The Final Leaked TPP Text is anti person, pro business. Oh dear, Kapitalist 4th Reich Strikes Again.

Today’s release by Wikileaks of what is believed to be the current and essentially final version of the intellectual property (IP) chapter of the Trans-Pacific Partnership (TPP) confirms our worst fears about the agreement, and dashes the few hopes that we held out that its most onerous provisions wouldn’t survive to the end of the negotiations.

Source: The Final Leaked TPP Text is All That We Feared | Electronic Frontier Foundation

Copyright, one of the largest blockers of innovation and totally ridiculous: why not work for a living instead of coasting on a past success is now set to life + 70 years!

DRM is no longer allowed to be circumvented. “someone tinkering with a file or device that contains a copyrighted work can be made liable (criminally so, if wilfullness and a commercial motive can be shown), for doing so even when no copyright infringement is committed.”

Hackers can now be rersecuted for minor infringements…

It’s a mess 🙁

Recruiters think of you as smarter, would prefer to hire you when they hear your pitch than when they read it.

In comparison with those who read the transcripts, the evaluators who heard pitches judged the candidates to have greater intellect (to be more rational, thoughtful, and intelligent), on average. They also liked the individuals more, had a more positive overall impression, and — perhaps most important — were more interested in hiring the candidates. Evaluators who saw the videos appeared to be even more favorably impressed, but there was no statistically significant difference between the evaluations of video and audio.

Source: The Science of Sounding Smart

Nuclear smugglers repeatedly trying to sell materials to IS in Moldova and getting caught – so far

CHISINAU, Moldova — In the backwaters of Eastern Europe, authorities working with the FBI have interrupted four attempts in the past five years by gangs with suspected Russian connections that sought to sell radioactive material to Middle Eastern extremists, The Associated Press has learned. The latest known case came in February this year, when a smuggler offered a huge cache of deadly cesium — enough to contaminate several city blocks — and specifically sought a buyer from the Islamic State group.

Criminal organizations, some with ties to the Russian KGB’s successor agency, are driving a thriving black market in nuclear materials in the tiny and impoverished Eastern European country of Moldova, investigators say. The successful busts, however, were undercut by striking shortcomings: Kingpins got away, and those arrested evaded long prison sentences, sometimes quickly returning to nuclear smuggling, AP found.

Source: Military.com

EU Court of Justice declares that the Commission’s US Safe Harbour Decision is invalid

The EU courts have found that Safe Harbour means that the 4th Reich may not have EU citizens’ data beamed to it, unless the company doing the beaming (eg Facebook) is prepared to safeguard the data from spying by the KGB. I mean Stazi. I mean NSA.

Source: The Court of Justice declares that the Commission’s US Safe Harbour Decision is invalid – cp150117en.pdf

Companies are whining that this will be bad for the EU economy, but I don’t see particularly that Chinese people are much the worse off for not having Facebook, and I’m sure that not having US government spying on the EU and then passing relevant information on to US companies gets rid of quite a significant competitive edge, allowing EU companies to grow a bit more fairly.

Debloater(Lets remove all that carrier bloat !! Root not required..)

It will disable / block any system and third party application on your device with ease and allow you to enable / unblock the application just as easy. It also reads everything, real-time, directly from your device, so that there are no messy batch files, scripts and txt files, etc. that you have to maintain and keep track of for every device you own

Source: V3.90 Debloater(Lets remove all that carrier bloat !! Root not required..)

WifiWatch virus infects poorly defended routers and then hardens them for you

Wifatch’s code does not ship any payloads used for malicious activities, such as carrying out DDoS attacks, in fact all the hardcoded routines seem to have been implemented in order to harden compromised devices. We’ve been monitoring Wifatch’s peer-to-peer network for a number of months and have yet to observe any malicious actions being carried out through it.

In addition, there are some other things that seem to hint that the threat’s intentions may differ from traditional malware.

Wifatch not only tries to prevent further access by killing the legitimate Telnet daemon, it also leaves a message in its place telling device owners to change passwords and update the firmware.

Wifatch has a module that attempts to remediate other malware infections present on the compromised device. Some of the threats it tries to remove are well known families of malware targeting embedded devices.

The threat author left a comment in the source code that references an email signature used by software freedom activist Richard Stallman (Figure 2).

Wifatch’s code is not obfuscated; it just uses compression and contains minified versions of the source code. It would have been easy for the author to obfuscate the Perl code but they chose not to. The threat also contains a number of debug messages that enable easier analysis. It looks like the author wasn’t particularly worried about others being able to inspect the code.

The threat has a module (dahua.pm) that seems to be an exploit for Dahua DVR CCTV systems. The module allows Wifatch to set the configuration of the device to automatically reboot every week. One could speculate that because Wifatch may not be able to properly defend this type of device, instead, its strategy may be to reboot it periodically which would kill running malware and set the device back to a clean state.

Linux.Wifatch compromises routers and other Internet of Things devices and appears to try and improve infected devices’ security.

Source: Is there an Internet-of-Things vigilante out there? | Comunidad de Symantec Connect

SolarCity claims it has created the world’s most powerful solar panel

Solar City said it has created a photovoltaic panel capable of 22% efficiency, 7 percentage points higher than average solar panels.

The new panels produce 30% to 40% more power over the current models, but they cost the same to manufacture — about .55 cents per watt, according to Bass. The panels, which are 1.61 meters or 1.81 meters in size, depending on the model, will have a capacity of 355 watts each.

Source: SolarCity claims it has created the world’s most powerful solar panel

Experian hacked, loses 15m U.S. T-Mobile customer records, offerts 2 years of credit monitoring

The data included some personally identifiable information for approximately 15 million consumers in the US, including those who applied for T-Mobile USA postpaid services or device financing from September 1, 2013 through September 16, 2015, based on Experian’s investigation to date. This incident did not impact Experian’s consumer credit database

Source: Experian Notifies Consumers In The U.S. Who May Have Been Affected By Unauthorized Acquisition Of A Client’s Data

New tool could reduce smartphone battery drain by intelligently suppressing background activities

he first large-scale study of smartphones in everyday use by consumers has revealed that apps drain 28.9 percent of battery power while the screen is off. To address the problem, researchers have created a software tool that reduces the energy drain by about 16 percent.

Researchers at Purdue University, Intel Corp. and startup company Mobile Enerlytics studied the use of 2,000 Samsung Galaxy S3 and S4 phones served by 191 mobile operators in 61 countries.”This was the first large-scale study of smartphone energy drain ‘in the wild,’ or in everyday use by consumers,” said Y. Charlie Hu, a Purdue professor of electrical and computer engineering.

Out of the 45.9 percent of daily battery drain where the screen is off, 28.9 percent is due to apps that frequently wake up and run in the background. Out of this 28.9 percent, researchers have shown how to save 15.7 percent with a new system called HUSH, which is available for free at http://www.github.com/hushnymous

Source: New tool reduces smartphone battery drain by intelligently suppressing background activities – Purdue University

It’s not an app yet, but could be soon – hopefully.

Prosthetic hands can now feel

A 28-year-old who has been paralyzed for more than a decade as a result of a spinal cord injury has become the first person to be able to “feel” physical sensations through a prosthetic hand directly connected to his brain, and even identify which mechanical finger is being gently touched.The advance, made possible by sophisticated neural technologies developed under DARPA’s Revolutionizing Prosthetics points to a future in which people living with paralyzed or missing limbs will not only be able to manipulate objects by sending signals from their brain to robotic devices, but also be able to sense precisely what those devices are touching.“We’ve completed the circuit,” said DARPA program manager Justin Sanchez. “Prosthetic limbs that can be controlled by thoughts are showing great promise, but without feedback from signals traveling back to the brain it can be difficult to achieve the level of control needed to perform precise movements. By wiring a sense of touch from a mechanical hand directly into the brain, this work shows the potential for seamless bio-technological restoration of near-natural function.

Let’s Encrypt – free, browser trusted, automatically renewable SSL certificate authority signs first certificate.

Let’s Encrypt is a free, automated, and open certificate authority brought to you by the Internet Security Research Group (ISRG). ISRG is a California public benefit corporation, and is recognized by the IRS as a tax-exempt organization under Section 501(c)(3) of the Internal Revenue Code.

Source: Blog

It will hopefully be live in about a month.

New stealth technology uses  ceramics instead of metal with teflon – actually works against modern radars… mostly

Angle limitations lead the list. The experiment tested the cloak with light hitting at a 45 degree angle, and works effectively only within a 6-degree range of angles. Kante said his team is working on ways to expand that. His study states that the math behind the effectiveness of this experiment indicates a “large range” of angles should be possible.

Also, Kante said the technology does not allow for a cloak that can hide an object from both visual and radar detection; a given cloak will only work for a fairly narrow range of wavelengths.

Source: Pentagon intrigued by breakthrough in cloaking technology

But it’s better than the RAM they have now and it’s 10 times thinner. So maybe it covers enough wavelengths to foil current radar, because the current version of stealth is unfortunately quite visible.

AVG to flog your web browsing, search history from mid-October

We collect non-personal data to make money from our free offerings so we can keep them free, including:

    Advertising ID associated with your device.
    Browsing and search history, including meta data.
    Internet service provider or mobile network you use to connect to our products.
    Information regarding other applications you may have on your device and how they are used.

Source: AVG to flog your web browsing, search history from mid-October • The Register

Time to quit using that then!