the operating system that interact with hard...

11:23

Webb telescope spots signs of universes biggest stars Lifeboat News: The Blog

The James Webb Space Telescope has helped astronomers detect the first chemical signs of supermassive stars, celestial monsters blazing with the brightness of millions of Suns in the early universe.

So far, the largest stars observed anywhere have a mass of around 300 times that of our Sun.

But the supermassive star described in a new study has an estimated mass of 5,000 to 10,000 Suns.

11:23

SpaceX rolls next Starship prototype out to pad for engine test (photo) Lifeboat News: The Blog

SpaceX rolled the Ship 25 Starship upper-stage prototype out to the launch pad early Thursday morning (May 18) to test-fire its six Raptor engines.

11:23

How Chronic Illness Patients Are Hacking Their Wearables Lifeboat News: The Blog

Fitbits and Apple Watches werent designed for people with atypical health conditions. But the tech can be extremely usefulwith some creativity.

11:22

40 Hz vibrations reduce Alzheimers pathology, symptoms in mouse models Lifeboat News: The Blog

Evidence that non-invasive sensory stimulation of 40 Hz gamma frequency brain rhythms can reduce Alzheimers disease pathology and symptoms, already shown with light and sound by multiple research groups in mice and humans, now extends to tactile stimulation. A new study by MIT scientists shows that Alzheimers model mice exposed to 40 Hz vibration an hour a day for several weeks showed improved brain health and motor function compared to untreated controls.

The MIT group is not the first to show that gamma frequency can affect and improve , but they are the first to show that the can also reduce levels of the hallmark Alzheimers protein phosphorylated tau, keep neurons from dying or losing their synapse circuit connections, and reduce neural DNA damage.

This work demonstrates a third sensory modality that we can use to increase gamma power in the brain, said Li-Huei Tsai, corresponding author of the study, director of The Picower Institute for Learning and Memory and the Aging Brain Initiative at MIT, and Picower Professor in the Department of Brain and Cognitive Sciences (BCS).

11:22

How to repair a damaged heart: Key mechanism behind heart regeneration in zebrafish revealed Lifeboat News: The Blog

Cardiovascular diseases, such as heart attacks, are a leading cause of death worldwide resulting from a limited self-healing power of the heart. Unlike humans, zebrafish have the remarkable capacity to recover from cardiac damage. Researchers from the group of Jeroen Bakkers (Hubrecht Institute) have used the zebrafish to shed light on their regenerative success. They discovered a new mechanism that functions as a switch to push the heart muscle cells to mature in the regeneration process. Importantly, this mechanism was evolutionary conserved as it had a very similar effect on mouse and human heart muscle cells.

The results of the study, published in Science on May 18, show that examining the natural regeneration process in and applying these discoveries to human heart muscle cells could contribute to the development of new therapies against cardiovascular diseases.

It is estimated that 18 million people die from cardiovascular diseases every year. Many of these deaths are related to heart attacks. In such an event, a blood clot prevents the supply of nutrients and oxygen to parts of the heart. As a result, the heart muscle cells in the obstructed part of the heart die, which eventually leads to . Although therapies exist that manage the symptoms, there is no treatment that is able to replace the lost tissue with functional, mature heart muscle cells and thereby cure the patients.

11:22

Bill Gates Opposes Elon Musks Call to Pause New A.I. Research SoylentNews

Microsoft cofounder Bill Gates says he's "scared" about artificial intelligence falling into the wrong hands, but unlike some fellow experts who have called for a pause on advanced A.I. development, he argues that the technology may already be on a runaway train:

The latest advancements in A.I. are revolutionary, Gates said in an interview with ABC published Monday, but the technology comes with many uncertainties. U.S. regulators are failing to stay up to speed, he said, and with research into human-level artificial intelligence advancing fast, over 1,000 technologists and computer scientists including Twitter and Tesla CEO Elon Musk signed an open letter in March calling for a six-month pause on advanced A.I. development until "robust A.I. governance systems" are in place.

But for Gates, A.I. isn't the type of technology you can just hit the pause button on.

"If you just pause the good guys and you don't pause everyone else, you're probably hurting yourself," he told ABC, adding that it is critical for the "good guys" to develop more powerful A.I. systems.

[...] "We're all scared that a bad guy could grab it. Let's say the bad guys get ahead of the good guys, then something like cyber attacks could be driven by an A.I.," Gates said.

The competitive nature of A.I. development means that a moratorium on new research is unlikely to succeed, he argued.

Originally spotted on The Eponymous Pickle.

Previously: Fearing "Loss of Control," AI Critics Call for 6-Month Pause in AI Development

Related: AI Weapons Among Non-State Actors May be Impossible to Stop


Original Submission

Read more of this story at SoylentNews.

10:40

Protecting the Rich From Poor Peoples Crimes, Not Poor People From Rich Peoples Crimes schestowitz.com

Video download link | md5sum 0f02dc3bfb57e85b11051d8d4f2e571d
Serve and Protect Kings?
Creative Commons Attribution-No Derivative Works 4.0

Summary: The response from the police (or lack thereof) is a testament or a sign of a defunct system, wherein committing crimes against the vulnerable might be OK; cops dont prioritise such cases

TODAY, Thursday, is two days before the self-imposed soft deadline of British police. Less than 30 hours from now theyre supposed to have already looked into the report of crimes by Sirius Open Source. The evidence is extensive, the language used is polite, and all the correct procedures were followed when the report got filed.

So whats taking so long?

So far Ive received no letter, no phonecall, and no E-mail. Imagine being in a situation where enforcement is so urgent that its a life-or-death situation. In this case, the matter is urgent as soon there will be no company left to enforce against.

The video above goes through this latest part in a series. If theres a point to be made here, its that the police is unfit for purpose when it comes to white-collar crimes. When it comes to fraud, Action Fraud exists to protect the rich and powerful people from the hackers and scammers, but it wont protect ordinary citizens from rich and powerful corporations.

On Friday I intend to phone them asking for updates. But I wont get my hopes too high, based on past experiences. The likely outcome is, they will say they still sit on it and need more time. Remember that these people are receiving their salaries from taxpayers. Who are they protecting? The rich tax evaders, who arent even contributing much to the budget of the police?

10:36

Britains Most Respected and Best Established Open Source Business, According to Sirius (With Many Government Clients in Its Past), Protected From Prosecution? Techrights

Video download link | md5sum 0f02dc3bfb57e85b11051d8d4f2e571d
Serve and Protect Kings?
Creative Commons Attribution-No Derivative Works 4.0

Summary: The response from the police (or lack thereof) is a testament or a sign of a defunct system, wherein committing crimes against the vulnerable might be OK; cops dont prioritise such cases

TODAY, Thursday, is two days before the self-imposed soft deadline of British police. Less than 30 hours from now theyre supposed to have already looked into the report of crimes by Sirius Open Source. The evidence is extensive, the language used is polite, and all the correct procedures were followed when the report got filed.

So whats taking so long?

So far Ive received no letter, no phonecall, and no E-mail. Imagine being in a situation where enforcement is so urgent that its a life-or-death situation. In this case, the matter is urgent as soon there will be no company left to enforce against.

Who are they protecting? The rich tax evaders, who arent even contributing much to the budget of the police?The video above goes through this latest part in a series. If theres a point to be made here, its that the police is unfit for purpose when it comes to white-collar crimes. When it comes to fraud, Action Fraud exists to protect the rich and powerful people from the hackers and scammers, but it wont protec...

10:26

10:08

Gemini Links 18/05/2023: Distributed Sites Over Git Techrights

  • Gemini* and Gopher

    • Personal

      • TV Showcase: Blakes 7

        In 1977 came Star Wars, the movie. In the UK, the BBC created a television show in response: Blakes 7.

        Imagine what would happen if you took the basic theme of Star Warsan extremely successful evil galactic empire, and the rebels fighing itand rewrote it as a serial with one rule: be realistic.

        If there is an extremely succesful evil galactic empire, then it holds all the cards; and the ones fighting it are eternally desperate and probably not too happy most of the time. Losses are frequent; victories are rare and probably insignificant.

      • SpellBinding: ACGINPU Wordo: SODAS
    • Technical

      • Revisiting Vapad

        Vapad is a little text editor that I started a year ago (or thereabouts) just in order to try out programming in Vala. Its intentionally a pretty simple little editor, but exposes a lot of the underlying functionality that you get for free just by including GtkSourceView such as syntax highlighting, smart indentation, and even vi mode. Being a Gtk+ app its most useful on Linux or BSD.

      • Threat Axis

        Sometimes one might see worries about the Intel Management Engine (or the AMD equivalent) which if exploited would give an attacker a flawless victory, sub-zero wins! Given various CVE and TLA some of these fears may have merit. However, these same ME-fearing folks may fire up a heavyweight champion web browser without thought, even though that browser has much higher odds of having multiple exploits, and is much more likely to access such exploits from the cornucopia of content in a modern web request. Get over here, geese, its horn o plenty time!

      • smolver development log, part 10 CGI

        Th...

10:05

The Nucleate Italy Longevity Conference will be held May 24th in cyberspace and in Italy. Lifeboat News

The Nucleate Italy Longevity Conference will be held May 24th in cyberspace and in Italy. Tickets are free!

Our Guido Putignano and Marco Quarta will be speaking.

10:00

HPR3860: Civilization II Hacker Public Radio

This game is not quite as old, and it did make some changes. But the same "One-more-turn" addictiveness is still there. I can't tell you many times I started a game, and the next thing I knew the Sun was coming up outside my window. I'm too old to do that any more, but if I start another game of Civ II I will be right back in it. Links: https://playclassic.games/?s=Civilization+II https://www.myabandonware.com/browse/name/C/page/38/ https://www.youtube.com/watch?v=sHfk5VhAvWU http://www.replacementdocs.com/download.php?view.365 https://sleague.civfanatics.com/index.php?title=Main_Page https://www.mobygames.com/game/windows/civilization-ii-test-of-time https://www.youtube.com/watch?v=Ysk4o1zKsuE&amp;t=5s https://www.youtube.com/watch?v=9XokQ-VDd88 https://www.youtube.com/watch?v=owt0CR9YHiA&amp;t https://www.youtube.com/watch?v=pbGJrUTBHAY https://www.youtube.com/watch?v=yKs9Mtu_Fn4 https://www.palain.com/gaming/civilization-ii/

09:33

Apple fixed three new actively exploited zero-day vulnerabilities Security Affairs

Apple released security updates to address three zero-day vulnerabilities in iPhones, Macs, and iPads that are actively exploited in attacks.

Apple has addressed three new zero-day vulnerabilities that are actively exploited in attacks in the wild to hack into iPhones, Macs, and iPads.

The three vulnerabilities, tracked as CVE-2023-32409, CVE-2023-28204, and CVE-2023-32373, reside in the WebKit browser engine. Below are the details of the three issues:

  • CVE-2023-32409 A remote attacker may be able to break out of Web Content sandbox. Apple is aware of a report that this issue may have been actively exploited. The flaw was reported by Clment Lecigne of Googles Threat Analysis Group and Donncha Cearbhaill of Amnesty Internationals Security Lab. Despite Apple did not provide details about the attacks, the three issues were likely exploited in attacks conducted by nation-state actors or by surveillance firms.
  • CVE-2023-28204 Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited. The flaw was reported by an anonymous researcher.
  • CVE-2023-32373 Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. The flaw was reported by an anonymous researcher.

Apple is aware of a report that this issue may have been actively exploited, reads the advisory [1, 2] published by the tech giant.

The company released iOS and iPadOS 16.5, tvOS 16.5, watchOS 9.5, Safari 16.5, and macOS Ventura 13.4 to address the issues.

Apple initially addressed both CVE-2023-28204 and CVE-2023-32373 with the Rapid Security Response (RSR) patches for iOS 16.4.1 and macOS 13.3.1 on May 1.

Since the beginning of 2023, the company addressed a total of six zero-day vulnerabilities exploited in attacks in the wild.

In February, the company released emergency security updates to address an actively exploited zero-day vulnerability, tracked as CVE-2023-23529, that impacts iOS, iPadOS, and macOS. The flaw is a type confusion issue in WebKit that was addressed by the IT giant with improved checks.

An attacker can achieve arbitrary code execution by tricking the victims into visiting maliciously crafted we...

09:05

World Wide Web Crushed and We Know Whose Fault That Might be Techrights

Video download link | md5sum fbe64d6ddc2a72ccf4301192fbe00152
Web Demise and Effect on People
Creative Commons Attribution-No Derivative Works 4.0

Summary: With sites shutting down, media companies going bankrupt, and more sites dabbling in webspam/chatbots we cannot be optimistic about the future of the Web

THE World Wide Web (WWW) is rotting; in 3 posts yesterday [1, 2, 3] we provided examples of the Web turning into trash. In two of these we focused on Linux sites. Its not easy to find legitimate articles anymore. The problem of re-posted (under a current date) old posts aside, we see lots of fake articles and sometimes barely articles at all. Some sites became webspam and others went offline, creating another issue (link rot and Web rot). The Web is actually shrinking over time and the golden era of the Web is well past us.

Recently we focused a bit on IBM, the subject which is discussed in the video above. After kicking out Fedora volunteers (slaves) IBM now fires Fedora staff from Red Hat. This is sabotage. We saw several names of people who lost their job at Red Hat, but one name that got more exposure was Ben Cotton, who incidentally decided that signing a defamatory attack letter (calling on the FSF to oust its founder, RMS) would be a good idea. Seems like joining the anti-RMS brigade did not safeguard his job at IBM, but thats another story.

...

09:00

LTE Sniffer Ferrets Out Cellular Communications Hackaday

LTE networks have taken over from older technologies like GSM in much of the world. Outfitted with the right hardware, like a software defined radio, and the right software, its theoretically possible to sniff some of this data for yourself. The LTESniffer project was built to do just this. 

LTESniffer is able to sniff downlink traffic from base stations using a USRP B210 SDR, outfitted with two antennas. If you want to sniff uplink traffic, though, youll need to upgrade to an X310 with two daughterboards fitted. This is due to the timing vagaries of LTE communication. Other solutions can work however, particularly if you just care about downlink traffic.

If youve got that hardware though, youre ready to go. The software will help pull out LTE signals from the air, though it bears noting that its only designed to work with unencrypted traffic. It wont help you capture the encrypted communications of network users, though it can show you various information like IMSI numbers of devices on the network. Local regulations may prevent you legally even doing this, and if so, the project readme recommends setting up your own LTE network to experiment with instead.

Cellular sniffing has always been somewhat obscure and arcane, given the difficulty and encryption involved, to say nothing of the legal implications. Regardless, some hackers will always pursue a greater knowledge of the technolog...

09:00

A case study of QEMU and AddressSanitizer Linux.com

An example of how to use AddressSanitize

Click to Read More at Oracle Linux Kernel Development

The post A case study of QEMU and AddressSanitizer appeared first on Linux.com.

08:57

08:34

Hammerhead Sharks Found to Hold Their Breath on Deep Water Hunts to Stay Warm SoylentNews

Hammerhead sharks found to hold their breath on deep water hunts to stay warm:

Scalloped hammerhead sharks hold their breath to keep their bodies warm during deep dives into cold water where they hunt prey such as deep sea squids. This discovery, published in Science by University of Hawai'i at Mnoa researchers, provides important new insights into the physiology and ecology of a species that serves as an important link between the deep and shallow water habitats.

"This was a complete surprise," said Mark Royer, lead author and researcher with the Shark Research Group at the Hawai'i Institute of Marine Biology (HIMB) in the UH Mnoa School of Ocean and Earth Science and Technology. "It was unexpected for sharks to hold their breath to hunt like a diving marine mammal. It is an extraordinary behavior from an incredible animal."

Shark gills are natural radiators that would rapidly cool the blood, muscles, and organs if scalloped hammerhead sharks did not close their gill slits during deep dives into cold water. These sharks are warm water animals but feed at depths where seawater temperatures are similar to those found in Kodiak Alaska (around 5C/ 40F), yet they need to keep their bodies warm in order to hunt effectively.

"Although it is obvious that air-breathing marine mammals hold their breath while diving, we did not expect to see sharks exhibiting similar behavior," said Royer. "This previously unobserved behavior reveals that scalloped hammerhead sharks have feeding strategies that are broadly similar to those of some marine mammals, like pilot whales. Both have evolved to exploit deep dwelling prey and do so by holding their breath to access these physically challenging environments for short periods."

Read more of this story at SoylentNews.

08:04

Bug Bounty Programs May Sound Great, But Aren't Always Handled Well Phoronix

Bug bounty programs setup by large corporations to reward and recognize security researchers for properly reporting new bugs and security vulnerabilities is a great concept, but in practice isn't always handled well. Security researcher Adam Zabrocki recently shared the troubles he encountered in the bug bounty handling at Google for Chrome OS and in turn for Intel with it having been an i915 Linux kernel graphics driver vulnerability...

07:22

Read "Eponymous Plot Device: A Collection of Short Science Fiction Stories" by our Jeremy Lichtman. Lifeboat News

Read "Eponymous Plot Device: A Collection of Short Science free from May 21 to May 25!

06:20

[$] The intersection of lazy RCU and memory reclaim LWN.net

Joel Fernandes introduced himself to the memory-management track at the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit as a co-maintainer of the read-copy-update (RCU) subsystem and an implementer of the "lazy RCU" functionality. Lazy RCU can improve performance, especially on systems that are not heavily utilized, but it also has some implications for memory management that he wanted to discuss with the group.

06:17

KeePass 2.X Master Password Dumper allows retrieving the KeePass master password Security Affairs

A researcher published a PoC tool to retrieve the master password from KeePass by exploiting the CVE-2023-32784 vulnerability.

Security researcher Vdohney released a PoC tool called KeePass 2.X Master Password Dumper that allows retrieving the master password for KeePass.

The tool exploits the unpatched KeePass vulnerability, tracked CVE-2023-32784, to retrieve the master password from the memory of KeePass 2.x versions.

In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. reads the description for this vulnerability. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.

KeePass is a free and open-source software used to securely manage passwords. It functions as a digital safe where users can store and organize their sensitive information, including passwords, credit card numbers, notes, and other sensitive information. KeePass encrypts the data using a master key or master password that you need to provide in order to access the stored information.

The vulnerability should be fixed in KeePass 2.54, which is planned to be released at the beginning of June 2023.

The problem stems from the use of a custom-developed text box (SecureTextBoxEx) for password entry in the KeePass 2.X. This text box is not only used for the master password entry, but in other places in KeePass as well, like password edit boxes allowing an attacker to use it to recover their contents.

For every character typed, a leftover string is created in memory.

Because of how .NET works, it is nearly impossible to get rid of it once it gets created. For example, when Password is typed, it will result in these leftover strings: a, s, s, w, o, r, d. The POC application searches the dump for these patterns and offers a likely password character for each position in the password. reads the post published by the Vdohney.

The success of the attack depends on how the password was typed and how many passwords were typed per session. The expert explained that even if there are multiple passwords per...

06:00

Toothbrush Speed Controller Secrets Revealed Hackaday

Typically, when we want to build something with a DC motor, we might grab a bunch of AAs, or a single lithium cell at the very least. Electric toothbrushes often run on more humble power sources, like a single NiMH battery. Theyre designed to get useful motion out of just 1.2V, and [Marian Hryntsiv] has taken a look at what makes them tick.

The article focuses on an electric toothbrush built around the Low Voltage GreenPAK SLG47513 chip. Its designed to work at voltages from just 1 to 1.65 V. To make the most of the limited power available, the toothbrush stays in sleep mode most of the time when its not working in oral health.

[Marian] steps through the various parts of the circuit, and also explains the unique functionality baked into the...

05:48

New Animal Family Tree Raises Questions About the Origin of Nervous Systems SoylentNews

Sponges are more closely related to us than some animals with a nervous system:

A recent study challenges the idea that evolution always leads to increased complexity in animals. By analyzing gene arrangements on chromosomes, researchers sought to understand the evolutionary relationships between species.

The study found that sponges, which lack muscles and a nervous system, are more closely related to humans than comb jellies, which possess both traits. This contradicts the assumption that complexity determines evolutionary proximity. The research suggests two potential explanations: either sponges and other simple animals lost nerves and muscles over time, simplifying their body plans, or nerves and muscles evolved independently in different lineages.

Further investigation, such as studying the nerve and muscle cells of comb jellies in a lab, is needed to differentiate between these possibilities. The study underscores the complexity of animal evolution and challenges existing notions of evolutionary relationships based on traits and complexity.

Journal Reference:
Schultz, Darrin T., Haddock, Steven H. D., Bredeson, Jessen V., et al. Ancient gene linkages support ctenophores as sister to other animals [open], Nature (DOI: 10.1038/s41586-023-05936-6)

Original Submission


Original Submission

Read more of this story at SoylentNews.

05:08

04:47

ACE Coalition Splits AtomoHD as Spains Piracy Pain Persists TorrentFreak

ace logoJust three short months ago, Spanish pirate site users were still coming to terms with bad news.

Private torrent sites Pixelados/HD-Spain were fan favorites in Spain, with localized HD movies and TV shows in plentiful supply. Then suddenly, they were gone.

It was later revealed that pressure applied by the Alliance for Creativity and Entertainment, which included a credible threat of legal action, persuaded the sites operator to throw in the towel. Its a story thats played out many times in recent years and led to the closure of hundreds of sites.

ACE revealed another blow for Spanish pirates earlier today.

AtomoHD Splits Under ACE Pressure

AtomoHD (Atom HD in English) appeared as a newcomer in 2020 but in less than three years, ACE says the platform received 235 million visits, averaging 9.7 million visits per month. Less than 10% of the sites visitors were located outside Spain so its recent disappearance will be felt most acutely in the local market. The sites operators reportedly live elsewhere.

AtomoHD was launched in 2020 by a group of individuals, some of whom had prior convictions in Spain for intellectual property infringement and to evade justice, fled to Andorra, ACE reports.

AtomoHD enabled users to illegally stream and download content from a VOD library of more than 13,000 movies and 4,500 TV series in Spanish and other languages. The pirated content impacts all ACE members.

Precise Terms of Shutdown Unclear

For the governing board members of ACE, currently Amazon, Apple TV+, NBCUniversal, Netflix, Sony, Paramount, Disney, and Warner Bros, the shutdown of AtomoHD represents another success, one shared with the 50+ companies that make up the coalitions general membership.

This takedown represents yet another major victory by ACE over illegal content distributors, says Jan van Voorn, Executive Vice President and Global Content Protection Chief of the Motion Picture Association and Head of ACE. It is increasingly clear that major criminal operators like AtomoHD are not immune from ACEs enforcement actions.

The precise terms of the AtomoHD shutdown are unknown but domain transfers are definitely involved. ACE says the platform has around 60 domains and as far as we can tell, the following domains are already under new ownership:

atomohd.nl, atomohd.care, atomixhq....

03:36

03:30

Passage by 1Password brings passkeys to any website Help Net Security

1Password has launched Passage by 1Password a standalone authentication solution that enables businesses to implement passkeys for apps and websites. Passage by 1Password allows businesses to eliminate the hassle of passwords and reduce cart abandonment without building their own authentication infrastructure. With Passage by 1Password, the company is expanding beyond credential management and into customer identity access management (CIAM). For passkeys to become the de facto industry standard, businesses need to be able to More

The post Passage by 1Password brings passkeys to any website appeared first on Help Net Security.

03:13

Satellite Signal Jamming Reaches New Lows IEEE Spectrum





Russias invasion of Ukraine in 2022 put Ukrainian communications in a literal jam: Just before the invasion, Russian hackers knocked out Viasat satellite ground receivers across Europe. Then entrepreneur Elon Musk swept in to offer access to Starlink, SpaceXs growing network of low Earth orbit (LEO) communications satellites. Musk soon reported that Starlink was suffering from jamming attacks and software countermeasures.

In March, the U.S. Department of Defense (DOD) concluded that Russia was still trying to jam Starlink, according to documents leaked by U.S. National Guard airman Ryan Teixeira and seen by the Washington Post. Ukrainian troops have likewise blamed problems with Starlink on Russian jamming, the website Defense One reports. If Russia is jamming a LEO constellation, it would be a new layer in the silent war in space-ground communications.

There is really not a lot of information out there on this, says Brian Weeden, the director of program planning for the Secure World Foundation, a nongovernmental organization that studies space governance. But, Weeden adds, my sense is that its much harder to jam or interfere with Starlink [than with GPS satellites].

LEO Satellites Face New Security Risks

Regardless of their altitude or size, communications satellites transmit more power and therefore require more power to jam than navigational satellites. However, compared with large geostationary satellites, LEO satelliteswhich orbit Earth at an altitude of 2,000 kilometers or lowerhave frequent handovers that introduce delays and opens up more surface for interference, says Mark Manulis, a professor of privacy and applied cryptography at the University of the Federal Armed Forces...

03:03

EU Commission Asks EU Council Lawyers If Compelled Client-Side Scanning is Legal, Gets Told It Isnt SoylentNews

EU Commission Asks EU Council Lawyers If Compelled Client-Side Scanning Is Legal, Gets Told It Isn't:

Lots of ideas have been floated by legislators and others in hopes of limiting the distribution of child sexual abuse material (CSAM). Very few of these ideas have been good. Most have assumed that the problem is so horrendous any efforts are justified. The problem here is that governments need to actually justify mandated mass privacy invasions, which is something that they almost always can't do.

It's even a fraught issue in the private sector. Apple briefly proposed engaging in client-side scanning of users' devices to detect CSAM and prevent its distribution. This effort was put on hold when pretty much everyone objected to Apple's proposal, stating the obvious problems it would create a list that included undermining the security and privacy protections Apple has long used as evidence of its superiority over competing products and their manufacturers.

Not that legislators appear to care. The EU Commission continues to move forward with "for the children" client-side scanning mandate, despite the multitude of problems this mandate would create. Last year, the proposal was ripped to shreds by the EU Data Protection Board and its supervisor in a report that explained the mandate would result in plenty of privacy invasion and data privacy law violations that simply could not be excused by the Commission's desire to limit the spread of CSAM.

[...] So, the proposal continues to move forward, ignoring pretty much every rational person's objections and the German government's flat-out refusal to enforce this mandate should it actually become law.

The Commission has ignored pretty much everyone while pushing this massive privacy/security threat past the legislative goal line. But it may not be able to ignore the...

03:00

ExtraHop protects organizations from accidental misuse of AI tools Help Net Security

ExtraHop released a new capability that offers organizations visibility into employees use of AI as a Service (AIaaS) and generative AI tools, like OpenAI ChatGPT. Organizations can now benefit from a better understanding of their risk exposure and whether or not these tools are being used in adherence with AI policies. As generative AI and AIaaS are increasingly adopted within enterprise settings, C-level executives are concerned that proprietary data and other sensitive information are being More

The post ExtraHop protects organizations from accidental misuse of AI tools appeared first on Help Net Security.

02:49

Target Expects to Lose $1 Billion Due to Shrink This Year cryptogon.com

Via: CNBC: Target said Wednesday that organized retail crime will fuel $500 million more in stolen and lost merchandise this year compared with a year ago. Targets inventory loss, called shrink, totaled about $763 million last fiscal year, based on calculations from the companys financial filings. With the anticipated increase, shrink this year would surpass []

02:45

Concentric AI unveils deep-learning driven detection capabilities Help Net Security

Concentric AI announced a deep-learning driven detection capabilities to find any type of hardcoded secrets and key credentials (e.g. API keys, encryption keys, tokens, passwords, etc.) in todays most popular enterprise on-premise and cloud data repositories, as well as email and messaging applications. As a result, these updates to Concentric AIs Semantic Intelligence DSPM solution enable security teams to address risks to sensitive data by deleting this information and reducing the threat of malware attacks More

The post Concentric AI unveils deep-learning driven detection capabilities appeared first on Help Net Security.

02:41

Why Californias Suburb Could Disappear in a Couple of Decades cryptogon.com

In short, the state is drastically restricting building homes on land outside of areas that are already built up. They want to pack more people into existing neighborhoods. Via: California Insider: Related: Leaving California The Untold Story

02:32

OpenAI Will Join Forces with Microsoft and Google on Artificial Intelligence cryptogon.com

What, precisely, does, Join forces, mean? Its not explained in the article. Via: CNBC: OpenAI CEO Sam Altman will join forces with key leadership from firms like Microsoft and Google this week as a secretive meeting of the business and political elite kickstarts in Lisbon, Portugal. Artificial intelligence will top the agenda as the ChatGPT []

02:30

Komprise automates data governance for IT Help Net Security

Komprise has released new governance and self-service capabilities that simplify departmental use of Deep Analytics, a query-based way to find and tag file and object data across hybrid cloud storage silos. IT organizations need to maintain data governance and data security while also making it easier for users to find, use and manage data. Often, these goals are in conflict and require significant IT overhead. The Komprise Intelligent Data Management Spring 2023 release minimizes administrative More

The post Komprise automates data governance for IT appeared first on Help Net Security.

02:30

This Cybercrime Syndicate Pre-Infected Over 8.9 Million Android Phones Worldwide The Hacker News

A cybercrime enterprise known as Lemon Group is leveraging millions of pre-infected Android smartphones worldwide to carry out their malicious operations, posing significant supply chain risks. "The infection turns these devices into mobile proxies, tools for stealing and selling SMS messages, social media and online messaging accounts and monetization via advertisements and click fraud,"

01:30

Badminton Inspired Heat Shield Aims to Fly This Year Hackaday

Badminton is not a sport that most of us think about often, and extremely rarely outside of every four years at the summer Olympics and maybe at the odd cookout or beach party here or there. But the fact that its a little bit unique made it the prime inspiration for this new heat shield design, which might see a space flight and test as early as a year from now.

The inspiration comes from the shuttlecock, the object which would otherwise be a ball in any other sport. A weighted head, usually rubber or cork, with a set of feathers or feather-like protrusions mounted to it, contributes to its unique flight characteristics when hit with a racquet. The heat shield, called Pridwen and built by Welsh company Space Forge, can be folded before launch and then expanded into this shuttlecock-like shape once ready for re-entry. Its unlikely this will protect astronauts anytime soon, though. The device is mostly intended for returning materials from the Moon or from asteroids, or for landing spacecrafts on celestial bodies with atmospheres like Mars or Venus.

With some testing done already, Space Forge hopes this heat shield will see a space flight before the close of 2023. Thats not the end of the Badminton inspi...

01:25

How To Minimize Ageism Through The Use Of AI Lifeboat News: The Blog

Dr. Sylvain Moreno is chief executive officer and scientific director of Circle Innovation.

Artificial intelligence (AI) holds great promise in the fight against ageism, and future technologies powered by AI can be a first step to ensure older adults are fully involved in the processes, systems and, ultimately, services that will affect them throughout the aging journey.

Healthcare providers, governments, academia, not-for-profits and businesses can ensure that AI is not only strengthening healthcare for older adults but also empowering them to meet their individual needs.

01:24

When Will Humanity Become a Stellar Civilization? | Unveiled Lifeboat News: The Blog

When will humans become Type II? Join us and find out more!

Subscribe: https://wmojo.com/unveiled-subscribe.

In this video, Unveiled takes a closer look at how (and when) humans will finally move up the Kardashev Scale! At present, humankind is only Type 0.7 on the ladder of advancement we have a long way to go! But how soon before we see things like Dyson Spheres and space travel to other planets? How soon before we become TYPE II?

This is Unveiled, giving you incredible answers to extraordinary questions!

Find more amazing videos for your curiosity here:
6 Scientific Breakthroughs Predicted During Your Lifetime https://youtu.be/wGKj-3AfxdE
What If Humanity Was a Kardashev Civilization? https://youtu.be/omScpI80PCo.

0:00 Intro.
1:03 Stellar (Type II) Civilization.
3:50 Timeline Predictions.
6:05 Are We Improving?
7:28 Dyson Spheres.
9:13 Further Considerations.
11:04 Conclusions.

01:23

[$] Page aging with hardware counters LWN.net

The memory-management subsystem has the unenviable task of trying to predict which pages of memory will be needed in the near future. Since predictions tend to be difficult, the code relies heavily on the heuristic that memory used in the recent past is likely to be used again in the near future. However, even knowing which memory has been recently used can be a challenge. At the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit, Aneesh Kumar and Wei Xu, both presenting remotely, discussed some ways to use the increasingly capable hardware counters that are provided by current and upcoming CPUs.

01:23

A Flash of Recognition in a Lonely Universe Lifeboat News: The Blog

Beyond our solar system, the universe is full of planetsbut also asteroids, auroras, and other familiar cosmic wonders.

01:22

SpaceX Reveals Starship Flight Test 2 Launch Timeline Lifeboat News: The Blog

SpaceX plans to be back up on its feet just two months after testing the Starship rocket for the first time.

01:22

James Webb telescope discovers ancient water world in nearby star system Lifeboat News: The Blog

The James Webb Space Telescope took its first close look at a mini-Neptune the most common type of planet beyond our solar system and found signs of water.

01:22

Our Universe Exists Inside Of A Black Hole Of Higher Dimensional Universe Lifeboat News: The Blog

This may sound like a science fiction scenario, but some physicists have proposed that this could be the case. In this article, we will explore the idea that our universe may be inside of a black hole, and what implications this would have for our understanding of cosmology and physics.

A black hole is a region of space where gravity is so strong that nothing can escape, not even light. According to Einsteins theory of general relativity, black holes are formed when massive stars collapse at the end of their life cycle. The resulting singularity is a point of infinite density and zero volume, where the laws of physics break down.

Scientists discover possible connection between human brain and cosmos on a quantum scale.

01:00

BeeKeeperAI releases EscrowAI to expedite the development and deployment of AI in healthcare Help Net Security

BeeKeeperAI has released EscrowAI, a zero trust collaboration platform. EscrowAI leverages Azure confidential computing to resolve the challenges of data sovereignty, privacy, and security. In healthcare, EscrowAI enables HIPAA-compliant research on full PHI without exposing the patient data, thereby reducing the AI development timeline due to streamlined collaboration agreements and access to more precise data. EscrowAI enables healthcare data stewards to fulfill their mission of scientific innovation while protecting patients sensitive health information. Data stewards, More

The post BeeKeeperAI releases EscrowAI to expedite the development and deployment of AI in healthcare appeared first on Help Net Security.

01:00

Ampere Computing Announces AmpereOne With Up to 192 Cores Per Socket Phoronix

Ampere Computing announced this morning that their AmpereOne family of processors have entered production and provided additional details on these in-house designed Arm server processors.

00:56

Admin of the darknet carding platform Skynet Market pleads guilty Security Affairs

A US national has pleaded guilty to operating the carding site Skynet Market and selling financial information belonging to tens of thousands of US victims.

The U.S. national Michael D. Mihalo, aka Dale Michael Mihalo Jr. and ggmccloud1, pleaded guilty to operating a carding site on the dark web called Skynet Market and selling financial information belonging to tens of thousands of victims in the US.

A carding site is an illegal marketplace where stolen credit card data and other personal info are offered for sale.

Mihalo and his co-conspirators also operated on other darknet marketplaces, including AlphaBay Market, Wall Street Market, and Hansa Market. The man and his co-conspirators sold the credit and debit card data of tens of thousands of U.S. victims between Feb. 22, 2016, and Oct. 1, 2019.

Mihalo earned at least $1 million worth of cryptocurrencies at the time of the sales, including Bitcoin, Ethereum, and Monero.

Mihalo is suspected to be the leader of a team that helped him sell this stolen financial information on the darknet. Each of the co-conspirators benefitted from the trusted reputation Mihalo, as ggmccloud1, had built on the darknet sites to sell more stolen card data. One of the mans conspirators, Taylor Ross Staats (40) of Texas, served as a card-checker. Staats personally earned at least $21,000 worth of Bitcoin for his activities.

Mihalo personally possessed, sent, and received the information associated with 49,084 stolen payment cards with the intent that the payment card information would be trafficked on darknet sites, all in furtherance of the conspiracy. reads the press release published by DoJ. Mihalo earned at least $1 million worth of cryptocurrencies at the time of the sales, including Bitcoin, Ethereum, and Monero. These funds have significantly appreciated since that time.

Mihalo pleaded guilty to one count of conspiracy to commit access device fraud, one count of access device fraud, and six counts of money laundering. The man faces a maximum penalty of five years in jail for the conspiracy count and a maximum penalty of 10 years in prison on each of the remaining counts. 

Mihalo must also forfeit to the government any property he has personally obtained through the il...

00:30

New Relic launches AWS Systems Manager Distributor integration Help Net Security

New Relic has announced an integration with AWS Systems Manager Distributor to provide a native experience to automatically deploy the New Relic monitoring infrastructure agent via the AWS Command Line Interface (CLI) and any AWS infrastructure-as-code (IaC) tooling to streamline observability across Amazon Web Services (AWS) environments. This streamlined experience allows engineers to perform a one-time setup that automatically instruments and updates their entire fleet with the latest New Relic infrastructure agent, even as resources More

The post New Relic launches AWS Systems Manager Distributor integration appeared first on Help Net Security.

00:30

sdl12-compat Gets More Games Working For This SDL1-On-SDL2 Compatibility Layer Phoronix

The sdl12-compat project that implements the SDL 1.2 API/ABI atop SDL 2.x interfaces for better game compatibility on modern Linux systems is out today with a new pre-release...

00:17

China's Phone Giant Oppo Disbands Chip Design Unit as Shipment Slumps SoylentNews

China's phone giant Oppo disbands chip design unit as shipment slumps:

Chinese smartphone giant Oppo is disbanding its young chip design unit Zeku as weak global demand forces major handset manufacturers to cut costs and restrategize.

The decision comes as a surprise to those who believe the phone maker is bolstering its in-house chip development as rising geopolitical tensions with the U.S. threatens to cut Chinese firms off key suppliers. In the foreseeable future, Oppo will have to revert back to relying on third-party chip partners.

[...] Oppo explained its decision to cut its once-promising chip team in a statement issued today: "Due to the uncertainties in the global economy and the smartphone industry, we have to make difficult adjustments for long-term development. Therefore, the company has decided to cease the operation of Zeku."

In December 2021, Zeku revealed its first self-developed chipset, MariSilicon X, a neural processing unit designed to boost photo and video performance through machine learning, following Apple's path to bring chip design in-house. Zeku also set up a research base in Palo Alto.

[...] Oppo's retreat from chips signals another struggle from Chinese phone companies to strengthen their control over the semiconductor supply chain. Huawei lost access to advanced chips from the U.S. due to Trump-era sanctions, and its attempt to design its own high-end chips through HiSilicon floundered after the U.S. cut it off major foundries. The company resorted to spinning out its budget handset brand Honor, a move seen as a way to help the subsidiary circumvent the sanctions that have decimated Huawei's consumer business.


Original Submission

Read more of this story at SoylentNews.

00:15

Teradata collaborates with FICO to help customers reduce fraud Help Net Security

Teradata and FICO announced they plan to bring to market integrated advanced analytic solutions for real-time payments fraud, insurance claims, and supply chain optimization. Bringing data, analytics and insights together in one environment streamlines the development of solutions for use cases across industries, speeding time-to-delivery and making them available for joint customers sooner. The resulting solutions are part of a new global relationship between the two companies, and are expected to deliver reduced costs, improved More

The post Teradata collaborates with FICO to help customers reduce fraud appeared first on Help Net Security.

00:08

[$] Sunsetting buffer heads LWN.net

The buffer head is a kernel data structure that dates back to the first Linux release; for much of the time since then, kernel developers have been hoping to get rid of it. Hannes Reinecke started a plenary session at the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit by saying that everybody agrees that buffer heads are a bad idea, but there is less agreement on how to take them out of the kernel. The core functionality they provide facilitating sector-size I/O operations to a block device underlying a filesystem must be provided somehow.

00:00

Kyndryl and SAP boost partnership to ease digital transformation Help Net Security

Kyndryl has expanded strategic partnership with SAP focused on developing new solutions to help customers solve their most complex digital business transformation challenges. Under their expanded collaboration, the companies have leveraged SAP Business Transformation Center and vast ERP systems know-how, along with Kyndryls deep expertise in data, application migration, and modernization services to chart an efficient and cost-effective path to the cloud for customers. Specifically, Kyndryl and SAP collaborated on a digital blueprint capability that More

The post Kyndryl and SAP boost partnership to ease digital transformation appeared first on Help Net Security.

00:00

Revisiting Folk Wisdom for Modern Chronic Wound Care Hackaday

In the constant pursuit of innovation, its easy to overlook the wisdom of the past. The scientific method and modern research techniques have brought us much innovation, which can often lead us to dismiss traditional cultural beliefs.

However, sometimes, there are still valuable kernels of truth in the folklore of yesteryear. This holds true in a medical study from Finland, which focused on the traditional use of spruce resin to treat chronic wounds, breathing new life into an age-old therapy.

A Persistent Dilemma

Chronic wounds are defined as wounds that fail to proceed through a normal, timely healing process. While theres no strictly defined timescale, wounds are typically deemed as chronic if they dont progress through healing milestones after four weeks to three months. These wounds pose a significant burden on global healthcare systems. They create a significant workload for healthcare personnel, and are costly and difficult to manage. Most of all, though, they impair the quality of life for patients, who suffer these wounds for great lengths of time.

Patients with chronic wounds often suffer from other chronic health conditions such as advanced age, malnutrition, or vascular diseases. These can complicate or exclude treatment options that would otherwise help with the issue. Treatment often becomes a delicate balance between m...

00:00

Security updates for Thursday LWN.net

Security updates have been issued by Debian (chromium and libapache2-mod-auth-openidc), Fedora (clevis-pin-tpm2, greetd, keyring-ima-signer, libkrun, mirrorlist-server, nispor, nmstate, qt5-qtbase, rust-afterburn, rust-below, rust-bodhi-cli, rust-cargo-c, rust-coreos-installer, rust-fedora-update-feedback, rust-git-delta, rust-gst-plugin-reqwest, rust-pore, rust-rpm-sequoia, rust-sequoia-octopus-librnp, rust-sequoia-policy-config, rust-sequoia-sq, rust-sevctl, rust-tealdeer, and rust-ybaas), Oracle (apr-util, curl, emacs, firefox, kernel, libreswan, mysql, nodejs and nodejs-nodemon, openssh, thunderbird, and webkit2gtk3), Red Hat (apr-util, emacs, firefox, git, jenkins and jenkins-2-plugins, kernel, kpatch-patch, and thunderbird), Scientific Linux (apr-util, firefox, and thunderbird), Slackware (curl), SUSE (cups-filters, curl, java-1_8_0-openjdk, kernel, mysql-connector-java, and ovmf), and Ubuntu (cups-filters, git, linux-gcp-4.15, linux-oracle, linux-raspi, node-minimatch, ruby2.3, ruby2.5, ruby2.7, and runc).

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Thursday, 18 May

23:22

Oldest living creature on Earth identified, emerging 700 million years ago Lifeboat News: The Blog

Scientists have announced that the oldest living creature on our planet is a jellyfish-like organism called a ctenophore. It evolved from the same primordial animals that humans did.

This fascinating creature first emerged 700 million years ago, a significant time before the dinosaurs, which appeared only 230 million years ago. The study found that ctenophores are the closest relatives of the first animals and can still be spotted in modern-day oceans and aquariums.

A team from the University of California, Berkeley embarked on a quest to decipher the relationships within the animal tree of life. They wanted to broaden our understanding of the origins and evolution of life on Earth.

23:22

Workplace AI: How artificial intelligence will transform the workday Lifeboat News: The Blog

Artificial intelligence has been around for years, but scarcely has it found itself in conversation as much as it has now. The launch of OpenAIs ChatGPT rocketed generative AI onto the radar of many people who hadnt been paying much attention or didnt feel it was relevant to their lives. This has included workers, whove already been touched by the technology, whether they know it or not.

The chatbot, which uses machine learning to respond to user prompts, is helping workers write cover letters and resumes, generate ideas and even art in the workplace and more. Its already making a splash in hiring with recruiters, who are finding they need to adapt to the new technology. And as competing companies rush to launch similar tools, the technology will only get stronger and more sophisticated.


The rise of generative AI in the workplace is inevitable. Theres a lot to be excited about it.

23:04

NVIDIA Announces The GeForce RTX 4060 Series Phoronix

NVIDIA today announced the GeForce RTX 4060 series consisting of the $399 RTX 4060 Ti 8GB while in July an RTX 4060 Ti 16GB version will come along with a $299 RTX 4060...

22:05

Zero Trust + Deception: Join This Webinar to Learn How to Outsmart Attackers! The Hacker News

Cybersecurity is constantly evolving, but complexity can give hostile actors an advantage. To stay ahead of current and future attacks, it's essential to simplify and reframe your defenses. Zscaler Deception is a state-of-the-art next-generation deception technology seamlessly integrated with the Zscaler Zero Trust Exchange. It creates a hostile environment for attackers and enables you to track

21:29

Google to Start Deleting Inactive Mail Accounts for Security Reasons SoylentNews

https://www.blog.google/technology/safety-security/updating-our-inactive-account-policies/

Google to start deleting inactive personal email accounts. If your personal email account with Google have been inactive for two years it will, or may, be deleted.

To reduce this risk, we are updating our inactivity policy for Google Accounts to 2 years across our products. Starting later this year, if a Google Account has not been used or signed into for at least 2 years, we may delete the account and its contents ...

Notice that they MAY delete the account and all the content. Weird that they say may instead of will. Will some of them be kept around anyway? Are they saving the content but deleting the account? Is it so the Google AI can have one long good snoop before it goes into dev/null?

I might have missed it but to delete accounts for security reasons, that seems to be the reason given, is by itself sort of a security issue. After all what stops someone from re-registering the names afterwards. Hope that whatever mail they had keeps on sending to the address. Or it can be used to recover account credentials with other services. Deleting in that regard seems bad if they do not also block re-registration of said emails for a very very long time. Most of them will be duds but if you automate the process you'll hit digital credentials gold eventually.

If nothing else for spamming and scamming. After all johnny5753@gmail.com is your personal friend so whatever he mailed you must be real ...


Original Submission

Read more of this story at SoylentNews.

21:23

Additively manufacturing soft robots could reduce waste, increase performance Lifeboat News: The Blog

Soft robotics have several key advantages over rigid counterparts, including their inherent safety featuressoft materials with motions powered by inflating and deflating air chambers can safely be used in fragile environments or in proximity with humansas well as their flexibility that enables them to fit into tight spaces. Textiles have become a choice material for constructing many types of soft robots, especially wearables, but the traditional cut and sew methods of manufacturing have left much to be desired.

Now, researchers at the Harvard John A. Paulson School of Engineering and Applied Sciences (SEAS) have established a new approach for additively manufacturing , using a 3D knitting method that can holistically print entire soft robots. Their work is reported in Advanced Functional Materials.

The soft robotics community is still in the phase of seeking alternative materials approaches that will enable us to go beyond more classical rigid robot shapes and functions, says Robert Wood, senior corresponding author on the paper, who is the Harry Lewis and Marlyn McGrath Professor of Engineering and Applied Sciences at SEAS.

21:23

Low-Carbon Concrete Could Bring a Radical Change to the Industry Lifeboat News: The Blog

Please make sure your browser supports JavaScript and cookies and that you are not blocking them from loading. For more information you can review our Terms of Service and Cookie Policy.

21:22

FBI, GCHQ Unite To Foil Russian Malware Hacking Tool HackRead | Latest Cybersecurity and Hacking News Site

By Owais Sultan

A joint advisory from the National Cyber Security Centre has detailed how the UK and its allies have cracked Snake, a Russian malware used by the FSB.

This is a post from HackRead.com Read the original post: FBI, GCHQ Unite To Foil Russian Malware Hacking Tool

21:00

Montana Bans TikTok LowEndBox

21:00

Aqua Security collaborates with ServiceNow to accelerate cloud native risk remediation Help Net Security

Aqua Security integrates with the ServiceNow to enable joint customers to identify vulnerabilities in running containers with the broadest coverage across operating systems and programming languages, and with the highest accuracy. Security and application teams can automate vulnerability triage, identify high-risk findings and prioritize follow up using ServiceNow filtering rules including application context. The integration supports automated ingestion, filtering and grouping through the ServiceNow Vulnerability Response application of Aquas vulnerability scan findings, helping security and More

The post Aqua Security collaborates with ServiceNow to accelerate cloud native risk remediation appeared first on Help Net Security.

21:00

Drone Flies For Five Hours With Hydrogen Fuel Cell Hackaday

Multirotor drones have become a regular part of daily life, serving as everything from camera platforms to inspection tools and weapons of war. The vast majority run on lithium rechargeable batteries, with corresponding limits on flight time. A company called Hylium hopes to change all that with a hydrogen-powered drone that can fly for up to five hours.

The drone uses a hydrogen fuel cell to provide electricity to run the drones motors and other electronic systems. Thanks to the energy density advantage of hydrogen versus lithium batteries, the flight time can be greatly extended compared t...

20:50

Guide to Choosing the Best Family Cell Phone Plan HackRead | Latest Cybersecurity and Hacking News Site

By Owais Sultan

In a world where staying connected is paramount, the need for a reliable and affordable family cell phone

This is a post from HackRead.com Read the original post: Guide to Choosing the Best Family Cell Phone Plan

20:42

How to Reduce Exposure on the Manufacturing Attack Surface The Hacker News

Digitalization initiatives are connecting once-isolated Operational Technology (OT) environments with their Information Technology (IT) counterparts. This digital transformation of the factory floor has accelerated the connection of machinery to digital systems and data. Computer systems for managing and monitoring digital systems and data have been added to the hardware and software used for

20:25

The Progress With KDE Plasma 6's KWin HDR Support Phoronix

Following last month's Red Hat hosted HDR hackfest that brought together many Linux desktop stakeholders from GPU driver developers to desktop environment developers, KDE developer Xaver Hugl has shared an update on the progress being made for high dynamic range (HDR) display support from the KWin side...

20:21

Action Fraud Reinforces the Narrative That Says Cops Are Apathetic Towards White-Collar Crimes schestowitz.com

King Charles Crown: Police? Whose police?

Summary: The crimes of Sirius Open Source crimes that had many victims dont seem to interest the police enough to act fast (we expected this all along); as its 28-day time window approaches we revisit the matter and discuss some more

ABOUT four weeks ago I contacted the police and filed a report about Sirius fraud. It was perfectly factual, with no gaps in knowledge left to fill (as I had received formal documentation from the original sources after months of ordeals, mostly trying hard to get them to admit the issue and write official letters). All the witnesses were ready to testify and answer additional questions.

Police is in no rush to act. Cops would be involved if someones life was at immediate risk, but thats about it. They drag their heels, just like pension providers do. Months ago I learn from a friend, a professor who worked here, that his female partner got punched in the face and despite the cops having CCTV footage of the incident and plate number (of the car in question) in other words everything needed to summon the perpetrator of assault and convict her the cops chose to do nothing, not even prosecute. See, here in Manchester it has become normal; if something gets damaged or stolen they typically just ask, do you have insurance? They dont want to get involved. They might open a case, give you a number, and then add it to the tally, eventually generating some detailed statistics for taxpayers while asking for implicit consent to close the case (without resolution).

They said they aimed to make progress within 28 days. Well, early this coming Saturday itll be 28 days, so I plan to call them tomorrow afternoon and ask about progress. And no, dont bother to put me down, Im not expecting much to happen. With my low expectations, not due to the crime not being severe enough but the police not being effective enough (from personal experience), I all along expected many delays, little action etc. I had already prepared actions to come after police inaction. There are 5 steps to come after that, but were keeping them close to our chest for now. By the end of this series we hope to make it crys...

20:15

Holding Criminals Accountable Part VI 26 Days Later and Still Inaction/No Action by the Police That Had Endless Resources for Coronation Ceremony Techrights

Series parts:

  1. Holding Criminals Accountable Part I Sirius Crimes Reported to British Authorities, Formally Registered With References (Many Victims), Heres What It Means and What Happens Next
  2. Holding Criminals Accountable Part II Still No Action From Action Fraud
  3. Holding Criminals Accountable Part III Why Police Action is the Only Option Now
  4. Holding Criminals Accountable Part IV British Prime Minister Launches Crackdown on Fraud, So Now Prove It
  5. Holding Criminals Accountable Part V 20 Days Later, UK Action Fraud Shows No Signs of Action
  6. YOU ARE HERE 26 Days Later and Still Inaction/No Action by the Police That Had Endless Resources for Coronation Ceremony

King Charles Crown: Police? Whose police?

Summary: The crimes of Sirius Open Source crimes that had many victims dont seem to interest the police enough to act fast (we expected this all along); as its 28-day time window approaches we revisit the matter and discuss some more

ABOUT four weeks ago I contacted the police and filed a report about Sirius fraud. It was perfectly factual, with no gaps in knowledge left to fill (as I had received formal documentation from the original sources after months of ordeals, mostly trying hard to get them to admit the issue and write official letters). All the witnesses were ready to testify and answer additional questions....

20:11

New Maintainer Steps Up For GCC Compiler's MIPS CPU Port Phoronix

With development of the MIPS architecture having officially ended two years ago in favor of focusing on RISC-V for future CPU designs and the overall decline of that CPU architecture, it's been years since the GNU Compiler Collection (GCC) has seen its MIPS code well maintained. However, now a capable developer has stepped up willing to serve as the GCC maintainer for MIPS...

19:54

AlmaLinux 8.8 Released For Those Relying On RHEL8 Phoronix

Earlier this month Red Hat released RHEL 9.2 and at the same time they also released RHEL 8.8 for those continuing to rely on the stable RHEL8 series. AlmaLinux managed to provide a same-day release of AlmaLinux 9.2 while now one week later they have also shipped AlmaLinux 8.8...

19:53

Critical fixed critical flaws in Cisco Small Business Switches Security Affairs

Cisco fixed nine flaws in its Small Business Series Switches that could be exploited to execute arbitrary code or cause a DoS condition.

Cisco has released security updates to address nine security vulnerabilities in the web-based user interface of certain Small Business Series Switches that could be exploited by an unauthenticated, remote attacker to execute arbitrary code with root privileges or trigger a denial-of-service (DoS) condition.

Multiple vulnerabilities in the web-based user interface of certain Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges on an affected device. reads the advisory published by Cisco. These vulnerabilities are due to improper validation of requests that are sent to the web interface.

There are no workarounds to address these vulnerabilities. These vulnerabilities impact the following Cisco Small Business Switches:

  • 250 Series Smart Switches
  • 350 Series Managed Switches
  • 350X Series Stackable Managed Switches
  • 550X Series Stackable Managed Switches
  • Business 250 Series Smart Switches
  • Business 350 Series Managed Switches
  • Small Business 200 Series Smart Switches
  • Small Business 300 Series Managed Switches
  • Small Business 500 Series Stackable Managed Switches

The IT giant confirmed that these vulnerabilities do not impact the following Cisco products:

  • 220 Series Smart Switches
  • Business 220 Series Smart Switches

The vulnerabilities are not dependent on one another, this means the exploitation of one of them is not required to exploit another flaw.

A brief description of each of the flaws is as follows

  • CVE-2023-20159 (CVSS score: 9.8): Small Business Series Switches Stack Buffer Overflow Vulnerability
  • CVE-2023-20160 (CVSS score: 9.8): Small Business Series Switches Unauthenticated BSS Buffer Overflow Vulnerability
  • CVE-2023-20161 (CVSS score: 9.8): Small Business Series Switches Unauthenticated Stack Buffer Overflow Vulnerability
  • CVE-2023-20189 (CVSS score: 9.8): Small Business Series Switches Unauthenticated Stack Buffer Overflow Vulnerability
  • CVE-2023-20024 (CVSS score: 8.6): Cisco Small Business Series Switches Unauthenticated Heap B...

19:53

Escalating China-Taiwan Tensions Fuel Alarming Surge in Cyber Attacks The Hacker News

The rising geopolitical tensions between China and Taiwan in recent months have sparked a noticeable uptick in cyber attacks on the East Asian island country. "From malicious emails and URLs to malware, the strain between China's claim of Taiwan as part of its territory and Taiwan's maintained independence has evolved into a worrying surge in attacks," the Trellix Advanced Research Center said

19:36

Cisco fixes critical flaws in Small Business Series Switches Help Net Security

Nine vulnerabilities 4 of them critical have been found in a variety of Cisco Small Business Series Switches. PoC exploit code is available (but not public), and there is no indication that they are being exploited in the wild. About the vulnerabilities The critical vulnerabilties (CVE-2023-20159, CVE-2023-20160, CVE-2023-20161, CVE-2023-20189) can be triggered via the switches web-based user interface, and may enable a remote attacker without authentication to run arbitrary code on a vulnerable More

The post Cisco fixes critical flaws in Small Business Series Switches appeared first on Help Net Security.

19:33

Steam Client Beta Fixes NVIDIA HiDPI Scaling, GPU Hardware Acceleration Phoronix

Valve released a new Steam client beta overnight and contains a few notable fixes for NVIDIA Linux gamers...

19:31

8220 Gang Exploiting Oracle WebLogic Flaw to Hijack Servers and Mine Cryptocurrency The Hacker News

The notorious cryptojacking group tracked as 8220 Gang has been spotted weaponizing a six-year-old security flaw in Oracle WebLogic servers to ensnare vulnerable instances into a botnet and distribute cryptocurrency mining malware. The flaw in question is CVE-2017-3506 (CVSS score: 7.4), which, when successfully exploited, could allow an unauthenticated attacker to execute arbitrary commands

19:08

U.S. Congress Doesnt Plan to Overreact to Generative AI Copyright Challenges TorrentFreak

judiciary comitteeThis article consists of a collection of words that were once invented, most of them long before copyright or trademarks existed.

Words form the building blocks of todays society; they help to foster creativity and communication, and represent the driving force behind human intelligence.

These same words are now used as input by generative AI that will ultimately lead to new breakthroughs. Depending on who you ask, it has the potential to revolutionize many aspects of day-to-day life. At the same time, AI is causing grave concerns for the copyright industry.

The copyright angle is the topic of many debates and has already made its way to court in a few cases. Its high on the agendas of governments around the world, which are poised to accommodate generative AI within copyright legislation.

House Hearing on Copyright and AI

Copyright concerns surrounding generative AI were explored in detail yesterday by U.S. lawmakers at the House Judiciary IP Subcommittee. This hearing is an early step in the legislative process but an important one at that.

Historically, debates around copyright legislation tend to be polarized. However, U.S. Representative and committee chairman, Darrell Issa, urged everyone to approach the discussion with a spirit of collaboration.

Let us find common ground, seeking solutions that promote the flourishing of both creative expression and intellectual property protection. The stakes couldnt be higher and the outcome will shape the future landscape of art, technology and copyright today, Rep. Issa said.

Finding Middle Ground

The chairman stressed that, contrary to what some fear, Congress doesnt plan to make hasty decisions or overreact. At the same time, stakeholders should not fear or hope for severe measures. In this context he mentioned Spain and Italy, which have taken quite extreme positions.

Spain is moving forward with what I think might be a very restrictive interpretation. Japan believes, apparently, that all information that goes into the teaching is in fact free of any copyright restriction in its use.

I do not believe that todays discussion will take us down either road. I believe we will measure carefully and find middle ground that respects existing copyright law, while allowing the future of generative AI t...

19:01

1win org.ua Reviews Read Customer Service Reviews of 1win.org.ua h+ Media

1win org.ua Reviews Read Customer Service Reviews of 1win.org.ua

The signs were ominous for Auckland City FC but an improved tempo, intensity and desire saw the momentum of the game shift. That came to fruition when the Wee Nix tore the Navy Blues apart to release Riley Bidois who completed the easiest of finishes to hand Paul Temples team a deserved lead. Waikato Golf would like to extend our Congratulations to Hamilton Golf Club, in winning the 2022 Mens Championship Pennants Division 1 Final played at Hamilton Golf Course. Move With Murphy provides a range of commercial and residential transportation, logistics, and related services. This includes 3PL, warehousing, storage, devanning, and loading services to companies in a range of industries from our base in Silverdale, Auckland. We also help people from across Auckland move home with our honest and reliable removals services.

But just behind him, a heady mix of spirited newcomers clashing with hardened veterans made for some enticing racing. Key players showed their skill in all four matches, including Josh Collmenter, who demonstrated his major league-calibre arm. The Autumn Singles competition was a great success and was run very smoothly by Ron Garrett. Both groups had a plethora of talent each night, and this competitveness allowed for all the players to make great advances in their playing ability to start the season.

Emile Smith Rowe delivered another excellent performance on the left of midfield, capping his display with the third goal, but there was a good shape and confidence to the entire team. Leaders and representatives from Pacific Island nations demanded at a U.N. Outside linebacker Azeez Ojulari sprained an ankle Saturday, but he is getting better, Daboll said. New York continues to hope cornerback Adoree Jackson and safety Xavier McKinney will return after long absences. Daboll sounded more optimistic about Jackson playing this week than McKinney.

I have found these to be quite lucrative and have helped me to increase my winnings. The website offers a live chat feature where users can quickly and easily get in touch with a customer support representative. I have found the representatives to be helpful and knowledgeable, and they have been able to resolve any issues or answer any questions that I have had. Overall, I would highly recommend 1win to anyone looking for a reliable and user-friendly online betting website. With its wide range of sports and events, generous promotions and bonuses, and https://1xbet-mongolia.net/ excellent customer support, 1win is definitely worth checking out. In conclusion, 1win is an excellent online betting platform for users in New Zealand.

Fortunately, the most used version, 1win mobile site, is divided decently with a top-right menu button offloading most features from the front section. The initial 10 spots get an award as cash fro...

19:00

8-a-side teams will feature this season Otago Daily Times Online News h+ Media

8-a-side teams will feature this season Otago Daily Times Online News

However, make sure that the financial institution of your choice does not charge additional transaction fees. You can transfer funds through many different payment systems supported in India from your bank accounts, credit cards and e-wallets, including cryptocurrency wallets. It is also necessary to select the payment method and then press the withdraw button.

All new players are subjected to a 500% deposit bonus up to 2,000 provided they follow all the set terms of this offer. However, the maximum bonus you can receive under this welcome bonus can be claimed after a total of four deposits. Furthermore, customers should use bonus code maxboost to grab this promo.

We havent been able to play in New Zealand, even in my first season when we finished third, we didnt get the opportunity. The best coupons expire quickly, so we recommend finalizing your purchase. Through measuring our carbon footprint we hope to offer a metric whereby APS and our clients can ascertain the impact of the project based on product choice and methodology. If a winner is under the age of 18, the prize may be awarded to the winners parent or guardian.

I requested the withdrawal of money from this office in the amount of $ 760. They demanded to send passport photos and selfies to the mail to confirm account verification. I waited for 8 days, they didnt write anything, the support answered my questions slowly, the answer turns out to have come only got into spam. First doesnt just work, its been adequately adapted for all phones and tablets. They cooperate with different providers, they visited a couple, in general, you can list them for a long time, but its better to try it in person.

An 1Win discount code is an alphanumeric code which, like coupons or paper discount vouchers, allows you to receive a fixed discount or a percentage discount on your purchase. So, in addition to the affordable prices and offers already available on 1Win, you can get an additional discount on the total of your cart or on shipping. 1win offers excellent customer support to its users in New Zealand.

  • The initial 10 spots get an award as cash from 1win bookmaker.
  • They help make money even for beginners who have never played slots.
  • The developers did not deviate from traditional solutions, so they chose a dark color for the main background, on which all the elements present are clearly visible.
  • Van Hattum was a constant danger and kept Brown busy throughout but their resistance was broken when Auckland City FC youth product Dre Vollenhoven set up Logan Rogerson for the third with four minutes left.

Whether you prefer to bet on your desktop or mobile device, 1Win provides a seamless and convenient platform that allows you to place bets and monitor you...

18:41

Possible Non-Drug Cure for Depression SoylentNews

"Powerful magnetic pulses applied to the scalp to stimulate the brain can bring fast relief to many severely depressed patients for whom standard treatments have failed. Yet it's been a mystery exactly how transcranial magnetic stimulation, as the treatment is known, changes the brain to dissipate depression. Now, research led by Stanford Medicine scientists has found that the treatment works by reversing the direction of abnormal brain signals."

"When they analyzed fMRI data across the whole brain, one connection stood out. In the normal brain, the anterior insula, a region that integrates bodily sensations, sends signals to a region that governs emotions, the anterior cingulate cortex.

"You could think of it as the anterior cingulate cortex receiving this information about the bodylike heart rate or temperatureand then deciding how to feel on the basis of all these signals," Mitra said.

In three-quarters of the participants with depression, however, the typical flow of activity was reversed: The anterior cingulate cortex sent signals to the anterior insula. The more severe the depression, the higher the proportion of signals that traveled the wrong way."

"When depressed patients were treated with SNT, the flow of neural activity shifted to the normal direction within a week, coinciding with a lifting of their depression."

https://medicalxpress.com/news/2023-05-depression-reversing-brain-wrong.html


Original Submission

Read more of this story at SoylentNews.

18:03

Links 18/05/2023: Util-linux 2.39 and Lutris 0.5.13 Techrights

  • GNU/Linux

    • Desktop/Laptop

      • University of Toronto (Graphical) Unix has always had desktop environments

        One of the stories that you could tell about the X Window System and by extension graphical Unix is that first came (simple) window managers and xterm. Only later did Unix developed desktop environments like GNOME and KDE. This is certainly more or less the development that happened on open source PC Unixes and to a certain degree its the experience many people had earlier on workstation Unix machines running X, but its actually not historically accurate. In reality, Unix has had...

18:00

A Vintage Polaroid Camera Goes Manual Hackaday

There once was a time when all but the most basic of fixed focus and aperture cameras gave the photographer full control over both shutter speed and f-stop. This allowed plenty of opportunity to tinker but was confusing and fiddly for non-experts, so by the 1960s and 70s many cameras gained automatic control of those functions using the then quite newly-developed solid state electronics. Here in 2023 though, the experts are back and want control. [Jim Skelton] has a vintage Polaroid pack film camera hes using with photographic paper as the film, and wanted a manual exposure control.

Where a modern camera would have a sensor in the main lens light path and a microcontroller to optimize the shot, back then they had to make do with a CdS cell sensing ambient light, and a simple analog circuit. He considered adding a microcontroller to do the job, but realized that it would be much simpler to replace the CdS cell with a potentiometer or a resistor array. A 12-position switch with some carefully chosen resistor values was added, and placed in the cameras original battery compartment. The final mod brought out the resistors and switch to a plug-in dongle allowing easy switching between auto and switch...

17:03

Re: IPv6 and Route of Death Open Source Security

Posted by Andrew Worsley on May 18

I think debian stable/bullseye may not be vulnerable with standard kernel:

The exploit write up suggests it requires the ipv6_rpl_srh_compress()
routine to be compiled in
but from my reading of the code (see
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tree/include/net/rpl.h)
requires CONFIG_IPV6_RPL_LWTUNNEL to be define which isn't in my
latest debian amd64 kernel:

% grep CONFIG_IPV6_RPL_LWTUNNEL...

17:00

Overinflated: The Journey of a Humble Tire Reveals Why Prices Are Still So High Terra Forming Terra



Of course,  noone knows to roll down to the wreakers to pick up a set or so of second hand tires in good condition.  Oh well.  scary place i guess.

This is a really good look see at the induced global disruption we have been suffering.  Absurd really and shows us that we all need to plan for this potentiality.  Understand that any disruption will trigger a disturbance but then small in terms of the overall gross economy.  Is is easy to plan for single disruptions.  Like randomly losing a meat supplier.  Not so when they choose to blow up a bunch of the big ones.

Of course, producers ramp up and become their own middle man and charge downstream which then disrupts the blown up suppliers.  Make India happy and blow up a rag factory.

Irregular economic warfare is not a battle you can ever properly win, but the damage is annoying and it precipatates massive countervailing investment.

The global meddlers have not understood just how much they depend on the peoples forbearance.  Bud id still reeling and may take years to recover.



Overinflated: The Journey of a Humble Tire Reveals Why Prices Are Still So High

From a rubber plantation in Southeast Asia to a repair shop in Mississippi, the story of a tire highlights the turmoil of the post-pandemic economy and its future.

...

EPA announces plan to shut down the US power grid by 2030 With mike Adams Terra Forming Terra






As you likely know,  the CCP launched a WAR beginning in 2020 against the USA using what has been called irregular warfare as the methodology.  The idea is to attack the population without deploying actual military assets.

We are all now noticing what is happening, but I remain rather unimpressed.  No one really grasps, just how resiliant our global economy happens to be.  what is more, if I can figure it all out and then see it unfold, so can MIL INTEL which is certainly not captured as an institution.  You did not even understand it existed until the Q feed popped up.


It is hard to watch but do remember the future and all this will pass.  And those that played will become the nutless.  The hunt is now beginning.  HEAVEN ON EARTH is the objective, not HELL on EARTH



EPA announces plan to shut down the US power grid by 2030


The EPA announced new rules last week that will render the entire US power grid inoperable by the year 2030. This will be accomplished by forcing nearly all coal and natural gas power facilities to shut down, claiming carbon is a "pollutant."

It's all part of the planned takedown of the USA through multiple vectors: Wide open border, escalation of war with Russia, food infrastructure sabotage and the step-by-step destruction of the fiat currency (dollar).

The Obama / Biden regime is on track to utterly obliterate the USA by 2030 if not sooner, transforming it into a collapsed third world nation occupied by illegals who will replace the vaccine-terminated oblivious masses who once inhabited the nation.

National Citizens Inquiry: Canadas Response to COVID-19 Terra Forming Terra



The fun begins and a whole range of outright fraud is going in front of judges. once aghain we will discover the value of hte nuremburg defence of just following orders master.

this can become a global movement because it is obvious to all that it was a commercial fraud top to bottom.

The monster global organizations who perped it all need to be broken up at  the least.  again this looks like another beginning and we will discover just what rights the people have.


National Citizens Inquiry: Canadas Response to COVID-19


Global Research, May 13, 2023


Region: Canada


https://www.globalresearch.ca/national-citizens-inquiry-canadas-response-to-covid-19/5819084


I was fired! After 31 years as an emergency room physician with not one single patient complaint against me those 31 years! I was fired! For saying that somebody who had natural immunity didnt need to be vaccinated against the disease to which they were already immune

Dr Charles Hoffe, at the National Citizens Inqu...

Birkeland currents Terra Forming Terra



Continuing working through the New science of Heaven by robert Temple.  We have an excellent discussion of Birkeland Currents which have not really been understood and if anything been mostly ignored because we lacked a working model.

The fundamental problem with our observable space is that both positive ions and electrons have powerful repulsion force.  They fly apart unless bound to each other.  It is my contention obviously that DARK MATTER acts to quell this powerful force while not actually binding it.  I use the swork sticky to describe the lining up of an NNP axis with an electron or Ion axis along with the force is applied at a little distance.  the net force is low and also it is easily disturbed by passing energy in the form of photons.

what we now have is both massive and micro flows all through our solar system and even our galaxy which we have seen.  Better yet, all this is sub light.  It is really interesting that theswe also drive our jet streams and that they can be supersonic.  no wonder jet stream gain the speeds they do without any obvious explanation based on aerodynamics.

DARK MATTER is turning out to be the most important element of our existence, just as water is for a fish.  Yet science has convinced itself that what they cannot measure must not exist.  Of really!  That merelymeans you need not look for it.



Birkeland currents


From Wikipedia, the free encyclopedia

Schematic of the Birkeland or Field-Aligned Currents and the ionospheric current systems they connect to, Pedersen and Hall currents.[1]

A Birkeland current (also known as field-aligned current) is a set of electrical currents that flow along geomagnetic...

16:58

Ukraine, Ireland, Japan and Iceland join NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) Security Affairs

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) announced that Ukraine, Ireland, Japan and Iceland joined the organization.

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a multinational organization established to enhance cyber defence capabilities and promote cooperation among NATO member countries and partner nations.

On its 15th anniversary, the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) raised the flags of Iceland, Ireland, Japan, and Ukraine at its headquarters in Tallinn, welcoming four new member nations to the CCDCOE cyber defence family. reads the announcement.

The organization is located in Tallinn, Estonia, and conducts research, training, and exercises in the field of cyber defence, and provides a platform for sharing expertise and best practices. Its mission is to improve cyber defence policy, strategy, and operations through collaborative efforts and the development of innovative solutions.

The organization announced that Ukraine, Ireland, Japan and Iceland joined the CCDCOE.

The organization now reached 39 members, including those that are not in the NATO alliance.

I am truly grateful that Iceland, Ireland, Japan, and Ukraine have decided to join us, said Mart Noorma, director of the CCDCOE. We are delighted to have like-minded nations sharing cyber knowledge and exchanging methods to systematically address cyber attacks. Our goal is to foster increased cooperation and reap the benefits of this large-scale coalition through research, training, and exercises.

NATO CCDCOE

First, I would like to congratulate the CCDCOE. During the last 15 years, the CCDCOE has evolved from a small team of experts to the largest NATO centre of excellence. Second, we warmly welcome the new members, all of whom will add highly appreciated knowhow to the CCDCOEs work. We are particularly glad to see Ukraine here with us this offer...

16:44

Leaked Pentagon Report Forensically Dismantles Fauci-Led Natural Origin Study cryptogon.com

Via: ZeroHedge Epoch Times: Researchers at the Department of Defense wrote a devastating takedown of the Proximal Origin study, which was used by Dr. Anthony Fauci as proof that the COVID-19 virus had come from nature. The takedown, dated May 26, 2020, was written in the form of a working paper called Critical analysis []

16:39

Deutsche Bank Settles Epstein Lawsuit For Up To $75 Million cryptogon.com

Via: ZeroHedge: Deutsche Bank has agreed to pay up to $75 million to settle a lawsuit brought by an Jeffrey Epstein victim who claimed that the bank had benefited from human trafficking by retaining Epstein as a client, the Financial Times reports. The lawsuit is one of three ongoing cases involving lenders to Epstein []

16:39

Darknet Carding Kingpin Pleads Guilty: Sold Financial Info of Tens of Thousands The Hacker News

A U.S. national has pleaded guilty in a Missouri court to operating a darknet carding site and selling financial information belonging to tens of thousands of victims in the country. Michael D. Mihalo, aka Dale Michael Mihalo Jr. and ggmccloud1, has been accused of setting up a carding site called Skynet Market that specialized in the trafficking of credit and debit card data. Mihalo and his

16:36

FBI Leadership Sabotaged Clinton Foundation Investigations: Durham Report cryptogon.com

Im sure youre shocked. Via: ZeroHedge: Remember the Clinton Foundation? Which, took millions in foreign donations when everyone thought Hillary Clinton was going to win the 2016 US election, only to see donations plummet by 90% after she lost? Now we learn, thanks to the Durham report, that the FBI had three concurrent investigations []

16:19

Apple Thwarts $2 Billion in App Store Fraud, Rejects 1.7 Million App Submissions The Hacker News

Apple has announced that it prevented over $2 billion in potentially fraudulent transactions and rejected roughly 1.7 million app submissions for privacy and security violations in 2022. The computing giant said it terminated 428,000 developer accounts for potential fraudulent activity, blocked 105,000 fake developer account creations, and deactivated 282 million bogus customer accounts. It

15:56

Vice Media Files for Bankruptcy SoylentNews

Once a digital media darling, Vice Media Group on Monday filed for bankruptcy protection after years of financial troubles:

A consortium of Vice's lenders which includes Fortress Investment, Soros Fund Management and Monroe Capital is looking to acquire the company following the filing.

The digital media trailblazer, once valued at $5.7 billion and known for sites including Vice and Motherboard, had been restructuring and cutting jobs across its global news business over recent months.

[...] Launched in Canada in 1994 as a fringe magazine, Vice expanded around the world with youth-focused content and a prominent social media presence. It endured several years of financial troubles, however, as tech giants such as Google and Meta vacuumed up global ad spend.

To facilitate its sale, Vice filed for Chapter 11 bankruptcy in the U.S. Bankruptcy Court for the Southern District of New York. If the application is approved, other parties will be able to bid for the company. Credit bids enable creditors to swap secured debt for company assets rather than pay cash.

Also at NPR, CNN and CBC News.

Previously: Vice Media Will Reorganize and Lay Off 10% of Staff


Original Submission

Read more of this story at SoylentNews.

15:18

Critical Flaws in Cisco Small Business Switches Could Allow Remote Attacks The Hacker News

Cisco has released updates to address a set of nine security flaws in its Small Business Series Switches that could be exploited by an unauthenticated, remote attacker to run arbitrary code or cause a denial-of-service (DoS) condition. "These vulnerabilities are due to improper validation of requests that are sent to the web interface," Cisco said, crediting an unnamed external researcher for

15:00

Machining a Golf Ball To Make a Lovely Tactile Volume Knob Hackaday

Golf balls are wonderfully tactile things. They have a semi-grippy covering, and theyre a beautiful size and weight that sits nicely in the hand. Sadly, most of them just get smacked away with big metal clubs. [Jeremy Cook] recognized their value as a human interface device, though, and set about turning one into a useful volume knob.

The trick here is in the machining. [Jeremy] used a 3D printed jig to hold a golf ball tightly in place so that it could be machined using a milling machine. With the bottom taken off and a carefully-designed 3D printed insert in the bottom, the golf ball is ready to be used as a kn...

14:30

Enhancing open source security: Insights from the OpenSSF on addressing key challenges Help Net Security

In this Help Net Security interview, we meet a prominent industry leader. Brian Behlendorf, CTO at the Open Source Security Foundation (OpenSSF), shares insights on the influence of his experiences with the White House CTO office, World Economic Forum, and Linux Foundation on leading the OpenSSF and addressing open-source security challenges. Behlendorf discusses the trajectory of open-source software adoption, the unique challenges it faces regarding security, and how the OpenSSF is working to address these More

The post Enhancing open source security: Insights from the OpenSSF on addressing key challenges appeared first on Help Net Security.

14:00

Introducing Permit.io: Simplifying access control and policy management for developers Help Net Security

In this Help Net Security video interview, Or Weis, Co-Founder and CEO of Permit.io, discusses an innovative approach to managing permissions and access control within applications. We will explore policy as code and how it addresses organizations challenges in managing access control effectively.

The post Introducing Permit.io: Simplifying access control and policy management for developers appeared first on Help Net Security.

13:30

Organizations cyber resilience efforts fail to keep up with evolving threats Help Net Security

A steady increase in cyberattacks and evolving threat landscape are resulting in more organizations turning their attention to building long-term cyber resilience; however, many of these programs are falling short and fail to prove teams real-world cyber capabilities, according Immersive Labs. The report found that while 86% of organizations have a cyber resilience program, 52% of respondents say their organization lacks a comprehensive approach to assessing cyber resilience. Growing importance of cybersecurity in 2023 Strengthening More

The post Organizations cyber resilience efforts fail to keep up with evolving threats appeared first on Help Net Security.

13:07

The AI race heats up: Google announces PaLM 2, its answer to GPT-4 SoylentNews

https://arstechnica.com/information-technology/2023/05/googles-top-ai-model-palm-2-hopes-to-upstage-gpt-4-in-generative-mastery/

On Wednesday, Google introduced PaLM 2, a family of foundational language models comparable to OpenAI's GPT-4. At its Google I/O event in Mountain View, California, Google revealed that it already uses PaLM 2 to power 25 products, including its Bard conversational AI assistant.

As a family of large language models (LLMs), PaLM 2 has been trained on an enormous volume of data and does next-word prediction, which outputs the most likely text after a prompt input by humans. PaLM stands for "Pathways Language Model," and "Pathways" is a machine-learning technique created at Google. PaLM 2 follows up on the original PaLM, which Google announced in April 2022.

Related:
Google Bard stories on soylentnews 12+ stories


Original Submission

Read more of this story at SoylentNews.

13:00

Identity crimes: Too many victims, limited resources Help Net Security

The Identity Theft Resource Center (ITRC) has documented incidents of identity theft reported during 2022 and the first quarter of 2023, highlighting the use of strategies by criminals to convince people to willingly share protected information. The number of reported identity crimes in 2022 was nearly the same as the all-time high in 2021, with only a slight decline of less than 1% to 14,817 cases. Identity crimes in 2022 55% (8,199) of identity crime More

The post Identity crimes: Too many victims, limited resources appeared first on Help Net Security.

12:55

[$] LWN.net Weekly Edition for May 18, 2023 LWN.net

The LWN.net Weekly Edition for May 18, 2023 is available.

12:00

Not Just ATP: Two-Component Molecular Motor Using GTPase Cycle Demonstrates Mechanotransduction Hackaday

Binding of the Rab5(GTP) to EEA1 triggers a transition of the EEA1 molecule from a rigid, extended state to a more flexible, collapsed state. (Credit: Anupam Singh et al., 2023)

For most of us who havent entirely slept through biology classes, its probably no secret that ATP (adenosine triphosphate) is the compound which provides the energy needed for us to move our muscles and for our body to maintain and repair itself, yet less know is guanosine triphosphate (GTP). Up till now GTP was thought to be not used for mechanical action like molecular motors, but recent research by Anupam Singh and colleagues in Nature Physics...

11:40

MIT Technology Review is About 80% Microsoft India Spam This Week (Sponsored Content) Techrights

Earlier this year: MIT Technology Review Became Spamfarm of Microsoft | MIT Technology Review is Running SPAM for Microsoft and Azure (Distracting From Mass Layoffs)

Infosys spam
Since Monday weve seen no less than 10 Infosys-sponsored articles in the site thats about 5 times as much all the rest combined

Summary: An astonishing amount of webspam was published by MIT Technology Review on Monday and Tuesday

11:39

NEW 'Off The Hook' ONLINE 2600 - 2600: The Hacker Quarterly

NEW 'Off The Hook' ONLINE

Posted 18 May, 2023 1:39:39 UTC

The new edition of Off The Hook from 05/17/2023 has been archived and is now available online.

An experiment during Overtime, IRS to test free online filing system, distracted by chat, iPhones will be able to impersonate your voice using AI, Facebook glitches, Google to delete inactive accounts, ChatGPT can't tell if something was written by ChatGPT, Eurovision.

11:31

LINUX or UNIX Sites That Promote Windows Products? Follow the Money Techrights

CNX SoftwareSummary: CNX Software is still shilling a bunch of Microsoft and Windows products sometimes; its because of money

THE tragic story of Phoronix aside, yesterday we noticed this article from an author who said: GEEKOM sent us a sample of the AS 6 mini PC with [...] the pre-installed Windows 11 (not the first time).

Due to greed, GNU/Linux sites and their audiences are exposed to promotion of the competition.We gave more examples of this (about four articles in the past) regarding the same site.

A day later they did it again. Promoting Windows products for gifts (review units)?

This saddening trend is hurtful. Due to greed, GNU/Linux sites and their audiences are exposed to promotion of the competition. I exchanged some E-mail with the editor of the above site earlier this month. To be fair, it was a lot worse last year [1, 2]. But the problem remains largely unsolved.

Phoronix is even worse, but an issue for another day

11:17

The World Wide Web, and Even Some LINUX or UNIX Sites, Become Spamfarms Techrights

Summary: The Web is rotting (we will mention this in an upcoming video that gives 4 new examples of that); consider the example of www.unixmen.com, one of many Linux sites that recently became a spamfarm (some had become inactive or even went offline instead); we took note of this trend in April and things have gotten only more out of control since. This is the latest example of webspam with the word Linux thrown in to make it seem relevant. Going to the front page, about 90% of the content from the past 6 weeks is webspam, with the word Linux added to make it harder to notice (last month we explained how it figure out the SEO spam parts).

Spam in Unixmen

What will be left of the Web? More clickfraud spamnils?

10:52

Gemini Links 17/05/2023: Several Gemini-Related News Techrights

  • Gemini* and Gopher

    • Personal

      • And all of a sudden its Wednesday

        I cant believe anyone still believes the news.

        Then again, were talking about people, here.

        I mean, for the love of separate selfhood hypnosis, right?

      • Toasting the End of Amatonormativity

        I noticed this was removed from library.inu.red at some point (presumably also removed from The Anarchist Library). Personally I found it to be a fantastic read, and was frustrated when it could no longer be found. As far as I know its not anywhere on the Geminispace, and happens to be hard to find on the world wide web. I believe it also poses some interesting questions given its age, and I also happen to partially disagree with some parts of it.

      • Album #267: Jeru the Damaja The Sun Rises In The East

        It was nice to hear a new album for a change. My backlog has filled with the 60s and 70s rock albums that are the mainstay of this book. Peter Frampton and Iron Butterfly are Classic Rock staples that would also appear in 1001 Albums You Will Almost Certainly Have Heard Before You Die.

      • The simple joys of the humble slide rule

        A bunch of scales printed on three rulers, the middle one of which can slide relative to the other two. Then finally, a glass box around the outside with a thin (hairline) mark down the middle, held perpendicular to the rulers.

        Yet with this simple contraption you can perform all calculations normally reserved for a calculator, all the way through most Americans high school math. Im forever amazed by the ingenuity that enables trigonometry, powers, logarithms, and more to be calculated by rubbing two sticks together. This simple acti...

10:25

Scientists Discover Microbes That Can Digest Plastics at Low Temperatures SoylentNews

Scientists from Switzerland have identified 19 novel strains of cold-adapted specialist bacteria and fungi from the Alps and the Arctic region that can digest biodegradable plastics:

Finding, cultivating, and bioengineering organisms that can digest plastic not only aids in the removal of pollution, but is now also big business. Several microorganisms that can do this have already been found, but when their enzymes that make this possible are applied at an industrial scale, they typically only work at temperatures above 30C. The heating required means that industrial applications remain costly to date, and aren't carbon-neutral. But there is a possible solution to this problem: finding specialist cold-adapted microbes whose enzymes work at lower temperatures.

[...] "Here we show that novel microbial taxa obtained from the 'plastisphere' of alpine and arctic soils were able to break down biodegradable plastics at 15C," said first author Dr Joel Rthi, currently a guest scientist at WSL. "These organisms could help to reduce the costs and environmental burden of an enzymatic recycling process for plastic."

[...] None of the strains were able to digest PE [non-biodegradable polyethylene], even after 126 days of incubation on these plastics. But 19 (56%) of strains, including 11 fungi and eight bacteria, were able to digest PUR [biodegradable polyester-polyurethane] at 15C, while 14 fungi and three bacteria were able to digest the plastic mixtures of PBAT [biodegradable polybutylene adipate terephthalate] and PLA [biodegradable polylactic acid]. Nuclear Magnetic Resonance (NMR) and a fluorescence-based assay confirmed that these strains were able to chop up the PBAT and PLA polymers into smaller molecules.

"It was very surprising to us that we found that a large fraction of the tested strains was able to degrade at least one of the tested plastics," said Rthi.

The best performers were two uncharacterized fungal species in the genera Neodevriesia and Lachnellula: these were able to digest all of the tested plastics except PE. The results also showed that the ability to digest plastic depended on the culture medium for most strains, with each strain reacting differently to each of four media tested.


Original Submission

Read more of this story at SoylentNews.

10:00

HPR3859: My Live in Devices Hacker Public Radio

A talk about things that attracted me to purchase them.

The Cost of Change It Will Never Work in Theory

Everybody wants things to get better. People who are serious about it draw up budgets, because that forces them to be explicit about exactly what they're going to do and what's needed to make it happen.

I'm sure it's clear by now that we'd like more programmers to know what software engineering researchers have learned over the past fifty years and how to act on it. We have a plan to make that happen: replace the team programming project course that most students do in the third or fourth year of an undergraduate degree in computer science with one in which they work in teams to design an experiment, collect data, analyze it, and figure out what (if anything) they've proven.

  1. It's a minimally disruptive adjustment to the curriculum, so other faculty won't object on administrative grounds.
  2. it gives CS students a chance to learn some practical data science, (which most of them will enjoy, and which will make them more employable.
  3. It helps prepare them for graduate school (so it's in professors' own interests as well).
  4. And crucially, they will be more likely to understand and value researchers' experimental findings if they have done an experiment of their own.

What we need to make this happen is two dozen lectures' worth of material as both prose and slides with examples, exercises, and grading rubrics so that busy professors don't each have to build it all from scratch. Figuring a week of research and development per lecture (because most of this material would be genuinely new), then doubling that estimate because I'm always optimistic, it would take one person-year to build this course, run it for the first time, fix what didn't work, and package it up for general use.

If two dozen professors in software engineering want this to happen and will each contribute US$6500 to fund two weeks' worth of work, our entire discipline will have what it needs to shape young minds today so that tomorrow's programmers will be more engaged with our work. If you're at ICSE'23 in Melbourne right now, please chat with your colleagues about this idea. If your answer is "no", please mail me and tell me what your alternative plan is. "If we just keep publishing, surely they'll start to pay attention" has been failing for fifty years; I think it's time we tried something else.

09:03

Smashing Security podcast #322: When you buy a criminals phone, and paying for social media scams Graham Cluley

Personal information is going for a song, and the banks want social media sites to pay when their users get scammed. All this and much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault.

09:00

Inside A Current Probe Hackaday

[The Signal Path] had two Tektronix AC/DC current probes that didnt work. Of course, thats a great excuse to tear them open and try to get at least one working. You can see how it went in the video below. The symptoms differed between the two units, and along the way, the theory behind these probes needs some exploration.

The basic idea is simple, but, of course, the devil is in the details. A simple transformer doesnt work well at high frequencies and wont work at all at DC. The solution is to use a hall effect sensor to measure DC and also to feed it back to cancel coil saturation.

By switching transformer assemblies between the probes, he found that one worked and one did not. So the next step was to examine the assembly to see if anything was obviously wrong with it. There was also a plastic piece broken on both probes that needed replacing, but that didnt seem like a difficult problem to surmount compared to the electronic problem.

Fortunately, having a good transformer allowed him to compare readings to determine any problems. The hall effect sensor appeared bad, but taking the module apart destroyed it. On the other hand, we get to see whats inside. Unfortunately, something in the repair operation broke the working module. It would intermittently work with some pressure, but for the most part, it suddenly had the same symptom as the other module. [The Signal Path] speculates that the pressure...

08:01

07:40

Microsoft is Scanning the Inside of Password-protected Zip Files for Malware SoylentNews

If you think a password prevents scanning in the cloud, think again:

Microsoft cloud services are scanning for malware by peeking inside users' zip files, even when they're protected by a password, several users reported on Mastodon on Monday.

Compressing file contents into archived zip files has long been a tactic threat actors use to conceal malware spreading through email or downloads. Eventually, some threat actors adapted by protecting their malicious zip files with a password the end user must type when converting the file back to its original form. Microsoft is one-upping this move by attempting to bypass password protection in zip files and, when successful, scanning them for malicious code.

While analysis of password-protected files in Microsoft cloud environments is well-known to some people, it came as a surprise to Andrew Brandt. The security researcher has long archived malware inside password-protected zip files before exchanging them with other researchers through SharePoint. On Monday, he took to Mastodon to report that the Microsoft collaboration tool had recently flagged a zip file, which had been protected with the password "infected."

[...] Fellow researcher Kevin Beaumont joined the discussion to say that Microsoft has multiple methods for scanning the contents of password-protected zip files and uses them not just on files stored in SharePoint but all its 365 cloud services. One way is to extract any possible passwords from the bodies of an email or the name of the file itself. Another is by testing the file to see if it's protected with one of the passwords contained in a list.

"If you mail yourself something and type something like 'ZIP password is Soph0s', ZIP up EICAR and ZIP password it with Soph0s, it'll find (the) password, extract and find (and feed MS detection)," he wrote.

Read more of this story at SoylentNews.

07:17

Monitoring the dark web to identify threats to energy sector organizations Security Affairs

Searchlight Cyber researchers warn of threat actors that are offering on the dark web access to energy sector organizations.

Dark web intelligence firm Searchlight Cyber published a report that analyzes how threat actors in the dark web prepare their malicious operations against energy organizations.

The threat actors use the hidden part of the web to share techniques, build their resources, and coordinate their attacks. The report published by the experts provides evidence of continuous discussion of attacks on energy companies on dark web forums.

The role of an initial access broker is essential in the cybercrime ecosystem, these actors facilitate the sale or exchange of compromised or stolen initial access to computer networks or systems. These brokers act as intermediaries between cybercriminals who gain unauthorized access to networks and buyers interested in purchasing or utilizing that access for malicious activities. Marketplace and hacking forums offering initial access, enable crooks to speed up their attacks and monetize their cyber operations.

Threat actors auction initial access to remote software, RDP access, VPNs, and stolen credentials, allowing attacks to use these accesses to establish a foothold in the target organization and launch the attack on both IT and OT infrastructure.

The report is very important for defenders, the knowledge of the sale of initial access to energy organizations can allow them to prioritize imminent threats and adopt the proper countermeasures.

The report is based on the analysis of posts published between February 2022 and February 2023 on cybercrime forums, dark websites, and marketplaces. The experts focused on posts and discussions offering and searching for initial access into the networks of energy sector organizations.

The report is based on a small sample including targets in the USA, Canada, UK, France, Italy, and Indonesia.

The predominant activity we observe against the energy industry on the dark web are the auctions for initial access to energy companies that routinely take place on dark web forums. reads the report published by the experts. Listings also include companies across the spectrum of the energy sector upstream, midstream, and downstream in traditional energy companies such as oil and gas but also renewable energy organizations.

The offers usually include the overall revenue of the organization that can give the buyers an estimation of the earning potential in case of a successful compromise.

06:28

Japans Pirate Manga Site Leak Isnt a Failure, Its Potential Education TorrentFreak

bleachmangaMulti-point, ongoing collisions between rightsholders, pirate sites, pirates and copyright law, are what fuel our daily reporting. The pumps rarely run dry for long in these wars.

The polarized nature of the debate, which regularly pits decent law-abiding content creators against shadowy thieves hiding in the recesses of the web, is good for headlines but a hopeless anti-piracy tool.

Casual pirates, who represent the majority, routinely dismiss this type of messaging as either completely untrue or blatant propaganda. Yet when unfiltered piracy information leaks out unexpectedly, people suddenly develop an interest in what anti-piracy groups have to say.

Redacted Document Wasnt Redacted

Many months ago, Japans Agency for Cultural Affairs published a document which contained a list of pirate manga sites generating high levels of traffic from within Japan. As the image below shows, the names of the sites were considered sensitive enough to completely redact. The redaction wasnt effective.

jpn-manga- redacted

Hovering a cursor over the blacked-out area revealed what shouldve been hidden and click led directly to the site considered most damaging to the home market in Japan.

Thats highly relevant information but when the Agency of Cultural Affairs was alerted to the buzz on social media, the information was immediately taken down.

The Case for Sharing More Information, Not Less

Theres a theory in anti-piracy circles that mentioning pirate sites by name makes them more popular. If we assume thats the case, lets see how thats working out.

The slide with the unredacted text above covers the period June-July 2022. The slide below is from a more recent report covering September-October 2022. This time the names of the sites are properly redacted but we can still see data related to the site in the top spot.

06:17

Is it Getting Harder to Pigeonhole Games into Specific Genres? HackRead | Latest Cybersecurity and Hacking News Site

By Owais Sultan

Back in 2015, a study from Syracuse University analysed how grouping video games into genres can be limited.

This is a post from HackRead.com Read the original post: Is it Getting Harder to Pigeonhole Games into Specific Genres?

06:00

This Engineer Promotes Innovation-Based Projects in Uganda IEEE Spectrum



Ever since Lwanga Herbert was a youngster growing up in Kampala, Uganda, he wanted to create technology to improve his community. While attending a vocational school, he participated in a project that sought technological solutions for local electricians who were having problems troubleshooting systems.

Herbert helped develop a detector to measure voltage levels in analog electronics; a pulse detector to identify digital pulses and signals; and a proximity alarm system. The tools he helped develop made troubleshooting easier and faster for the electricians. When he understood the impact his work had, he was inspired to pursue engineering as a career.

I saw firsthand that technology increases the speed, efficiency, and effectiveness of solving challenges communities face, he says.

The devices were recognized by the Uganda National Council for Science and Technology. The level and pulse detectors were registered as intellectual property through the African Regional Intellectual Property Organization.

Herbert now works to use technology to address challenges faced by Uganda as a whole, such as high neonatal death rates.

The IEEE member is the innovation director at the Logel Science Foundation. The nonprofit, which was launched in 2001, works to foster technological development in Uganda. It strives to enable a more competitive job market by helping startups succeed and by sparking interest in science, technology, engineering, and math careers.

Herbert has been active with IEEEs humanitarian programs and is chair of the newly established IEEE Humanitarian Technology Board. HTB will oversee and support all humanitarian activities across IEEE and is responsible for fostering new collaborations. It also will fund related projects and activities.

Because of his busy schedule, The Institute conducted this interview via email. We asked him about the goals of the Logel Science Foundation, his humanitarian work, and how his IEEE membership has advanced his career. His answers have been edited for clarity.

The Institute: What are you working on at the foundation?

Lwanga Her...

05:55

Wayland's Weston 12.0 Released With Multi-GPU Support, PipeWire Backend, Tearing Control Phoronix

Weston 12.0 as Wayland's reference compositor is now available with multiple GPU support in the DRM back-end, support for HDMI content types, support for the Wayland tearing control protocol, plane alpha DRM property handling, a PipeWire back-end, and much more...

05:24

President Biden Wants Dr. Monica Bertagnolli for Director of the NIH cryptogon.com

Via: RFK Jr.: Yesterday, President Biden announced Dr. Monica Bertagnolli as his intended nominee for Director of the NIH. Guess what? From 2015-2021, Bertagnolli received more than 116 grants from Pfizer, totaling $290.8 million. This amount made up 89% of all her. research grants.

05:05

05:00

[$] Democratizing AI with open-source language models LWN.net

When OpenAI made its chatbot ChatGPT available to the public in November 2022, it immediately became a hit. However, despite the company's name, the underlying algorithm isn't open. Furthermore, ChatGPT users require a connection to OpenAI's cloud service and face usage restrictions. In the meantime, several open-source or freely available alternatives have emerged, with some even able to run on consumer hardware. Although they can't match ChatGPT's performance yet, rapid advancements are occurring in this field, to the extent that some people at the companies developing these artificial intelligence (AI) models have begun to worry.

04:54

Cosmic Rays Reveal Hidden Ancient Burial Chamber Underneath Naples SoylentNews

Rectangular chamber was probably the tomb of a wealthy individual or family:

The ruins of the ancient necropolis of Neapolis lie some 10 meters (about 33 feet) below modern-day Naples, Italy. But the site is in a densely populated urban district, making it challenging to undertake careful archaeological excavations of those ruins. So a team of scientists turned to cosmic rays for helpspecifically an imaging technique called muography, or muon tomographyand discovered a previously hidden underground burial chamber, according to a recent paper published in the Scientific Reports journal.

[...] In 2016, scientists using muon imaging picked up signals indicating a hidden corridor behind the famous chevron blocks on the north face of the Great Pyramid of Giza in Egypt. The following year, the same team detected a mysterious void in another area of the pyramid, believing it could be a hidden chamber, which was subsequently mapped out using two different muon imaging methods.

There are many variations of muon imaging, but they all typically involve gas-filled chambers. As muons zip through the gas, they collide with the gas particles and emit a telltale flash of light, which is recorded by the detector, allowing scientists to calculate the particle's energy and trajectory. It's similar to X-ray imaging or ground-penetrating radar, except with naturally occurring high-energy muons rather than X-rays or radio waves. That higher energy makes it possible to image thick, dense substances like the stones used to build pyramids. The denser the imaged object, the more muons are blocked, casting a telltale shadow. Hidden chambers would appear in the final image because they blocked fewer particles.

Neapolis was a Hellenistic city in a hilly area rich in volcanic tuff rock. That made it soft enough to sculpt out tombs, worship spaces, or caves for housing. The necropolis in what is now the Sanita district of Naples was one such creation, used for burials from the late fourt...

04:35

Re: IPv6 and Route of Death Open Source Security

Posted by Erik Auerswald on May 17

Hi all,

It also mentions that "the bug patch didn't solve the underlying problem
(ZDI confirmed this too), so we're still expecting another patch at
some[ ]point."

The Zero Day Initiative (ZDI) entry[0] linked from the article[1]
gives a time line:

01/26/22 ZDI reported the vulnerability to the vendor.
[...]
04/14/23 The vendor informed the ZDI that a new patch would merge
into the latest mainline on...

04:30

Util-linux 2.39 released LWN.net

Version 2.39 of the util-linux tool collection has been released. The most significant change, perhaps, is support for the new filesystem-mounting API, which enables a number of new features, including ID-mapped mounts.

04:19

[$] FUSE passthrough for file I/O LWN.net

There are some filesystems that use the Filesystem in Userspace (FUSE) framework but only to provide a different view of an underlying filesystem, such as different file metadata, a changed directory hierarchy, or other changes of that sort. The read-only filtered filesystem, which simply filters the view of which files are available, is one example; the file data could come directly from the underlying filesystem, but currently needs to traverse the FUSE user-space server process. Finding a way to bypass the server, so that the file I/O operations go directly from the application to the underlying filesystem would be beneficial. In a filesystem session at the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit, Miklos Szeredi wanted to explore different options for adding such a mechanism, which was referred to as a "FUSE passthrough"though "bypass" might be a better alternative.

03:41

Mitra Lavasani, Director of the Translational Cell Therapy Lab, joins our Life Extension Board. Lifeboat News

Mitra Lavasani, Director of the Translational Cell Therapy Lab, joins our Life Extension Board.

03:35

This Is an Invasion of America Michael Yon at the U.S. Border cryptogon.com

This was posted by reader NH in a comment on, El Paso: Border Patrols Central Processing Center Six Times Maximum Capacity. I thought it was worth a dedicated post. Via: Redacted:

03:20

New Epstein Papers Reveal Targeting of Children for Medical Experiments, Artificial Intelligence Research cryptogon.com

Via: Redacted: Related: Jeffrey Epstein Moved Money For Noam Chomsky, Paid Bard President Botstein $150,000

03:16

Re: IPv6 and Route of Death Open Source Security

Posted by Solar Designer on May 17

Hi Jeffrey and all,

The "original writeup" you reference says this is CVE-2023-2156.

Thank you for bringing this to oss-security.

I'd appreciate it if you and/or others also post plain text extracts of
such content, not only the links. Anyone willing to do it this time?

Also, this list isn't only about Linux, so when posting about
Linux-specific issues let's state so in the Subject line. In this case,
the issue is...

03:06

02:06

New Findings Indicate Gene-Edited Rice Might Survive in Martian Soil SoylentNews

New Findings Indicate Gene-Edited Rice Might Survive in Martian Soil:

As outlined in the team's abstract, Rice Can Grow and Survive in Martian Regolith with Challenges That Could be Overcome Through Control of Stress-Related Genes, one of the biggest challenges to growing food on Mars is the presence of perchlorate salts, which have been detected in the planet's soil and are generally considered to be toxic for plants.

The team was able to simulate Martian soil using basaltic rich soil mined from the Mojave Desert, called the Mojave Mars Simulant, or MMS, which was developed by scientists from NASA and the Jet Propulsion Laboratory.

The teams then grew three varieties of rice, including one wild-type and two gene-edited lines with genetic mutations that better enable them to respond to stress, such as drought, sugar starvation or salinity. These varieties were grown in the MMS, as well as a regular potted mix and a hybrid of the two. While plants were able to grow in the Martian simulant, they were not as developed as those grown in the potting soil and hybrid mix. Replacing just a quarter of the Martian simulant with potting soil resulted in improved development.

The team also experimented with the amount of perchlorate in the soil, finding that 3 grams per kilogram was the threshold beyond which nothing would grow, while mutant strains could still root in 1 gram per kilogram.

Their findings suggest that there might be a way forward for genetically modified rice to find purchase in Martian soil.


Original Submission

Read more of this story at SoylentNews.

01:30

Learn How Impossibly Close-fitting Parts Are Actually Made Hackaday

Most of us have seen those demonstrations of metal parts that mate together so finely that, once together, they have no visible seam at all. But how, exactly, is this done? [Steve Mould] has a video that shows and explains all, and weve never seen the process explained quite like he does.

The secret ingredient is wire EDM, or Electrical Discharge Machining, but thats only one part of the whole. Wire EDM works a bit like a hot-wire cutter slicing through foam, but all by itself thats not enough to produce those impossibly close-fitting parts we love to see.

EDM is capable of astounding precision in part because unlike a cutting tool nothing physically contacts the material. Also, there isnt a lot of friction and heat causing small distortions of the material during the machining process. EDM is as a result capable of fantastically-precise cuts...

01:23

I saw a quantum computer used by JPMorgan, with Microsoft and Nvidia as partners, and it was mind-blowing Lifeboat News: The Blog

It looks like a science experiment. And in some ways, it is. But Quantinuums new computer is commercially available and already has customers.

01:22

Scientists Invent a New Type of Battery The Oxygen-Ion Battery Lifeboat News: The Blog

Researchers at TU Wien (Vienna) have developed a groundbreaking oxygen-ion battery, which boasts exceptional durability, eliminates the need for rare elements, and solves the problem of fire hazards.

Lithium-ion batteries, while commonplace in todays world powering everything from electric vehicles to smartphones arent necessarily the optimal solution for all applications. Researchers at TU Wien have made a breakthrough by creating an oxygen-ion battery that offers several significant advantages. While it may not match the energy density of lithium-ion batteries, its storage capacity doesnt diminish irreversibly over time, making it capable of an exceptionally long lifespan as it can be regenerated.

Moreover, the fabrication of oxygen-ion batteries doesnt require scarce elements and involves non-combustible materials. The innovative battery concept has already led to a patent application, filed in collaboration with partners in Spain. These oxygen-ion batteries could provide an outstanding solution for large-scale energy storage systems, such as those required to hold electrical energy from renewable sources.

01:22

Rimac Nevera electric hypercar sets 23 records in single day, including fastest 0249 mph time Lifeboat News: The Blog

Times of 060 mph simply arent enough when you get into the peak-performance, hypercar segment of electric vehicles. The Rimac Nevera has already done an excellent job demonstrating that its one of the highest-performing vehicles on the planet, but any doubt should now be dissolved as the electric hypercar smashed through 23 performance records in just a single day, a record in it of itself.

Since its founding in Croatia in 2009, Rimac Automobili has been developing some of the most exciting and technologically advanced electric hypercars. Rimacs first EV, the Concept_One, was introduced in 2016 and is considered one of the worlds fastest production vehicles at the time, although its production consisted of a mere eight vehicles.

Rimacs Concept_Two debuted in 2018 and eventually evolved into its production form, renamed the Nevera. As EV enthusiasts, the Nevera represents much of the potential of electric hypercars, which can significantly outperform ICE counterparts without any emissions.

01:06

01:05

System76 Pangolin Makes For A Nice All-AMD Linux Laptop Phoronix

I spent the past few weeks testing the latest System76 Pangolin laptop that has been working out well as an all-AMD 15-inch laptop running the company's increasingly-popular Pop!_OS Linux distribution.

01:01

Is this the answer to Google Drive spam? Graham Cluley

There's good news if you're plagued by shared Google Drive files from strangers. Google Drive is getting a spam folder.

01:00

Just Calm Down About GPT-4 Already IEEE Spectrum



Rapid and pivotal advances in technology have a way of unsettling people, because they can reverberate mercilessly, sometimes, through business, employment, and cultural spheres. And so it is with the current shock and awe over large language models, such as GPT-4 from OpenAI.

Its a textbook example of the mixture of amazement and, especially, anxiety that often accompanies a tech triumph. And weve been here many times, says Rodney Brooks. Best known as a robotics researcher, academic, and entrepreneur, Brooks is also an authority on AI: he directed the Computer Science and Artificial Intelligence Laboratory at MIT until 2007, and held faculty positions at Carnegie Mellon and Stanford before that. Brooks, who is now working on his third robotics startup, Robust.AI, has written hundreds of articles and half a dozen books and was featured in the motion picture Fast, Cheap & Out of Control. He is a rare technical leader who has had a stellar career in business and in academia and has still found time to engage with the popular culture through books, popular articles, TED Talks, and other venues.

It gives an answer with complete confidence, and I sort of believe it. And half the time, its completely wrong.
Rodney Brooks, Robust.AI

IEEE Spectrum caught up with Brooks at the recent Vision, Innovation, and Challenges Summit, where he was being honored with the 2023 IEEE Founders Medal. He spoke about this moment in AI, which he doesnt regard with as much apprehension as some of his peers, and about his latest startup, which is working on robots for medium-size warehouses.

Rodney Brooks on...

00:49

Re: IPv6 and Route of Death Open Source Security

Posted by Barry Greene on May 17

My recommendation - check your Exploitable Port Filter rules and include IPv6. Test your gear to insure it can
filter exertion headers.

Read through RFC 9098.

This is an doc on how major ISPs deploy port filtering in their networks. Some are applying RFC 9098.

https://www.senki.org/operators-security-toolkit/filtering-exploitable-ports-and-minimizing-risk-to-and-from-your-customers/

Sent from my iPhone

00:37

Google is going to delete your data forever, if you havent logged into your account for two years Graham Cluley

Google has announced a new policy on dealing with inactive accounts - and it's an important read for anyone who doesn't regularly login. Read more in my article on the Hot for Security blog.

00:30

Inseego and UScellular launch 5G indoor router FX3100 Help Net Security

Inseego has launched the next-generation 5G indoor router FX3100, with UScellular. The new upgraded FX3100, which includes the Qualcomm Snapdragon X62 5G Modem-RF System, adds new capabilities to the current generation FX2000. The new FX3100 solution brings fast broadband internet to residential, enterprise and SMB customers in a form factor that can be easily deployed by end users. UScellular is having success providing broadband internet services using their state-of-the-art 5G network in their region, said More

The post Inseego and UScellular launch 5G indoor router FX3100 appeared first on Help Net Security.

00:25

IPv6 and Route of Death Open Source Security

Posted by Jeffrey Walton on May 17

Hi Everyone,

This seems to have been dropped as a 0-day. I have not seen a CVE
assigned to it.

IPv6 and Route of Death:

* https://www.reddit.com/r/linux/comments/13jfehf/linux_ipv6_route_of_death_0day_no_patch/
* https://news.ycombinator.com/item?id=35950379

I _think_ this is the original writeup:

* https://www.interruptlabs.co.uk//articles/linux-ipv6-route-of-death

Jeff

00:15

Melbet Registration Bangladesh With Bonus Ten Thousand Bdt h+ Media

Melbet Registration Bangladesh With Bonus Ten Thousand Bdt

This shows the digital development of the platform. You have loads of decisions for on-line sports activities as well. Depends Internet connection. If you could have a not stable one, you may have problems with gambling as nicely. Still, the developers did not create an software for something. There are some cons of Melbet that do not appear on the app.

This is a Sponsored Post printed as offered and UdaipurTimes does not endorse any info offered on this post. This game involves an element of economic danger and could also be addictive. Please select a 300% welcome incentive and put the low cost code in .

Its essential to notice that every one payments should be made in local currency . The minimum deposit quantity at MelBet com is 1 Bangladesh Taka whereas the maximum withdrawal quantity is 200 Bangladeshi Taka per transaction. Melbet offers a beneficiant welcome bonus for brand spanking new customers who register and make their first deposit. This bonus is designed to provide customers a head begin on their betting and gaming journey on the platform.

Thats why the streaming function stays essential in addition to live stats and different growing knowledge. The MelBet app may be very delicate and optimized for mobile use. It is designed for mobile video games, as it is user-friendly and very simple to use on the highway. Also, its not too late, nevertheless it works fast, especially with a fast web connection. The time depends on the withdrawal technique you might be using. Most Melbet withdrawal strategies are very quick and processed within quarter-hour to 24 hours.

You can filter video games by 138 builders and 19 categories. The latter, nevertheless, wouldnt have the Hindi translation used in India, and their names are mentioned in English. Melbet login through an app is there for each the app customers. The android and iOS users can have a benefit from the app.

This bookmaker uses SSL encryption to guard knowledge. In addition, the company is dedicated to defending all buyer knowledge. Although the exercise of Melbet has been progressively launched in dozens of nations, it faces authorized restrictions in some nations.

If you have a Melbet promo code, enter it into the corresponding area and end your registration. For these with Android units, Predictor Aviator is available as a helpful app. Playing the Aviator game increases the planes velocity and the amount of cash you receive.

Dont forget to use the promo code on the signup page. Entertainment in this part shouldnt be confused with betting-type TV video games. In one case, we are talking about betting on the show, in the second about keno games and other video games that happen on-line instantly on the Melbet website. Melbet accepts several cryptocurrencies, together with Bitcoin...

00:15

Melbet Promo Code 2023 h+ Media

Melbet Promo Code 2023

MELbet, as properly as most international bookmakers settle for Indian Rupee transactions. There are many optimistic reviews about Melbet on the Internet. On the companys website, there is additionally an Online Consultant service. At the bottom of the display screen, you should put a tick within the box that confirms your acceptance of Melbets rules and their acceptance. We recommend you to read them because when you break these rules, your account can be blocked.

The replenishment of your recreation steadiness by utilizing a cell phone may be accomplished via a personal account. If youre an Indian participant is trying to perform transactions using a special nation, Melbet offers him this chance too. We impose a quantity of situations that must be respected by anybody who needs to complete the Melbet enroll process on our website. Tick the packing containers and make sure that you have learn the Terms and Conditions and Privacy Policy and are legally allowed to register a Melbet account.

The Live Chat button is positioned in the lower right nook. Therefore, at any time you presumably can ask a question that interests you. It should be noted that Melbet.com is the official information companion of the Spanish La Liga. Melbet was based in 2012, has an Eastern European origin and a Curacao license.

Even on the Melbet app, youre unlikely to miss out on any of the top features obtainable from the brand. The company is not stingy with bonus presents and promotions. Some bonuses from the Melbet operator are activated after depositing, and others are supplied for participation in tournaments or totalizers. In addition, the bookmaker can send a player a promo code for a free guess anytime. Bookmaker Melbet attracts the attention of players from completely different countries, including Indian bettors.

Everything is ready, now you should automate if you have already got a recreation account, or create a new one. Create an Melbet new ID account with Melbet, select the deal from the drop-down menu, after which make your preliminary deposit. If you place a wager of 10 or more on horse racing, youll earn 30 in free bets along with a 10 slots bonus. The live casino part can be out there at Melbet India. Users favor to play live roulette, blackjack, and different games at Melbet reside casino.

  • Once the payment is successfully processed, your funds shall be mechanically added to your Melbet account and can be used by you immediately.
  • The major web page accommodates columns with occasions, tables, advertising widgets, registration and login buttons.
  • If users are not significantly keen on T20 cricket however nonetheless need to go forward with the older versions of the sport, Melbet is roofed on this regard as properly.
  • Go to the official internet page or open the application.
  • If you dont place bets incessantly, you are...

00:13

Budget Drones in Ukraine Are Redefining Warfare IEEE Spectrum



The war between Russia and Ukraine is making a lot of high-tech military systems look like so many gold-plated irrelevancies. Thats why both sides are relying increasingly on low-tech alternativesdumb artillery shells instead of pricey missiles, and drones instead of fighter aircraft.

This war is a war of drones, they are the super weapon here, Anton Gerashchenko, an adviser to Ukraines minister of internal affairs, told Newsweek earlier this year.

In early May, Russia attributed explosions at the Kremlin to drones sent by Ukraine for the purpose of assassinating Vladimir Putin, the Russian leader. Ukraine denied the allegation. True, the mission to Moscow was ineffectual, but it is amazing that it could be managed at all.

Like fighter planes, military drones started cheap, then got expensive. Unlike the fighters, though, they got cheap again.

Drones fly slower than an F-35, carry a smaller payload, beckon ground fire, and last mere days before being shot out of the skies. But for the most part, the price is right: Chinas DJI Mavic 3, used by both Russia and Ukraine for surveillance and for delivering bombs, goes for around US $2,000. You can get 55,000 of them for the price of a single F-35. Also, theyre much easier to maintain: When they break, you throw them out, and theres no pilot to be paraded through the streets of the enemy capital.

Close up of a tablet screen shows a drone's eye view of a rural scene, with smoke rising from an area. Hands manipulate the DJI drone controller in front of it. Smoke clouds rise on a flat-screen monitor above a struck target, as a Ukrainian serviceman of the Adam tactical group operates a drone to spot Russian positions near the city of Bakhmut,...

00:13

Melbet Casino Review h+ Media

Melbet Casino Review

With live on line casino video games like Roulette, Blackjack, Poker and Baccarat being continually obtainable, relaxation assured, youll by no means really feel bored here at Melbet. There is also an unique Russian Roulette for gamers to explore. Live casino and reside supplier casinos let you really feel like you would possibly be in a real casino. Real-time betting on casino games corresponding to on-line roulette, on-line blackjack, on-line roulette, online baccarat, online bingo and on-line slots. The catalogue contains games from acknowledged suppliers of the international gaming and betting market. With glorious customer support and a user-friendly interface, 7Cric is the best on-line casino website for Indian players whore on the lookout for a top-notch gambling expertise.

This bookmaker uses SSL encryption to protect knowledge. In addition, the company is dedicated to protecting all buyer data. Although the exercise of Melbet has been steadily launched in dozens of nations, it faces authorized restrictions in some countries.

Next, within the particular window, youll, in fact, want to pick your nation of residence from the listing. Choose any social network or messenger you want to link to your account. After that, youll have to come up with a powerful password, enter it, after which repeat it within the subsequent field. Also, in the next two packing containers, youll need to enter your real name and surname. In the following merchandise, you should enter your cellular number. In the following point, you will need to pick your metropolis of residence from the list, corresponding to Dhaka, Khulna, and others offered.

Given the beneficiant welcome bonus, youll have the opportunity to extend your capital. With this in mind, we recommend that you just go to the official website and use the one-click registration to verify the information offered your self. You can also use the demo mode to test on line casino games. Offers a handy and safe course of for its users, ensuring that entry to the platform is quick and simple, while also sustaining the best ranges of safety. The login course of is easy and easy, requiring only a username and password to entry the platform.

Moreover, its not attainable to withdraw money to accounts that do not belong to the account holder. Melbet provides a self-test questionnaire as well for customers to assess if their spending goes out of hand. Please make certain to ask your self these questions every so often to play protected and addiction-free. Once youre a registered consumer, there is absolutely no restrictions while putting a guess on soccer, tennis or horse racing. With glorious odds and well timed payouts for over 40 sports activities masking over 1500+ tournaments taking place the world over, you truly cant ask for extra. Across all platforms, the deposits are all instant.

...

00:12

Melbet India h+ Media

Melbet India

Almost any sort of wager is accepted at Melbet Sportsbook. There are the standard level spreads, totals, money traces, free bets, and futures bets, as properly as much less frequent options like substitute traces and in-play bets. Every wager placed on the website features a live betting ticket system, enabling customers to withdraw their winnings during nearly any sporting event. Therefore, if a recreation is won, the bettor could possibly money out all or a portion of their winnings early. The video slots in Melbets gaming lobby include basic games, jackpot slots, and well-known video games. Of course, deciding on the top-rated video games will help you make a sensible decision.

For account creation, You can have four methods to strive this the phone quantity, one-click, by e-mail, by way of social community. Not solely that, in addition, however you may also even get to know extra in regards to the provides, app particulars and far more. As you presumably can see, its very easy and easy, plus the Melbet app shall be a great system so that you can use at any time to place bets or play on line casino games. If you wish to know extra in regards to the Melbet app, you can read our article of the identical name.

At 7Cric, were dedicated to making positive that our web site is the go-to alternative for Indian gamers. Besides, responsive live chat and a handy contact type to submit a request are available on the sports betting and on line casino website. While betting on various on line casino titles, you will find lucrative live on line casino presents from Evolution Gaming and different software providers.

MelBet is a secure and secure website, reliably encrypted and guarded. The operator by no means shares user data and cares about its friends privateness. You may count on discreet gambling, assured withdrawals, and prompt buyer assist. Although the platform appears very attractive, a query like MelBet is actual or fake? You can safely play video games and place real-money bets. The operator is a 100% legit firm launched in 2012 by Pelican Entertainment B.V., licensed in Curacao.

All it takes is giving us slightly data like what state or nation you reside in and a few primary contact data. A bettor and handicapper who makes a speciality of IPL contest. Worked as lead sports betting analyst for Pickswise. Since Andrew is with our group, he passionately talks about cricket and doesnt cease to share his love for the sport, and attracts increasingly individuals to it. After a successful registration, you will want to prime up your private account with some actual money.

  • Then it is possible for you to to launch the appliance by way of a shortcut on your desktop.
  • Once you present the sportsbook with the required paperwork as properly as your mobile quantity, you are good to go, most likely within the next 24 hours.
  • It is impossible to imagine the...

00:11

Melbet Registration And Account Verification In Bangladesh h+ Media

Melbet Registration And Account Verification In Bangladesh

The bookie could be very a lot targeted on securing the web betting market in India. Though it began in 2012 it started its operations in India extra intensively just in latest times. In the below, we focus on the Melbet login, sign up course of in India and the way the melbet login via app works and extra. Its essence may be very easy a shopper of the bookmakers company receives promo points for each bet in any of the video games. As quickly as they have accumulated the required number, exchanging them at no cost bets is feasible. Of course, the player chooses in which sport to use the present.

  • MelBet Indian betting from smartphones and tablets is possible directly by way of cellular browsers.
  • The platform is easy to use even for somebody new to the online gambling area.
  • Every time you begin the consumer, it mechanically checks for updates.
  • This site offers three various sorts of bets with just one approach to accumulate.
  • In the very first window, you have to enter your mobile phone quantity after selecting the world code.

You shall be redirected to the App Store, where you can obtain the app free of charge. After that, you should use all the features of Melbet bookmaker at any time and in anywhere. Roulette is one other classic casino sport that is simple to be taught however difficult to master.

The bottom of the bet slip will display the minimal and maximum stakes that can be utilized in your alternatives. If multiple choices have been added to the bet slip, a drop-down menu will state the various varieties of bets that can be placed, multiple bets, system bets and so forth. Placing a Melbet sports guess simply requires you to decide on the selection or choices that you just wish to place a guess on and click on the odds. One indicator or a great bookie is the selection of betting markets that they have for every explicit sporting occasion. The Melbet sign-up bonus is a one hundred pc matched offer as a lot as 8000 INR.

Knowing concerning the worries of their purchasers, Melbet all the time pays attention to the model new developments within the subject of cybersecurity. Currently, all knowledge on the web site and platform is protected by one of the best cryptographic protocols. Thats why as lengthy as you dont give your account particulars to anyone, your personal info will be completely secure.

Since that point, the service has been growing and getting increasingly clients. Now, it is among the most recognized providers in the world. The service operates in forty-five languages that making its clientele worldwide.

The company is forced to provide gamers higher odds with low margins in order to appeal to gamers from well-known bookmakers. So, for example, on the matches of the ultimate collection of the NBA playoffs, the margin was 3-4% this is incredibly small. To get entry...

00:10

Melbet Registration & Login h+ Media

Melbet Registration & Login

You can deposit cash into your account utilizing quite lots of methods, together with credit/debit playing cards, e-wallets, and even cryptocurrency. The minimum deposit amount is just 1 USD, whereas the utmost deposit quantity is determined by your methodology. All new gamers at Melbet can reap the advantages of beneficiant welcome bonuses after they join and make their first deposit. Volleyball is one other trendy sport amongst Melbet customers. This could be explained by the reality that this discipline is consistently gaining recognition worldwide. This makes betting on volleyball even more interesting and exciting.

The user will be prompted to enter their password, which they created in the course of the registration process, in the acceptable area. Melbet provides a comprehensive vary of providers and features for its users, together with a secure and user-friendly system. Melbet India Bookmaker is considered one of the leading sports activities betting sites within the nation. It is a popular platform for many who are excited about inserting their bets on basketball. Melbet india users can place their bets on basketball matches and champions, stay scores and points, or they could select to make an accumulator guess with different occasions. The website offers a big variety of markets that assist its users earn more money after they win their wagers.

Melbet has so much to offer, and it is due to this that this platform deserves the attention and time of users. Despite the truth that the company continues to be very young, it does not stop it from combating for the main place on the planet of online betting. Today, it is amongst the main sports betting companies in India, where tens of millions of gamers started earning cash with the bookmaker that continues its work till this day. If you get pleasure from inserting bets on sporting events as they are happening, then Melbet is certainly the right bookmaker for you. They offer an excellent reside betting platform with numerous markets and interesting proposition bets out there.

In order to offer the documentation, the gambler might need to take a picture of it and connect it to the box on the web site. The top a half of the registration kind will include the strategies of registration. A potential Melbet buyer has to choose one of the choices supplied. Account verification is critical to check the consumer for the authenticity of the entered information.

You also can use the self-exclusion feature to freeze your account to be able to take a break from gambling for an indefinite amount of time. Traditional on line casino video games such as Blackjack, Baccarat, Roulette, and so on. All games are verified and developed by trusted builders similar to Asia Gaming, GamePlay, and so on. Melbet presents shoppers from India with a nice service throughout all areas such as money transfers. The better part about finishing the Melb...

00:09

Aviator Predictor V1 94 Apk Mod 2023 Free Download Iphone h+ Media

Aviator Predictor V1 94 Apk Mod 2023 Free Download Iphone

However, the processing time for most withdrawal requests is often within 24 hours. It is important to note that each one promotions and bonuses offered by Melbet include terms and conditions. Customers are advised to carefully learn and understand the terms and conditions earlier than collaborating in any promotion or claiming any bonus. Additionally, promotions and bonuses could have completely different eligibility criteria and necessities, similar to minimal deposit quantities or particular betting requirements.

The odds are fairly good, so youve a chance to make respectable income. Melbet offers promo codes with which you can make free bets, get deposit bonuses, free spins, and more. The Bonus for 100 Bets promotion is designed for normal customers of the Melbet bookmaker.

You shall be redirected to the App Store, the place youll have the ability to download the app at no cost. After that, you can use all of the capabilities of Melbet bookmaker at any time and in anywhere. Roulette is another traditional casino game that is straightforward to study but difficult to grasp.

You may rest assured figuring out the positioning encrypts your personal information, and all deposit and cash-out transactions. Indian players today are tremendous demanding regarding the choice of bookies. And, there is a simple clarification behind that an array of sports activities betting sites exist, but a few of them scam. If you may be on the path of selecting a reliable bookie, with no signs of rigging but legitimate licenses, Melbet registration is a go-choice. You will have the ability to get from 20 Free Spins on any online casino slots. Registration within the Melbet utility can be not difficult.

To do that, you have to present personal information, in addition to details about essentially the most convenient payment system for you. The info provided must be accurate in order for us to offer a withdrawal of funds. Bookmaker MelBet is the subsequent hottest bookmaker after X. Increasingly, users are choosing the convenient and fast access. To do that, its proposed to obtain Melbet app for Android and use the whole service in a compact, but no less handy, cell kind. Unfortunately for iOS users, positioning.

Melbet India presents a broad variety of generous bonus and promotional offers to its members. Yes, Melbet runs in India with Curacao Gaming Authority permission, which allows it to concurrently provide sports betting and casino video games on its site. Melbet is a on line casino and betting firm established in Cyprus that has been growing in recognition over the last several years. The web site caters to all types of sports gamblers, however we consider live betting is where they actually shine, with hund...

00:00

ammune.ai integrates with Intel to protect Kubernetes clusters from API attacks Help Net Security

Ammune.ai (Formerly L7 Defense), has integrated its API security solution ammune, with the Intel NetSec Accelerator Reference Design, providing node-based protection for Kubernetes clusters from API attacks. The deployment architecture incorporates the integration of ammune RT-units with the Intel NetSec Accelerator Reference Design, a blueprint delivering the functionality of a server in an Intel processor-based PCIe add-in card which minimizes CPU processing requirements for cybersecurity operations. Additionally, ammune Analytic Units are utilized to remotely support More

The post ammune.ai integrates with Intel to protect Kubernetes clusters from API attacks appeared first on Help Net Security.

00:00

Two Factor Authentication Apps: Mistakes to Malware Hackaday

Everyone in security will tell you need two-factor authentication (2FA), and we agree. End of article? Nope. The devil, as always with security, is in the details. Case in point: in the last few weeks, none less than Google messed up with their Google Authenticator app. The security community screamed out loud, and while its not over yet, it looks like Google is on the way to fixing the issue.

Since 2FA has become a part of all of our lives or at least it should lets take a quick dip into how it works, the many challenges of implementing 2FA correctly, what happened with Google Authenticator, and what options youve got to keep yourself safe online.

You probably know or use Google Authenticator, Microsoft Authenticator, or an app like Authy. What all of these authenticator apps have in common is the generation of a time-dependent six digit number, given a secret key. Perhaps you scanned that secret key into your phone...

Wednesday, 17 May

23:47

[$] The state of the page in 2023 LWN.net

to folios was never going to be done in a day. At a plenary session at the start of the second day of the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit, Matthew Wilcox discussed the current state and future direction of this work. Quite a lot of progress has been made and a lot of work remains to be done.

23:44

OilAlpha: Emerging Houthi-linked Cyber Threat Targets Arabian Android Users The Hacker News

A hacking group dubbed OilAlpha with suspected ties to Yemen's Houthi movement has been linked to a cyber espionage campaign targeting development, humanitarian, media, and non-governmental organizations in the Arabian peninsula. "OilAlpha used encrypted chat messengers like WhatsApp to launch social engineering attacks against its targets," cybersecurity company Recorded Future said in a

23:39

Ubuntu Knocks On Docker In Latest Snaps Promotion Phoronix

While for an Ubuntu desktop user that is used to running Snap versions of Firefox and other desktop application sandboxing it may seem strange for Canonical to be comparing Snaps to Docker containers, the emphasis of their comparison is on the IoT/edge computing side where they are trying to better position Snaps as a superior alternative to using Docker containers...

23:39

Debian pauses its /usr merge again LWN.net

The Debian Technical Committee has announced a new moratorium on moving files from the root into /usr, a necessary part of its UsrMerge project. Many distributions have made this change, but Debian has had more difficulties than most; LWN last looked at this project one year ago.

This moratorium lasts until we vote to repeal it. We expect to do that during the trixie development cycle, and sooner rather than later. We will continue to facilitate efforts to resolve the remaining issues that stand in the way of safely repealing the moratorium.

Trixie is the codename for Debian 13, the upcoming major release cycle.

23:30

Amartus partners with ServiceNow to offer industry standard inter-party automation process and APIs Help Net Security

Amartus has partnered with ServiceNow to offer Enterprises and Service Providers a combined solution for rapid implementation of MEF LSO (Life-cycle Service Orchestration) industry standard processes and APIs to automate trading & operation of services that underpin todays Enterprise Network & IT environments. Enterprise Networking and IT environments are undergoing radical transformation driven by the need to connect their increasingly global and mobile employee, customer & partner base to business applications running in geographically distributed More

The post Amartus partners with ServiceNow to offer industry standard inter-party automation process and APIs appeared first on Help Net Security.

23:28

[$] Computational storage LWN.net

A new development in the NVMe world was the subject of a combined storage and filesystem session led by Stephen Bates at the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit. Computational storage namespaces will allow NVMe devices to offer various types of computationanything from simple compression through complex queries and data manipulationsto be performed on the data stored on the device.

23:22

Drug-Resistant Ringworm Reported in US for First Time; Community Spread Likely SoylentNews

The newly emerging fungal pathogen is often misidentified in common lab tests:

A dermatologist in New York City has reported the country's first known cases of highly contagious ringworm infections that are resistant to common anti-fungal treatmentsand caused by a newly emerging fungus that is rapidly outstripping other infectious fungi around the world.

In February, the dermatologist reported two cases to health officials in the state, which are described in a brief case study published Thursday in the Centers for Disease Control and Prevention's Morbidity and Mortality Weekly Report.

[...] Ringwormaka tineas, dermatophytosis, jock itch, and athlete's footis a superficial fungal infection of the skin that causes red, itchy, sometimes scaly circular rashes. There are more than 40 different species of fungi that can cause the infection, which spreads from infected people and animals and also lurks in environments and on common household items, like towels. Ringworm is extremely common and can strike anyone. Usually, it's treatable with over-the-counter creams.

[...] While alarming, the identification of cases in the US is not surprising. The fungus behind the infections is Trichophyton indotineae (previously described as Trichophyton mentagrophytes type VIII), which is a newly emerging fungus globally. Though genetic studies date isolates back to at least 2008 in Australia, a multidrug-resistant lineage seemed to erupt in India between 2017 and 2018. Since then, it has reached epidemic proportions in the subcontinent, replacing other common causes of ringworm, and the pathogen has rapidly emerged in many countries throughout Asia and Europe, and Canada.

[...] The rise of T. indotineae is linked to the abuse of topical treatments that contain egregiously large combinations of steroids and antifungal/antibacterial agents, spurring the development of resistance. This is particularly a problem in India.


Original Submission

Read more of this story at SoylentNews.

23:18

Gemini Links 17/05/2023: Contact Juggling and Debt Ceiling Bullshit Techrights

  • Gemini* and Gopher

    • Personal

      • Contact Juggling

        Contact Juggling is a physical skill and performance art that is close to juggling, except the balls stay in contact with your body.

        Its much less well known than juggling.

        When I saw performers contact juggling in the background in an episode of Deep Space Nine I had no idea what it was called, even, but I thought That looks great! It must be possible to learn. Ill do that.

      • SpellBinding: AEKMVRO Wordo: TWATS
      • Parallels

        Some things related to my experiences of being a trans woman, experiences i feel parallel another area of my life: one which should be a source of joy, but is actually a source of painful exclusion for me. No, i wont elaborate here; the situation is difficult enough as it is.

    • Politics

      • Debt Ceiling Bullshit

        Once again mainstream media is escalating the last-minute debt ceiling
        doomsday propaganda.

        The so-called debt ceiling is complete bullshit. A piece of paper is signed, and for no good reason at all the state can borrow trillions of dollars. This was done 78 times since 1960, more than once every year. Its a joke.

        Every now and then, a crisis develops. A bunch of morons cant sign a piece of paper, and we cant pay our bills The world might end at the end of the month.

    • Technical

      • Reflecting on Recent Experiences

        The last several weeks have been extremely consequential for me. Back in April, I had the privilege to travel to California as a result of participating in a group project involving the career technical organization my IT class is a part of, which was frankly a fantastic experience. I also finally passed t...

23:15

Syam Nair joins Zscaler as CTO Help Net Security

Zscaler announced that Syam Nair has been appointed as the companys Chief Technology Officer and EVP of Research and Development. In this role, Nair will be responsible for driving the research and development engines to expand Zscalers Zero Trust Exchange platform, accelerate AI/ML innovations, and further scale the largest security cloud in the world. Nair will join Zscalers senior executive team on May 24, 2023. I am excited to welcome Syam to the Zscalers leadership. More

The post Syam Nair joins Zscaler as CTO appeared first on Help Net Security.

23:13

OpenBMC 2.14 Apparently Released Phoronix

The OpenBMC Linux Foundation collaborative project providing an open-source operating system / firmware stack for server baseboard release management still seems to be in a bit of disarray with OpenBMC 2.13 also having been released yesterday, but at least the code continues moving along...

23:11

KeePass flaw allows retrieval of master password, PoC is public (CVE-2023-32784) Help Net Security

A vulnerability (CVE-2023-32784) in the open-source password manager KeePass can be exploited to retrieve the master password from the softwares memory, says the researcher who unearthed the flaw. The bad news is that the vulnerability is still unfixed and that a PoC exploitation tool aptly named KeePass 2.X Master Password Dumper is publicly available, but the good news is that the password cant be extracted remotely just by exploiting this flaw. If your More

The post KeePass flaw allows retrieval of master password, PoC is public (CVE-2023-32784) appeared first on Help Net Security.

23:07

US Gov offers a $10M reward for a Russian ransomware actor Security Affairs

The US government is offering a $10M reward for Russian national Mikhail Pavlovich Matveev (30) charged for his role in ransomware attacks

The US Justice Department charged Russian national Mikhail Pavlovich Matveev (30), aka Wazawaka, m1x, Boriselcin, and Uhodiransomwar, for his alleged role in multiple ransomware attacks.

The DoJ unsealed two indictments charging the man with using three different ransomware families in attacks aimed at numerous victims throughout the United States. The attacks hit law enforcement agencies in Washington, D.C. and New Jersey, as well as organizations in the healthcare and other sectors nationwide.

According to the indictment obtained in the District of New Jersey, from at least as early as 2020, Mikhail Pavlovich Matveev, aka Wazawaka, aka m1x, aka Boriselcin, aka Uhodiransomwar, allegedly participated in conspiracies to deploy three ransomware variants. reads the press release published by DoJ. These variants are known as LockBit, Babuk, and Hive, and Matveev transmitted ransom demands in connection with each.

According to the DoJ, total ransom demands allegedly made by the members of these three global ransomware campaigns to their victims is greater than $400 million. The total victim ransom payments amount to as much as $200 million.

On or about June 25, 2020, Matveev and his LockBit coconspirators targeted a law enforcement agency in Passaic County, New Jersey. On or about May 27, 2022, the man and his Hive coconspirators allegedly hit a nonprofit behavioral healthcare organization in New Jersey. On April 26, 2021, Matveev and his Babuk coconspirators hit the Metropolitan Police Department in Washington, D.C.

The Russian citizen has been charged with conspiring to transmit ransom demands, conspiring to damage protected computers, and intentionally damaging protected computers. If convicted, the man could face a sentence of over 20 years in prison. 

The man is suspected to be living in Russia and is operating from that country. Clearly, due to the ongoing geopolitical crisis, its unlikely that Russia will capture the man to extradite him to the United States. 

From Russia and hiding behind multiple aliases, Matveev is alleged to have used these ransomware strains to encrypt and hold hostage for ransom the...

23:00

Mithril Security raises 1.2 million to protect data privacy in AI Help Net Security

With BlindBox, you can use Large Language Models without any intermediary or model owner seeing the data sent to the models. This type of solution is critical today, as the newfound ease-of-use of generative AI (GPT4, MidJourney, GitHub Copilot) is already revolutionizing the tech industry. Its fun (and somewhat existentially terrifying) to use ChatGPT. Its so easy to use the tool that you can feel both amazed by the future possibilities and worried at how More

The post Mithril Security raises 1.2 million to protect data privacy in AI appeared first on Help Net Security.

22:53

[$] High-granularity mappings for huge pages LWN.net

The use of huge pages can make memory management more efficient in a number of ways, but it can also impose costs in the form of internal fragmentation and I/O amplification. At the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit, James Houghton ran a session on a scheme to get the best of both worlds: using huge pages while maintaining base-page mappings within them.

22:49

Eight stable kernels LWN.net

The 6.3.3, 6.2.16, 6.1.29, 5.15.112, 5.10.180, 5.4.243, 4.19.283, and 4.14.315 stable kernels have all been released; each contains another set of important fixes. Note that 6.2.16 will be the final update for the 6.2 kernel.

22:40

OnLogic Taps Intel Raptor Lake For 1U Axial AC101 Edge Server Phoronix

The folks at OnLogic have released the Axial AC101 as a new edge server offering that is powered by Intel Core 13th Gen "Raptor Lake" processors and this BMC-enabled, shallow-depth server can accommodate up to 150 Watt PCI Express expansion cards in aiming to make this compact edge server ideal for machine learning, AI, and other IoT use-cases...

22:39

TP-Link routers implanted with malicious firmware in state-sponsored attacks Help Net Security

A Chinese state-sponsored APT group implanted malicious firmware into TP-Link routers as part of attack campaigns aimed at European foreign affairs entities, say Check Point researchers. Custom malicious firmware for TP-Link routers The malicious firmware was exclusively created for TP-Link routers. Among its many harmful components, theres also a customized backdoor dubbed Horse Shell. Horse Shell has three main functionalities: Remote shell Gives threat actors full access to the infected device File transfer More

The post TP-Link routers implanted with malicious firmware in state-sponsored attacks appeared first on Help Net Security.

22:30

Brivo and Eagle Eye Networks announce $192 million investment Help Net Security

Eagle Eye Networks and Brivo announced one of the largest investments to date in cloud physical security. SECOM, one of the largest security integration companies in the world, according to Forbes Global 2000, has made a primary equity investment of $192 million in the two companies, $100M in Eagle Eye Networks and $92M in Brivo. Eagle Eye Networks and Brivo are independent companies majority owned by Dean Drako. Drako founded Eagle Eye Networks in 2012 More

The post Brivo and Eagle Eye Networks announce $192 million investment appeared first on Help Net Security.

22:22

Security updates for Wednesday LWN.net

Security updates have been issued by Debian (netatalk), Mageia (connman, firefox/nss/rootcerts, freeimage, golang, indent, kernel, python-django, python-pillow, and thunderbird), Red Hat (apr-util, firefox, java-1.8.0-ibm, libreswan, and thunderbird), SUSE (conmon, curl, java-11-openjdk, and libheif), and Ubuntu (libwebp, linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-hwe-5.15, linux-ibm, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-oracle, linux, linux-aws, linux-aws-hwe, linux-kvm, linux, linux-aws, linux-azure, linux-azure-5.19, linux-kvm, linux-lowlatency, linux-raspi, node-eventsource, and openjdk-8, openjdk-lts, openjdk-17, openjdk-20).

22:16

CVE-2023-24805: RCE in cups-filters, beh CUPS backend Open Source Security

Posted by Till Kamppeter on May 17

Following bug got reported to OpenPrinting's GitHub, repo cups-filters,
as a private (security) issue report:

https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x

Summary

If you use "beh" to create an accessible network printer, this security
vulnerability can cause remote code execution.

Details

cups-filters/backend/beh.c

Line 288 in 5c9498a
retval = system(cmdline) >> 8;

//...

22:15

Entro raises $6 million to address secret-based breaches Help Net Security

Entro announced $6 million in seed funding led by StageOne Ventures and Hyperwise Ventures. Founded by CEO Itzik Alvas and CTO Adam Cheriki to address secret-based breaches, Entro continuously monitors and protects secrets and programmatic access to cloud services and data. Angel investors include Rakesh Loonkar, founder of Trusteer and Transmit Security, Mickey Boodaei, founder of Imperva, Trusteer and Transmit Security, and Amichai Shulman, founder of Imperva and AirEye. According to the Verizon 2022 Data More

The post Entro raises $6 million to address secret-based breaches appeared first on Help Net Security.

22:00

Veza launches Authorization Platform on the Snowflake Data Cloud Help Net Security

Veza has unveiled that the Veza Authorization Platform is now available on the Snowflake Data Cloud. With this integration, joint customers can now manage access permissions and secure their sensitive data at scale. By leveraging the Snowflake Data Cloud, Veza is joining Snowflake in mobilizing the worlds data to help organizations secure access to sensitive data and achieve continuous compliance. As the volume of data companies store increases, so does the number of identities, SaaS More

The post Veza launches Authorization Platform on the Snowflake Data Cloud appeared first on Help Net Security.

21:54

Identifying a Patch Management Solution: Overview of Key Criteria The Hacker News

Software is rarely a one-and-done proposition. In fact, any application available today will likely need to be updated or patched to fix bugs, address vulnerabilities, and update key features at multiple points in the future. With the typical enterprise relying on a multitude of applications, servers, and end-point devices in their day-to-day operations, the acquisition of a robust patch

21:52

Threat Group UNC3944 Abusing Azure Serial Console for Total VM Takeover The Hacker News

A financially motivated cyber actor has been observed abusing Microsoft Azure Serial Console on virtual machines (VMs) to install third-party remote management tools within compromised environments. Google-owned Mandiant attributed the activity to a threat group it tracks under the name UNC3944, which is also known as Roasted 0ktapus and Scattered Spider. "This method of attack was unique in

21:24

A New Electrocatalyst Massively Improves the Commercial Viability of Green Hydrogen Lifeboat News: The Blog

Scientists have typically used precious metal catalysts, such as platinum to accelerate the separation of water into hydrogen and oxygen. The Curtin team found that by adding nickel and cobalt to cheaper catalysts, they could enhance their performance, making them worth exploring as a commercially viable alternative. The researchers published the results of their findings in the journal Nano Energy.

21:23

Exciting battery technology breakthrough announced Lifeboat News: The Blog

CATL, a Chinese battery manufacturer, has created a condensed battery that it says could help power electric aircraft while meeting the required safety and energy standards.

The company claims the batterys energy density is 500 watt-hours per kilogram, making it much more robust than it looks. This means that the battery can push out more power from a lighter component than the current options.

The belief is that condensed batteries will open the door to improved power systems for both electric cars and even the aviation field. Finding more efficient ways to handle power generation while also remaining lightweight is essential for both these fields, especially as electric cars try to offer longer ranges.

21:23

Meta is here and its a big deal Lifeboat News: The Blog

Meta and other companies are building the next-level digital world right now and this will completely change how we interact with the world.

21:22

Weird particle that remembers its past discovered by quantum computer Lifeboat News: The Blog

Particles with unusual properties called anyons have long been sought after as a potential building block for advanced quantum computers, and now researchers have found one using a quantum computer.

By Alex Wilkins

21:22

Does SIRT6 hold the key to human longevity? Lifeboat News: The Blog

Last week, US-Israeli startup SIRTLab announced the appointment of leading geroscience researcher Nir Barzilai as its Chief Medical Adviser. The company is focused on the development of therapeutics that boost levels of a key protein called sirtuin 6 (SIRT6), which is heavily implicated in longevity.

Sirtuins are a group of proteins found in all living organisms, including humans, that play a vital role in regulating various cellular processes. There are seven different types of sirtuins, numbered from SIRT1 to SIRT7, each with its own unique functions. In recent years, SIRT6 has gained particular attention for its potential role in promoting healthy aging, and SIRTLab has put the protein at the center of its work.

Longevity. Technology: The SIRT6 protein has been shown to regulate several critical cellular pathways, including glucose metabolism, DNA repair and inflammation all of which play key roles in aging and longevity. One of the worlds leading authorities on SIRT6 is SIRTLab co-founder and Bar-Ilan University professor Haim Cohen, whose research is behind the companys work to develop therapeutics with longevity-boosting potential. To learn more about SIRTLabs longevity-first approach, we spoke to its co-founder and CEO Boaz Misholi.

21:00

Mythic I: An Exploration of Artisanal Computing Hackaday

While computers have become ever faster and more capable over the years, its hard to say theyve become any more exciting. In fact, theyve become downright boring. Desktop, laptop, or mobile, theyre all more or less featureless slabs of various dimensions. Theres not even much in the way of color variation the classic beige box is now available with white, black, or metallic finishes.

Believing that such a pedestrian appearance isnt befitting a device that puts the worlds collected knowledge at our fingertips, [Keegan McNamara] started exploring a more luxurious approach to computing. Gone is the mass produced injection molded plastic, in its place is hand-carved maple and Tuscan leather. Common computing form factors are eschewed entirely for a swooping console inspired by fine furniture and classic sports cars. The final result, called the Mythic I, is equal parts art and science. Not just a bold reimaging of what a computer can be, but an object to be displayed and discussed.

...

20:52

Judge Sides With YouTube in Mexican Movie Tycoons Piracy Lawsuit TorrentFreak

YouTubeTwo years ago, Spanish-born movie tycoon Carlos Vasallo sued YouTube at a Florida federal court over various piracy-related claims.

The actor and producer own the rights to the worlds largest collection of Mexican and Latin American movies, many of which are illegally shared on YouTube.

The lawsuit accused YouTube of not doing enough to stop people from uploading pirated content. Those allegations arent new, but the movie tycoon also said that YouTube would not allow him to join the Content ID copyright protection program unless he agreed to specific terms, including a revenue share agreement.

Vasallo refused these terms and chose to send standard DMCA notices instead. YouTube processed them, as it should, but the movie tycoon complained that this did little to stop pirates. New copies were constantly uploaded and banned users reportedly returned under new aliases.

Motions of Summary Judgment

YouTube and Google vehemently disagreed with the copyright infringement allegations and filed a motion to dismiss. This was partially successful as the Florida federal court dropped the antitrust claims, but the infringement allegations remained.

As the case progressed, both parties submitted motions for summary judgment, which were filed under seal.

The movie tycoon alleged that, because YouTube only took down reported videos and failed to use its piracy filtering technology to find and voluntarily remove similar videos, the platform is liable for direct and secondary copyright infringement.

YouTube also submitted a motion for summary judgment to establish that it does nothing wrong. According to the company, the DMCA doesnt require platforms to proactively monitor uploads, on the contrary. Also, the movie tycoon failed to provide any evidence that YouTube was aware of non reported infringing videos.

Both motions for summary judgment landed on the desk of Magistrate Judge Edwin Torres, who issued a detailed report and recommendations yesterday. The Judge sides with YouTube and concludes that since the movie tycoon has no triable case, the lawsuit should be closed.

Monitoring Uploads

Under the DMCA, platforms such as YouTube are required to respond to takedown requests. In this case, there is little doubt that the video platform did so. However, the movie tycoon argued that it should have used its piracy filtering technology to find similar videos and remove these as well.

This piracy det...

20:48

PipeWire 0.3.71 Released With Performance Improvements, Zero Latency JACK D-Bus Bridge Phoronix

PipeWire 0.3.71 is out today as the newest update to this now widely-used open-source solution for managing Linux audio and video streams and serving as a viable replacement to the likes of PulseAudio and JACK for audio needs on the Linux desktop...

20:35

Lead Vocal Tracks in Popular Music Go Quiet SoylentNews

Lead Vocal Tracks in Popular Music Go Quiet:

A general rule of music production involves mixing various soundtracks so the lead singer's voice is in the foreground. But it is unclear how such track mixing and closely related lyric intelligibility has changed over the years.

Scientists from the University of Oldenburg in Germany carried out an analysis of hundreds of popular song recordings from 1946 to 2020 to determine the lead vocal to accompaniment ratio, or LAR. Their results appear in JASA Express Letters, published on behalf of the Acoustical Society of America by AIP Publishing, and show that, contrary to expectations, the LAR for popular music decreased over the decades in question. This means that, relative to their bands, lead singers are getting quieter.

An earlier study suggested that lead vocals were mixed at a higher level than other instruments, but it looked at songs that were not fully representative of popular Western music. The current study rectified this by considering the four highest-ranked songs from the Billboard Hot 100 chart for each year from 1946 to 2020.

[...] "Our analysis showed a significant downward trend in the LAR from about 5 decibels in 1946 to approximately 1 decibel in 1975, after which time the LAR remained constant," Gerdes said.

The investigators wished to determine whether LAR values changed over time to improve the intelligibility of lyrics or if changes in music technology were involved. Electrical amplification of instruments might, for example, be a factor, as could multitrack and stereophonic recording technology. They found that changes in music technology appear to be behind the observed decrease in LAR until 1975.

"Another possibility involves the stylistic evolution within popular music," author Kai Siedenburg said.

Journal Reference:
Karsten Gerdes; Kai Siedenburg; Lead-vocal level in recordings of popular music 19462020 [open], JASA Express Lett 3, 043201 (2023) https://doi.org/10.1121/10.0017773


Original Submission

Read more of this story at SoylentNews.

20:30

Intel CR 23.13.26032.30 Further Improves Intel's Open-Source GPU Compute Stack Phoronix

The Intel Compute-Runtime 23.13.26032.30 update was released today as the newest monthly feature update to this open-source GPU compute stack used on Windows and Linux for OpenCL and oneAPI Level Zero support. With this release comes various improvements and new features like FP64 emulation for Arctic Sound M...

20:17

Serious Unpatched Vulnerability Uncovered in Popular Belkin Wemo Smart Plugs The Hacker News

has been found to contain a buffer overflow vulnerability that could be weaponized by a threat actor to inject arbitrary commands remotely. The issue, assigned the identifier CVE-2023-27217, was discovered and reported to Belkin on January 9, 2023, by Israeli IoT security company Sternum, which reverse-engineered the device and

20:06

libei 1.0 Nears For Emulated Input On Wayland Phoronix

Libei has been the multi-year effort by Red Hat's leading input expert Peter Hutterer on emulated input handling for Wayland. Libei consists of a client side library and EIS as the "Emulated Input Server" for this Wayland-focused emulated input device solution. Libei 1.0 is about to finally be released...

19:39

Debian Votes To Reinstate Merged-/usr File Movement Moratorium Phoronix

The Debian Technical Committee has voted to reinstate the merged-/usr file movement moratorium...

18:40

State-Sponsored Sidewinder Hacker Group's Covert Attack Infrastructure Uncovered The Hacker News

Cybersecurity researchers have unearthed previously undocumented attack infrastructure used by the prolific state-sponsored group SideWinder to strike entities located in Pakistan and China. This comprises a network of 55 domains and IP addresses used by the threat actor, cybersecurity companies Group-IB and Bridewell said in a joint report shared with The Hacker News. "The identified phishing

18:00

Cornering the Antenna Market Hackaday

Sometimes antennas can seem like black magic. However, when you see things like a dish antenna, it sort of makes sense, right? Just like a mirror focuses light, the parabola of a dish focuses RF energy. But [IMSAI Guy] shows another common-sense antenna arrangement: a corner reflector dipole. He had built one years ago and decided to do a bit of research and make another one.

In a clever use of copper-clad board, he was able to make a reasonable reflector by soldering together three boards and an RF connector. A single wire makes the driven element, and by bending it to just the right position, you can change the characteristic impedance for matching.

The antenna, in this case, is essentially a quarter-wave antenna with a ground plane and reflector arrangement. After the obligatory chalk talk, he breaks out the vector network analyzer and shows how well it matches. He didnt, however, measure the gain or directional selectivity due to the reflector.

Intuitively, youd think this kind of antenna would be good for direction finding purposes. In fact, hams that use handy talkies for direction finding often use their bodies to block signals, much like these reflectors should.

The [IMSAI Guy] reflector is pretty small, but you can easily make bigger ones. Using PCB material for antennas isnR...

17:54

Tesla Lithium Refinery in Texas is a First for a U.S. Automaker SoylentNews

CEO Elon Musk said the plant will protect against a future "choke point" on battery-grade lithium availability:

In a first among United States automakers, Tesla will begin refining its own lithium, a critical material for electric vehicle batteries.

The company broke ground on a $375 million lithium refining plant in Corpus Christi, Texas, this week, which CEO Elon Musk said will process enough lithium for 1 million vehicles annually.

"We thought it was important to address ... a fundamental choke point in the advancement of electric vehicles, [which] is the availability of battery-grade lithium," Musk said at the groundbreaking ceremony on Monday.

[...] Over the last year, the Biden administration has directed billions of dollars to automakers, materials processors, and start-up companies to help address this gap in domestic battery manufacturing. The Inflation Reduction Act, signed into law last August, also adjusted the Clean Vehicle Tax Credit so that eligible vehicles must meet certain battery sourcing requirements, with materials largely coming from the U.S. or free-trade-agreement partners.

Tesla processing its own lithium will help ensure the company's vehicles qualify for those credits and will protect it from supply chain fluctuations and geopolitical disruptions. While it is the only U.S. automaker with a plan to refine its own lithium so far, General Motors announced in January that it would invest $650 million in the Thacker Pass lithium mining project in Nevada.

Tesla claims its refining process is more environmentally friendly and will consume 20 percent less energy than conventional methods. It will also produce less-toxic byproducts that could be repurposed in construction materials, the company said. "We end up as a net environmentally very neutral site," said Turner Caldwell, senior manager of battery minerals and metals at Tesla. The company estimates construction on the Texas plant will conclude in 2025.

[...] Caldwell said that while the Texas facility's lithium will originally come from hardrock mines, the process is designed to be "feed flexible," meaning it could in the future refine lithium from recycled sources, such as manufacturing scrap and end-of-life batteries.


Original Submission

Read more of this story at So...

17:00

Discoveries of Ancient Underground Cities Around the World Terra Forming Terra




This iten addresses the extensive global nature of large underground complexes built in competant living rock .  Typically dry even though that may well be what we can see.

From the evidence, it is based upon a lifeway that conforms to the global Bronze Age and post stone Age.  No obvious flints and all that.  We are also missing the above ground surround in most of this or at least seeing only bits and pieces.

so why were they built?  Certainly they can provide protection and storage until an attacking force went away..  That may be good enough.

what is not understood is how?  They used a blow torch type device with a collar to popcorn the underying stone.  The third picture here shows us just that.  That can easily be trimmed with mallets as necessary.

Once a crew was at work with a air pusher and tubes along with any flammable oil, you are in business.



Discoveries of Ancient Underground Cities Around the World

UPDATED 13 MAY, 2023 - 23:01 JOANNA GILLAN


https://www.ancient-origins.net/ancient-places/underground-cities-00559?


Beneath the surface of our world, hidden under layers of soil, stone, and history, lie remnants of ancient civilizations - vast networks of tunnels, expansive underground cities , and complex subterranean structures. Our ancestors demonstrated remarkable ingenuity, carving out these intri...

A Canadian Century Terra Forming Terra






a long time ago,Canada learned that when you bring in new citizens able to make it here, that their children will all become good loyal Canadians, whatever the parents are or were.

The hard part will be sourcing those new citizens.  It is certainly global and many are picking up on established enterprises here.  This has made a solid market for small business here.

I would like to say it is all well planned, but really not so much.  It is a case of real demand for full modernity without attempting to struggle for it back home.  Canada happens to be the sweet spot if you can afford it all.  except just about everywhere we have educated citizens who can pay for it.

just think.  You have run through a job and gotten married and few good salaries exist in your city.  You have money and family support.  what a great time to make such a move.  difficult, but also an adventure and you get here to discover a support community of expats.  so why not?  it actually works for all of them.


A Canadian Century

May 12, 2023 by Brian Wang

https://www.nextbigfuture.com/2023/05/a-canadian-century.html#more-182733
...

Advancing prop tech Terra Forming Terra





 this is real progress on props.  we are getting it now because we can use 3d printing to mock up trial props for testing.  In the past it meant cranking up the machining tools and every best guess was only so good.

I do think that the big market will be in the water.  They have to find a way to cast them and finish with machining.  Yet every outboard needs this and every power boat.  That number is actually finite and we can tune them with printed props in order to get them right.  Then apply speed with metal and perhaps some trim then

We have needed a better prop solution forever.


<iframe width="668" height="376" src="https://www.youtube.com/embed/QnGuS-3L0wQ" title="This Propeller will Change Aviation Forever!" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>

Newly discovered cold-adapted microbes digest plastic at low temperatures Terra Forming Terra




This is promising. It means waste can be processed at normal temperatures and then allowed to degrade with these microbes.  Of course we need to stop river dumping, but that will come in time as  everyone joins into modernity.  

This means that the waste stream can be simply put through normal mine processing.  That is rotary grinding and fine screening.  Rotting will then reduce organics well enough.  No chemistry involved.

In effect nothing changes and the waste can be safely stacked in this form and even compressed to trap any PE.  Oxidization shouod even reduce the PE.

There are better ways, but way too much opposition.


Newly discovered cold-adapted microbes digest plastic at low temperatures

May 12, 2023


Newly discovered bacteria and fungi collected from alpine and Arctic regions can digest plastics in cold temperatures

Swiss scientists have discovered new cold-adapted microorganisms that can degrade different types of plastic at temperatures lower than currently required. The discovery is the first step towards developing a more cost-effective, industrial-scale method that could rid the planet of plastic pollution.


Theres a great need to reduce plastic pollution on our lands and in our oceans. In 2020, annual global plastic production reached 367 megatons;...

16:49

curl: CVE-2023-28322: more POST-after-PUT confusion Open Source Security

Posted by Daniel Stenberg on May 16

more POST-after-PUT confusion
=============================

Project curl Security Advisory, May 17 2023 -
[Permalink](https://curl.se/docs/CVE-2023-28322.html)

VULNERABILITY
-------------

When doing HTTP(S) transfers, libcurl might erroneously use the read callback
(`CURLOPT_READFUNCTION`) to ask for data to send, even when the
`CURLOPT_POSTFIELDS` option has been set, if the same handle previously was
used to issue a `PUT` request which used...

16:47

curl: CVE-2023-28321: IDN wildcard match Open Source Security

Posted by Daniel Stenberg on May 16

IDN wildcard match
==================

Project curl Security Advisory, May 17th 2023 -
[Permalink](https://curl.se/docs/CVE-2023-28321.html)

VULNERABILITY
-------------

curl supports matching of wildcard patterns when listed as "Subject
Alternative Name" in TLS server certificates. curl can be built to use its own
name matching function for TLS rather than one provided by a TLS library. This
private wildcard matching function would...

16:45

curl: CVE-2023-28320: siglongjmp race condition Open Source Security

Posted by Daniel Stenberg on May 16

siglongjmp race condition
=========================

Project curl Security Advisory, May 17th 2023 -
[Permalink](https://curl.se/docs/CVE-2023-28320.html)

VULNERABILITY
-------------

libcurl provides several different backends for resolving host names, selected
at build time. If it is built to use the synchronous resolver, it allows name
resolves to time-out slow operations using `alarm()` and `siglongjmp()`.

When doing this, libcurl used a...

16:42

curl: CVE-2023-28319: UAF in SSH sha256 fingerprint check Open Source Security

Posted by Daniel Stenberg on May 16

UAF in SSH sha256 fingerprint check
====================================

Project curl Security Advisory, May 17th 2023 -
[Permalink](https://curl.se/docs/CVE-2023-28319.html)

VULNERABILITY
-------------

libcurl offers a feature to verify an SSH server's public key using a SHA 256
hash. When this check fails, libcurl would free the memory for the fingerprint
before it returns an error message containing the (now freed) hash.

This flaw...

16:11

Multiple flaws in Teltonika industrial cellular router expose OT networks to hack Security Affairs

Experts found multiple vulnerabilities in Teltonika industrial cellular routers that could expose OT networks to cyber attacks.

A joint analysis conducted by industrial cybersecurity firms Claroty and Otorio discovered multiple flaws in Teltonika Networks IIoT products that can expose OT networks to remote attacks.

Teltonika Networks is a leading manufacturer of networking solutions, widely adopted in industrial environments, including gateways, LTE routers, and modems.

The researchers discovered eight vulnerabilities that impact thousands of internet-connected devices worldwide. The experts demonstrated multiple attack vectors, including the exploitation of flaws in internet-exposed services, cloud account takeover, and the exploitation of flaws in the cloud infrastructure.

Successful exploitation of the flaws can have a broad range of impacts on compromised devices, including monitoring of the network traffic, the exposure of sensitive data, hijacking internet connections and accessing internal services. 

Also, an attacker may exploit these issues to access and control networked devices and change router settings in order to manipulate configurations such as DNS settings or firewall rules. The compromised industrial devices may also be used to launch attacks against other devices or networks. reads the advisory published by Otorio.

The study focuses on the RUT241 and RUT955 cellular routers manufactured by Teltonika, and on the Remote Management System (RMS) provided by the vendor.

The Teltonika Remote Management System (RMS) is a cloud-based or on-premises platform that allows customers to remotely monitor and manage connected devices. The platform provides real-time monitoring and control, it also supports advanced features such as device management, software and firmware updates, GPS tracking, and data visualization. 

16:03

University admission platform Leverage EDU exposed student passports Security Affairs

The popular university admission platform Leverage EDU leaked almost 240,000 sensitive files, including students passports, financial documents, certificates, and exam results.

The Cybernews research team discovered that Leverage EDU leaked extremely sensitive data due to the misconfiguration of their systems. As no authentication was required, anybody could access all of the students personal information needed to apply to universities.

Leverage EDU works as a one-stop admission platform for students seeking to study abroad. It claims to have a network of over 650 educational institutions worldwide and 80 million users over the last year.

With branches throughout India, the company has quadrupled its workforce since the pandemic and secured $22 million in funding from international investors. It runs offices in the UK and Australia.

Cybernews reached out to the company, and access to users data was secured. The company confirmed to journalists that the problem was solved and that it started an investigation of their systems.

Screenshot of the leaked passport. Image by Cybernews
Screenshot of the leaked passport. Image by Cybernews

A treasure trove of personal data

On January 31st, the Cybernews research team discovered a misconfigured and publicly accessible cloud storage an Amazon S3 bucket.

Total number of files stored in the bucket. Image by Cybernews
Total number of files stored in the bucket. Image by Cybernews

The bucket contained countless zip folders with almost 240,000 files exposing prospective students sensitive data and personally identifiable information (PII).

Among the leaked data were degree certificates, student report cards, exam results, CVs, and filled application forms, along with phone numbers, emails, and home addresses.

Screenshot of a zipped folder stored in the bucket. Image by Cybernews
Screenshot of a zipped folder stored in the bucket. Image by Cybernews

The researchers noticed numerous personal identification documents, including passport photos belonging to students and their parents, which is a cause for serious concern.

...

15:29

U.S. Offers $10 Million Bounty for Capture of Notorious Russian Ransomware Operator The Hacker News

A Russian national has been charged and indicted by the U.S. Department of Justice (DoJ) for launching ransomware attacks against "thousands of victims" in the country and across the world. Mikhail Pavlovich Matveev (aka Wazawaka, m1x, Boriselcin, and Uhodiransomwar), the 30-year-old individual in question, is alleged to be a "central figure" in the development and deployment of LockBit, Babuk,

15:07

Eben Upton Interview on Raspberry Pi Availability Update and Painful Decisions SoylentNews

Technologist David Bombal has a one-hour interview with Raspberry Pi founder Eben Upton. The interview covers a range of topics, starting with the big questions about unit availability and when more stock will be available.

00:00 - Intro: Tough Environment
00:07 - Intro: Eben Upton hacked the network as a kid
00:40 - Raspberry Pi shortage (stock availability)
07:22 - People say that you're not looking after hobbyists!
10:12 - Raspberry Pi OS is backwards compatible
12:37 - The pain affecting all of us
16:33 - The origin of the Raspberry Pi // How it started
23:16 - Eben hacked the school network // Creating an environment for young hackers
32:05 - Changing the Cambridge and the World
35:00 - African growth and plans
40:03 - General purpose Computer vs iPhone vs Chromebook
43:28 - Possible IPO and Raspberry Pi Foundation
44:50 - The Raspberry Pi RP2040
48:33 - How is Raspberry Pi funded?
49:10 - How is the next product decided?
50:22 - Raspberry Pi Foundation sticking to its roots
51:17 - Advice for the youth or anyone new
56:01 - Changing roles // From tech to business
57:08 - Do you need to go to university? // Do you need degrees?
01:00:05 - Learning from experiences
01:01:44 - Creating opportunities
01:05:05 - Conclusion

No transcript is available and Eben does speak very quickly. Also published on YouTube if you do not have the obligatory LBRY account to block the algorithmic "recommendations".

Read more of this story at SoylentNews.

15:00

Self-Driving Library for Python Hackaday

Fully autonomous vehicles seem to perennially be just a few years away, sort of like the automotive equivalent of fusion power. But just because robotic vehicles havent made much progress on our roadways doesnt mean we cant play with the technology at the hobbyist level. You can embark on your own experimentation right now with this open source self-driving Python library.

Granted, this is a library built for much smaller vehicles, but its still quite full-featured. Known as Donkey Car, its mostly intended for what would otherwise be remote-controlled cars or robotics platforms. The library is built to be as minimalist as possible with modularity as a design principle, and includes the ability to self-drive with computer vision using machine-learning algorithms. It is capable of logging sensor data and interfacing with various controllers as well, either physical devices or through something like a browser.

To build a complete platform costs around $250 in parts, but most things needed for a Donkey Car compatible build are easily sourced and it wont be too long before your own RC vehicle has more full self-driving capabilities than a Tesla, and potentially less risk of...

12:19

The New Human Pangenome Could Help Unveil the Biology of Everyone SoylentNews

The pangenome includes the genetic instruction books of 47 people:

More than 20 years after people got a peek at the first draft of the human genome, our genetic instruction book, researchers have unlocked the next level: the human pangenome.

In four studies published May 10 in Nature, researchers describe the achievement, how the pangenome was built and some of the new biology scientists are learning from it.

The more complete reference book, which includes almost all the DNA of 47 people, will allow researchers to explore types of variation that could never be examined before, such as large chunks of duplicated, lost or rearranged DNA. That work could possibly reveal more details about the genetic underpinnings of heart diseases, schizophrenia and various other diseases and disorders.

The pangenome adds 119 million DNA bases the information-carrying units of DNA not present in the existing human genome, called the reference genome. Much of that DNA is in never-before-explored parts of the genome containing multiple copies of genes that are duplicated from originals elsewhere in the DNA.

[...] Some of these duplicated regions include ones implicated in humans' large brains relative to other species and other traits that set humans apart from other primates. Others have been implicated in certain traits or diseases.

[...] But perhaps the biggest achievement of the pangenome project is that it is finally giving researchers a more complete look at the full spectrum of human genetic diversity.

Read more of this story at SoylentNews.

12:00

Human DNA Is Everywhere: A Boon For Science, While Terrifying Others Hackaday

Environmental DNA sampling is nothing new. Rather than having to spot or catch an animal, instead the DNA from the traces they leave can be sampled, giving clues about their genetic diversity, their lineage (e.g. via mitochondrial DNA) and the populations health. What caught University of Florida (UoF) researchers by surprise while they were using environmental DNA sampling to study endangered sea turtles, was just how much human DNA they found in their samples. This led them to perform a study on the human DNA they sampled in this way, with intriguing implications.

Ever since genetic sequencing became possible there have been many breakthroughs that have made it more precise, cheaper and more versatile. The argument by these UoF researchers in their paper in Nature Ecology & Evolution is that although there is a lot of potential in sampling human en...

11:36

Gemini Links 16/05/2023: Centralisation Concerns and New smolZINE Techrights

  • Gemini* and Gopher

    • Personal

      • SpellBinding: HIYORSL Wordo: BOOKY
      • Poem Instead of a Post

        Years ago my mother told me that she still felt the same as she did when she was younger, but when she looked in the mirror she didnt recognize the woman looking back at her. Im feeling some of that these days: aging well (I tell myself), but still aging, wondering how I can in some respects feel so close to who Ive been throughout my life, but also feel so far away from it.

      • Lantashis Dance Huyrlikan

        I am continuing my writing adventure. I have a secret project that only my close friends and family know about, that I hope to publish this year or next. Ive made really good progress on that.

        But I am also continuing with my light-hearted stories, such as the one about me, Lantashi (the Dungens & Dragons character who also happens to post on Gemini!). I hope to keep publishing those here, on Lantashis Capsule.

      • Ruminations on self

        Its really hard being perpetually watched by someone thatll guilt you when they think youre fucking up with respect to their interests in your doing things for them.

        Oh, the madness of performing for self-interested audience!

      • Bulldogs Cant Swim

        Years ago I had a giant Argentinian bulldog. I would never own a bulldog, and the idea of owning animals generally irks me, but thats what happened. Our neihgbor kept putting a bulldog puppy into our kids arms, and after a while everyone wanted to keep it. And so we wound up with a bulldog.

        We also had another dog, a fast mutt obviously built for racing, and the bulldog grew up alongside, thinking she had to run fast. And she did ...

10:54

Development Release: deepin 23 Beta DistroWatch.com: News

The developers of deepin, a desktop Linux distribution featuring the Deepin Desktop Environment (DDE), have announced the availability of the beta release of deepin 23: "deepin 23 beta is 23 alpha version, but it....

10:19

NEW 'Off The Wall' ONLINE 2600 - 2600: The Hacker Quarterly

NEW 'Off The Wall' ONLINE

Posted 17 May, 2023 0:19:44 UTC

The new edition of Off The Wall from 05/16/2023 has been archived and is now available online.

10:00

HPR3858: The Oh No! News. Hacker Public Radio

The Oh No! news. Oh No! News is Good News. Threat analysis; your attack surface. Article: For-Profit Companies Charging Sextortion Victims for Assistance and Using Deceptive Tactics to Elicit Payments. Author: FBI Internet Crime Complaint Center. (2023, Apr 7). The companies use deceptive tactics&#x2014;including threats, manipulation, and providing false information&#x2014;to coerce sextortion victims into paying for their services. Some of the services for which the companies charge fees, such as sending the perpetrators cease and desist orders, make victims feel better but are not legally enforceable. The companies may also attempt to discourage victims from reporting the sextortion to law enforcement. Limited reporting indicates the companies are directly or indirectly involved in the sextortion activity. Article: Former Ubiquiti dev who extorted the firm gets six years in prison. Author: Bill Toulas. (2023, May 11). Nickolas Sharp, a former senior developer of Ubiquiti, was sentenced to six years in prison for stealing company data, attempting to extort his employer, and aiding the publication of misleading news articles that severely impacted the firm's market capitalization. Article: Toyota: Car location data of 2 million customers exposed for ten years. Author: Bill Toulas. (2023, May 12). Toyota Motor Corporation disclosed a data breach on its cloud environment that exposed the car-location information of 2,150,000 customers for ten years, between November 6, 2013, and April 17, 2023. Article: Failure to comply with Bus Open Data regulations leads to financial penalty for operator. Author: Traffic Commissioners for Great Britain. (2023, May 4). The Traffic Commissioner for the West Midlands, Miles Dorrington, imposed a financial penalty under section 155 of the Transport Act 2000 of &#xA3;1500, based on a &#xA3;100 penalty for each of the vehicles authorised on the operator&#x2019;s licence. Article: Criminals Pose as Chinese Authorities to Target US-based Chinese Community. Author: FBI Internet Crime Complaint Center. (2023, Apr 10). The FBI warns of criminal actors posing as Chinese law enforcement officials or prosecutors in financial fraud schemes targeting the US-based Chinese community. Criminals tell victims they are suspects in financial crimes and threaten them with arrest or vi

09:36

Debt Collection Firm Credit Control Corporation Hit by Major Data Breach HackRead | Latest Cybersecurity and Hacking News Site

By Habiba Rashid

Credit Control Corporation (CCC) is a Newport News, Virginia based debt collection firm.

This is a post from HackRead.com Read the original post: Debt Collection Firm Credit Control Corporation Hit by Major Data Breach

09:33

Open Source and Linux Skills are Still in Demand in a Dark Economy SoylentNews

Companies are still hiring savvy Linux and open source staffers:

There might be lots of news stories about job losses in tech right now but research suggests there are still plenty of openings in open source and Linux to go around.

As Hillary Carter, SVP of research and communications at the Linux Foundation, said in her keynote speech at Open Source Summit North America in Vancouver, Canada: "In spite of what the headlines are saying, the facts are 57% of organizations are adding workers this year."

[...] Other research also points to brighter signs in tech employment trends. CompTIA's recent analysis of the latest Bureau of Labor Statistics (BLS) data suggests the tech unemployment rate climbed by just 2.3% in April. In fact, more organizations plan to increase their technical staff levels rather than decrease.

The demand for skilled tech talent remains strong, particularly in fast-developing areas, such as cloud and containers, cybersecurity, and artificial intelligence and machine learning.

So, what do these all areas of technology have in common? The answer is they're all heavily dependent on open source and Linux technologies.

[...] In their search for the right people, many companies are also looking to certification and pre-employment testing to verify candidate skills. So, while you might think certifications are pointless, research suggests 80% of HR professionals rely on certifications to make hiring decisions.

Looking further ahead, it appears that taking specific technical classes and getting certified is a really smart move to help you land your next tech job. Interestingly, a college degree is no longer seen as such a huge benefit. Businesses responding to the Linux Foundation's research felt upskilling (91%) and certifications (77%) are more important than a university education (58%) when it comes to addressing technology needs.


Original Submission

...

09:00

MIDI Interface for NeXTcube Plugs Into The Past Hackaday

[Joren] recently did some work as part of an electronic music heritage project, and restored an 80s-era NeXTcube workstation complete with vintage sound card, setting it up with a copy of MAX, a graphical music programming environment. But there was one piece missing: MIDI. [Joren] didnt let that stop him, and successfully created hardware to allow MIDI input and output.

...

08:55

Surprise! Elon Musks encrypted Twitter DMs feature will cost you dear Graham Cluley

Twitter's new "encrypted DM" feature is a costly (and weaker) alternative to proper end-to-end encrypted messages.

08:10

Lacroix Group shut down three facilities after a targeted cyberattack Security Affairs

French electronics manufacturer Lacroix Group shut down three plants after a cyber attack, experts believe it was the victim of a ransomware attack.

The French electronics manufacturer Lacroix Group shut down three facilities in France, Germany, and Tunisia in response to a cyber attack. The group designs and manufactures electronic equipment for its customers in multiple sectors, including the automotive, aerospace, industrial, and health sectors. The company earned $770 million in 2022.

The company announced the closure of the plant on May 12, the response to the incident suggest it was the victim of a ransomware attack.

The company revealed to have detected a targeted cyberattack on its facilities, it has launched an investigation into the security breach to determine if attackers exfiltrated some data.

The company said that some local infrastructures have been encrypted. Lacroix plans to resume production on May 22, 2023.

The time needed to carry out these actions and to use the backups to restart should take a few days, which is why the 3 sites are closed for the week. reported Yahoo Finance.

It should be noted that the activity of these three sites represents 19% of the groups total sales in 2022. Moreover, given the favourable calendar with only 3 days of effective production this week on the French and German sites, LACROIX does not envisage at this stage any significant impact on the performances announced for the Group for the whole of 2023.

At the time of this writing, no ransomware gang has claimed responsibility for the attack.

Last week, Swiss multinational company ABB, a leading electrification and automation technology provider, was the victim of a Black Basta ransomware attack.

The attack took place on May 7, 2023, and reportedly impacted the business operations of the company.

We are in the final!

Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 VOTE FOR YOUR WINNERS
Vote for me in the sections where is reported Securityaffairs or my name Pierluigi Paganini

Please nominate Security Affairs as your favorite blog.

Nominate Pierluigi Paganini and Security Affa...

07:33

Russian Hacker Wazawaka Indicted for Ransomware Krebs on Security

A Russian man identified by KrebsOnSecurity in January 2022 as a prolific and vocal member of several top ransomware groups was the subject of two indictments unsealed by the Justice Department today. U.S. prosecutors say Mikhail Pavolovich Matveev, a.k.a. Wazawaka and Boriselcin worked with three different ransomware gangs that extorted hundreds of millions of dollars from companies, schools, hospitals and government agencies.

An FBI wanted poster for Matveev.

Indictments returned in New Jersey and the District of Columbia allege that Matveev was involved in a conspiracy to distribute ransomware from three different strains or affiliate groups, including Babuk, Hive and LockBit.

The indictments allege that on June 25, 2020, Matveev and his LockBit co-conspirators deployed LockBit ransomware against a law enforcement agency in Passaic County, New Jersey. Prosecutors say that on May 27, 2022, Matveev conspired with Hive to ransom a nonprofit behavioral healthcare organization headquartered in Mercer County, New Jersey. And on April 26, 2021, Matveev and his Babuk gang allegedly deployed ransomware against the Metropolitan Police Department in Washington, D.C.

Meanwhile, the U.S. Department of Treasury has added Matveev to its list of persons with whom it is illegal to transact financially. Also, the U.S. State Department is offering a $10 million reward for the capture and/or prosecution of Matveev, although he is unlikely to face either as long as he continues to reside in Russia.

In a January 2021 discussion on a top Russian cybercrime forum, Matveevs alleged alter ego Wazawaka said he had no plans to leave the protection of Mother Russia, and that traveling abroad was not an option for him.

&...

07:12

Rocky Linux 9.2 Released With Intel Arc Graphics Support, AArch64 64kb Page Size Kernel Phoronix

Following last week's release of Red Hat Enterprise Linux 9.2 and AlmaLinux 9.2, Rocky Linux 9.2 is now also available as this alternative community-supported flavor of RHEL...

07:02

Lutris 0.5.13 Released - More Responsive & Restores Ability To Run Games Via Proton Phoronix

Lutris 0.5.13 is now available as the newest feature release for this open-source game manager...

06:51

US Fishing Policy is Boosting Fish Populations, Not Constraining Most Fisheries SoylentNews

US fishing policy is boosting fish populations, not constraining most fisheries, finds research:

Commercial fishing employs 1.2 million Americans and generates more than $165 billion annually. Yet warming waters are threatening fish populations and disrupting fisheries around the worlda challenge set to worsen as climate change advances.

Despite the importance of sustaining fisheries, the reauthorization of the cornerstone policy protecting them in the United Statesthe Magnuson-Stevens Acthas been stalled in Congress for a decade. The holdup? Some blame the policy for being too stringent and leading to what they call "underfishing," while others argue the policy is not doing enough to rebuild depleted fish populations. Others go so far as to argue that fish populations would have rebounded without any policy.

A pair of studies finds these concerns to be largely unsubstantiated. In analyzing the policy's impact on fish populations, fishing, and industry revenue, they find that it is working essentially as it should. It is rebuilding fish populations, and in most cases it is not unduly holding back fishers from making their catch.

[...] In their study published in Science, Frank, Oremus and their other co-authors first examine the assertion of critics of U.S. fishing policy that it is too stringent and unnecessarily leaving too many fish in the water. They find that the main reason about half of the fish stocks considered "underfished" in this way is due to pure economics.

Fishers are not harvesting the fish because there is not enough demand for them. Other healthy fish stocks are being left in the water because they could not be profitably caught without also catching other fish species that are depleted. Just four fish species make up the majority of the revenue of those "underfished." And, of those, the majority of the revenue came from just one species: the walleye pollock, the catch of which is not constrained by our federal fisheries law.

Read more of this story at SoylentNews.

05:42

Distribution Release: Rocky Linux 9.2 DistroWatch.com: News

Rocky Linux is a community enterprise operating system designed to be 100% bug-for-bug compatible with Red Hat Enterprise Linux. The project's latest update is Rocky Linux 9.2 which includes a number of fixes and improvements. The release announcement mentions an upgrade issue with Python along with a....

04:27

ISPs Block Uptobox to Fight Piracy, Platform & Users Probably Prepared TorrentFreak

uptobox-sOrders for ISPs to block sites on copyright infringement grounds used to be rare and controversial. Any imposition of internet police duties angered ISPs; blocking wouldnt end with pirate sites, some warned.

Court Orders ISPs to Block Uptobox

The launch of regulator ARCOM in early 2022 allowed France to block pirate sites on an industrial scale, and it wasted no time in doing so. Self-reported results hailed site-blocking measures as extremely effective and therefore totally justified.

ISPs now partner with rightsholders to ensure blocking goes smoothly, meaning the friction and fears of the past remain there. Were informed that ISPs blocked 1,299 domain names under this system in 2022 but in common with the websites themselves, their names arent for public consumption.

Court processes leading to blocking are more open, a recent case against Z-Library, for example. Thanks to a report by French journalist Marc Rees this week, customers of local ISP Orange discovered why popular file-hosting site Uptobox was no longer accessible.

Movie Industry Targets Uptobox

According to SimilarWeb data, last month Uptobox received 10 million visits from French users. Give or take, that accounts for roughly a third of its 34 million visits in April. The site has been around since 2011 and gained popularity by making it easy for users to upload, store, and share files with others.

Uptobox has no search feature on the site but theres no denying its popularity among pirates. Theres no money to be earned directly but users can earn points according to the popularity of their files. When they have accumulated enough, points can be exchanged for access to premium features, such as derestricted access to the sites comprehensive API.

Almost inevitably, Uptobox became a candidate for blocking. On behalf of industry groups including National Federation of Film Distributors (FNEF) and several others, an investigation conducted by local anti-piracy group ALPA foun...

04:14

China-linked APT Mustang Panda targets TP-Link routers with a custom firmware implant Security Affairs

China-linked APT group Mustang Panda employed a custom firmware implant targeting TP-Link routers in targeted attacks since January 2023.

Since January 2023, Check Point Research monitored a series of targeted attacks aimed at European foreign affairs entities that have been linked to the China-linked cyberespionage group Mustang Panda (aka Camaro Dragon, RedDelta or Bronze President).

MustangPanda has been active since at least 2012, it targeted American and European entities such as government organizations, think tanks, NGOs, and even Catholic organizations at the Vatican. Past campaigns were focused on Asian countries, including Taiwan, Hong Kong, Mongolia, Tibet, and Myanmar. In 2022 campaigns, threat actors used European Union reports on the conflict in Ukraine and Ukrainian government reports as lures. Upon opening the reports, the infection process starts leading to the deployment of malware on the victims system.

In most recent attacks observed by Check Point, the threat actors employed custom firmware implant designed explicitly for TP-Link routers.

The implant includes multiple components, such as a custom backdoor dubbed Horse Shell that allows attackers to maintain persistence, build anonymous infrastructure and enable lateral movement into compromised networks.

The Horse Shell backdoor is inserted into the modified firmware by the attackers, due to its firmware-agnostic design, it can be used to target various firmware by different vendors.

The backdoor supports the following main functionalities:

  • Remote shell Execution of arbitrary shell commands on the infected router
  • File transfer Upload and download files to and from the infected router.
  • SOCKS tunneling Relay communication between different clients.

The researchers have yet to discover the deployment method of the firmware images on the infected routers. The attackers likely gain access to the devices by exploiting known vulnerabilities or brute-forcing devices using default or weak and easily guessable passwords.

Experts believe the goal of the threat is the creation of a chain of nodes between main infections and real C2, and they do this by installing the backdoor on arbitrary devices with no particular interest, including residential and home networks.

R...

04:09

OpenAI Peeks into the Black Box of Neural Networks with New Research SoylentNews

https://arstechnica.com/information-technology/2023/05/openai-peeks-into-the-black-box-of-neural-networks-with-new-research/

On Tuesday, OpenAI published a new research paper detailing a technique that uses its GPT-4 language model to write explanations for the behavior of neurons in its older GPT-2 model, albeit imperfectly. It's a step forward for "interpretability," which is a field of AI that seeks to explain why neural networks create the outputs they do.
[...]
In the first sentence of OpenAI's paper, the authors write, "Language models have become more capable and more widely deployed, but we do not understand how they work."

For outsiders, that likely sounds like a stunning admission from a company that not only depends on revenue from LLMs but also hopes to accelerate them to beyond-human levels of reasoning ability.

But this property of "not knowing" exactly how a neural network's individual neurons work together to produce its outputs has a well-known name: the black box. You feed the network inputs (like a question), and you get outputs (like an answer), but whatever happens in between (inside the "black box") is a mystery.

My thoughts were always that you didn't get to look into the black box of goodies. As opposed to no one even knows how this magic things works. As the kids say, YOLO, because "hold my beer" is old fashioned?


Original Submission

Read more of this story at SoylentNews.

03:15

New York City Houses Migrants In School Gyms cryptogon.com

Via: New York Post: At least six more Big Apple schools are set to start temporarily housing migrants in their gyms, prompting all hell to break loose Monday among parents frantic over safety and potential learning disruptions. To bus people to our school and expect the community to absorb them is just insane, fumed Virginia []

03:07

Intel Uncore Frequency Linux Driver Prepares For TPMI & Cluster Level Power Controls Phoronix

A set of patches to the Intel Uncore Frequency (intel-uncore-freq) Linux driver are expected for the Linux 6.5 cycle that integrate support for the TPMI interface and prepare for upcoming processors with cluster-level power controls...

01:54

Sanctuarys Humanoid Robot Is for General-Purpose Autonomy IEEE Spectrum



Weve been keeping track of Sanctuary AI for quite a while, mainly through the companys YouTube videos that show the upper half of a dexterous humanoid performing a huge variety of complicated manipulation tasks, thanks to the teleoperation skills of a remote human pilot.

Despite a recent successful commercial deployment of the teleoperated system at a store in Canada (where it was able to complete 110 retail-related tasks), Sanctuarys end goal is way, way past telepresence. The company describes itself as on a mission to create the worlds-first humanlike intelligence in general-purpose robots. That sounds extremely ambitious, depending on what you believe humanlike intelligence and general-purpose robots actually mean. But today, Sanctuary is unveiling something that indicates a substantial amount of progress toward this goal: Phoenix, a new bipedal humanoid robot designed to do manual (in the sense of hand-dependent) labor.


Sanctuarys teleoperated humanoid is very capable, but teleoperation is of course not scalable in the way that even partial autonomy is. What all of this teleop has allowed Sanctuary to do is to collect lots and lots of data about how humans do stuff. The long-term plan is that some of those human manipulation skills can eventually be transferred to a very humanlike robot, which is the design concept underlying Phoenix.

Some specs from the press release:

  • Humanlike form and function: standing at 5 7 and weighing 155 pounds (70.3 kilograms)
  • A maximum payload of 55 pounds (24.9 kg)
  • A maximum speed of 3 miles per hour (4.8 kilometers per hour)
  • Industry-leading robotic hands with increased degrees of freedom (20 in total) that rival human hand dexterity and fine manipulation with proprietary haptic technology that mimics the sense of touch

The hardware looks very impressive, but you should take the press release with a grain of salt, as it claims that...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog