I know the French were collaborators during WWII, but shouldn’t they have learned their lesson then?!
France wants proposed rules applied to EU citizens as well
Source: Fingerprints, facial scans, EU border data slurp too tasty for French to resist
			
			
									
			
			
	I know the French were collaborators during WWII, but shouldn’t they have learned their lesson then?!
France wants proposed rules applied to EU citizens as well
Source: Fingerprints, facial scans, EU border data slurp too tasty for French to resist
Today’s release by Wikileaks of what is believed to be the current and essentially final version of the intellectual property (IP) chapter of the Trans-Pacific Partnership (TPP) confirms our worst fears about the agreement, and dashes the few hopes that we held out that its most onerous provisions wouldn’t survive to the end of the negotiations.
Source: The Final Leaked TPP Text is All That We Feared | Electronic Frontier Foundation
Copyright, one of the largest blockers of innovation and totally ridiculous: why not work for a living instead of coasting on a past success is now set to life + 70 years!
DRM is no longer allowed to be circumvented. “someone tinkering with a file or device that contains a copyrighted work can be made liable (criminally so, if wilfullness and a commercial motive can be shown), for doing so even when no copyright infringement is committed.”
Hackers can now be rersecuted for minor infringements…
It’s a mess đ
In comparison with those who read the transcripts, the evaluators who heard pitches judged the candidates to have greater intellect (to be more rational, thoughtful, and intelligent), on average. They also liked the individuals more, had a more positive overall impression, and â perhaps most important â were more interested in hiring the candidates. Evaluators who saw the videos appeared to be even more favorably impressed, but there was no statistically significant difference between the evaluations of video and audio.
Source: The Science of Sounding Smart
Such as your name, frequent flyer number and record locator, which allows you to log into the company website and view the rest of your flights…
Source: Whatâs in a Boarding Pass Barcode? A Lot â Krebs on Security
CHISINAU, Moldova — In the backwaters of Eastern Europe, authorities working with the FBI have interrupted four attempts in the past five years by gangs with suspected Russian connections that sought to sell radioactive material to Middle Eastern extremists, The Associated Press has learned. The latest known case came in February this year, when a smuggler offered a huge cache of deadly cesium — enough to contaminate several city blocks — and specifically sought a buyer from the Islamic State group.
Criminal organizations, some with ties to the Russian KGB’s successor agency, are driving a thriving black market in nuclear materials in the tiny and impoverished Eastern European country of Moldova, investigators say. The successful busts, however, were undercut by striking shortcomings: Kingpins got away, and those arrested evaded long prison sentences, sometimes quickly returning to nuclear smuggling, AP found.
Source: Military.com
The EU courts have found that Safe Harbour means that the 4th Reich may not have EU citizens’ data beamed to it, unless the company doing the beaming (eg Facebook) is prepared to safeguard the data from spying by the KGB. I mean Stazi. I mean NSA.
Companies are whining that this will be bad for the EU economy, but I don’t see particularly that Chinese people are much the worse off for not having Facebook, and I’m sure that not having US government spying on the EU and then passing relevant information on to US companies gets rid of quite a significant competitive edge, allowing EU companies to grow a bit more fairly.
Luciad puts you in the seat of the Air Traffic Analyst.Review 24 hours of the entire worldâs air traffic.Change between 2D and 3D. Zoom, pan, and tilt the 3D view.Pause, play and change the speed of the air traffic.Filter and focus on the flights, airports or airlines of your choice.
Source: LuciadRIA 3D Demo
It will disable / block any system and third party application on your device with ease and allow you to enable / unblock the application just as easy. It also reads everything, real-time, directly from your device, so that there are no messy batch files, scripts and txt files, etc. that you have to maintain and keep track of for every device you own
Source: V3.90 Debloater(Lets remove all that carrier bloat !! Root not required..)
Shop anywhere, choose your forwarder, ship anywhere and save. Worldwide shipping assistance of your buys for less.
Source: Parcl
Neat idea, if you want that package and the shop doesn’t want to send it to you, you pay a forwarder in the country for their time to order it for you and send it on to you.
Wifatchâs code does not ship any payloads used for malicious activities, such as carrying out DDoS attacks, in fact all the hardcoded routines seem to have been implemented in order to harden compromised devices. Weâve been monitoring Wifatchâs peer-to-peer network for a number of months and have yet to observe any malicious actions being carried out through it.
In addition, there are some other things that seem to hint that the threatâs intentions may differ from traditional malware.
Wifatch not only tries to prevent further access by killing the legitimate Telnet daemon, it also leaves a message in its place telling device owners to change passwords and update the firmware.
Wifatch has a module that attempts to remediate other malware infections present on the compromised device. Some of the threats it tries to remove are well known families of malware targeting embedded devices.
The threat author left a comment in the source code that references an email signature used by software freedom activist Richard Stallman (Figure 2).
Wifatchâs code is not obfuscated; it just uses compression and contains minified versions of the source code. It would have been easy for the author to obfuscate the Perl code but they chose not to. The threat also contains a number of debug messages that enable easier analysis. It looks like the author wasnât particularly worried about others being able to inspect the code.
The threat has a module (dahua.pm) that seems to be an exploit for Dahua DVR CCTV systems. The module allows Wifatch to set the configuration of the device to automatically reboot every week. One could speculate that because Wifatch may not be able to properly defend this type of device, instead, its strategy may be to reboot it periodically which would kill running malware and set the device back to a clean state.
Linux.Wifatch compromises routers and other Internet of Things devices and appears to try and improve infected devicesâ security.
Source: Is there an Internet-of-Things vigilante out there? | Comunidad de Symantec Connect
Solar City said it has created a photovoltaic panel capable of 22% efficiency, 7 percentage points higher than average solar panels.
The new panels produce 30% to 40% more power over the current models, but they cost the same to manufacture — about .55 cents per watt, according to Bass. The panels, which are 1.61 meters or 1.81 meters in size, depending on the model, will have a capacity of 355 watts each.
Source: SolarCity claims it has created the world’s most powerful solar panel
names, addresses, Social Security numbers, email addresses and other sensitive data were contained in the system accessed as well as encrypted passwords.
Source: scottrade.com
Don’t we just love huge databases?
Patreon is a funding site for artists and creators.
15 GB file hits dump sites
Source: Patreon attackers drop data, expose users
Because the source code was left outside the firewall, there is a chance that the encryption is vulnerable too.
The data included some personally identifiable information for approximately 15 million consumers in the US, including those who applied for T-Mobile USA postpaid services or device financing from September 1, 2013 through September 16, 2015, based on Experian’s investigation to date. This incident did not impact Experian’s consumer credit database
he first large-scale study of smartphones in everyday use by consumers has revealed that apps drain 28.9 percent of battery power while the screen is off. To address the problem, researchers have created a software tool that reduces the energy drain by about 16 percent.
Researchers at Purdue University, Intel Corp. and startup company Mobile Enerlytics studied the use of 2,000 Samsung Galaxy S3 and S4 phones served by 191 mobile operators in 61 countries.”This was the first large-scale study of smartphone energy drain ‘in the wild,’ or in everyday use by consumers,” said Y. Charlie Hu, a Purdue professor of electrical and computer engineering.
Out of the 45.9 percent of daily battery drain where the screen is off, 28.9 percent is due to apps that frequently wake up and run in the background. Out of this 28.9 percent, researchers have shown how to save 15.7 percent with a new system called HUSH, which is available for free at http://www.github.com/hushnymous
It’s not an app yet, but could be soon – hopefully.
A 28-year-old who has been paralyzed for more than a decade as a result of a spinal cord injury has become the first person to be able to âfeelâ physical sensations through a prosthetic hand directly connected to his brain, and even identify which mechanical finger is being gently touched.The advance, made possible by sophisticated neural technologies developed under DARPAâs Revolutionizing Prosthetics points to a future in which people living with paralyzed or missing limbs will not only be able to manipulate objects by sending signals from their brain to robotic devices, but also be able to sense precisely what those devices are touching.âWeâve completed the circuit,â said DARPA program manager Justin Sanchez. âProsthetic limbs that can be controlled by thoughts are showing great promise, but without feedback from signals traveling back to the brain it can be difficult to achieve the level of control needed to perform precise movements. By wiring a sense of touch from a mechanical hand directly into the brain, this work shows the potential for seamless bio-technological restoration of near-natural function.
Researchers have created an app that follows the micro-movements of your smartwatch and is able to detect what keys you’re pressing with your left hand and thus guess what words you may be typing on a keyboard.
Source: Creepy Smartwatch Spies What You Type on a Keyboard – Softpedia
Letâs Encrypt is a free, automated, and open certificate authority brought to you by the Internet Security Research Group (ISRG). ISRG is a California public benefit corporation, and is recognized by the IRS as a tax-exempt organization under Section 501(c)(3) of the Internal Revenue Code.
Source: Blog
It will hopefully be live in about a month.
Crystal shows you the best way to communicate with any coworker, prospect, or customer based on their unique personality.
Source: Crystal | Communicate with anyone, based on personality
A fascinating economic look at how drugs are sold and bought on the dark web and what their growth potential is.
Source: The safe, user-friendly way to be a little drug lord: economic secrets of the dark web
Angle limitations lead the list. The experiment tested the cloak with light hitting at a 45 degree angle, and works effectively only within a 6-degree range of angles. Kante said his team is working on ways to expand that. His study states that the math behind the effectiveness of this experiment indicates a “large range” of angles should be possible.
Also, Kante said the technology does not allow for a cloak that can hide an object from both visual and radar detection; a given cloak will only work for a fairly narrow range of wavelengths.
Source: Pentagon intrigued by breakthrough in cloaking technology
But it’s better than the RAM they have now and it’s 10 times thinner. So maybe it covers enough wavelengths to foil current radar, because the current version of stealth is unfortunately quite visible.
We collect non-personal data to make money from our free offerings so we can keep them free, including:
Advertising ID associated with your device.
Browsing and search history, including meta data.
Internet service provider or mobile network you use to connect to our products.
Information regarding other applications you may have on your device and how they are used.
Source: AVG to flog your web browsing, search history from mid-October ⢠The Register
Time to quit using that then!