Scientists discover light could exist in a previously unknown form

New research suggests that it is possible to create a new form of light by binding light to a single electron, combining the properties of both.
[…]
by using theoretical physics to model the behaviour of light and a recently-discovered class of materials known as topological insulators, Imperial researchers have found that it could interact with just one electron on the surface.

This would create a coupling that merges some of the properties of the light and the electron. Normally, light travels in a straight line, but when bound to the electron it would instead follow its path, tracing the surface of the material.
[…]
Their models showed that as well as the light taking the property of the electron and circulating the particle, the electron would also take on some of the properties of the light.

Normally, as electrons are travelling along materials, such as electrical circuits, they will stop when faced with a defect. However, Dr Giannini’s team discovered that even if there were imperfections in the surface of the nanoparticle, the electron would still be able to travel onwards with the aid of the light.

If this could be adapted into photonic circuits, they would be more robust and less vulnerable to disruption and physical imperfections

Source: Scientists discover light could exist in a previously unknown form

The Superbook: Turn your smartphone into a laptop for $99 by Andromium Inc.: The Palm Foleo resurrected!

The Kickstarter project allready has $1.5m of the $50k goal invested.

https://www.kickstarter.com/projects/andromium/the-superbook-turn-your-smartphone-into-a-laptop-f

At the time most people didn’t ‘get’ the Palm Foleo – this has always been a bit of a problem for Palm: they were always too far ahead of the curve, allowing companies like Apple to steal their brilliant ideas and polish them up a little (well, ok, a lot!).

Anyway, the Foleo
some info here

No more rats: New Zealand to exterminate all introduced predators

The New Zealand government has announced a “world-first” project to make the nation predator free by 2050.

The prime minister, John Key, said on Monday it would undertake a radical pest extermination programme – which if successful would be a global first – aiming to wipe out the introduced species of rats, stoats and possums nation-wide in a mere 34 years.

According to the government, introduced species kill 25m native New Zealand birds a year including the iconic ground-dwelling, flightless Kiwi, which die at a rate of 20 a week, and now number fewer than 70,000.

The government estimates the cost of introduced species to the New Zealand economy and primary sector to be NZ$3.3bn (£1.76bn) a year.

Source: No more rats: New Zealand to exterminate all introduced predators | World news | The Guardian

3D print biz Shapeways hacked, home and email addresses swiped

Shapeways. In a statement, it said that some email addresses, usernames, and shipping addresses were exposed, but that the hackers didn’t get a full run of their servers and no 3D printing plans were stolen.

“The intruders did not access credit card information because Shapeways does not store such information on their systems,” said a spokeswoman.

Source: 3D print biz Shapeways hacked, home and email addresses swiped

The passwords were hashed. So not much useful stuff got taken. They are recommending customers change their passwords anyway. Shapeways apparently takes security seriously. Not often you see that everything is being done properlyh.

‘Sister Clones’ Of Dolly The Sheep Are Alive And Kicking

The sheep are just four of 13 clones that Sinclair shepherds, but they’re the most famous because of their relation to Dolly, the sheep that made headlines two decades ago as the first successfully cloned mammal.

” ‘Sister clones’ probably best describes them,” Sinclair says. “They actually come from the exactly the same batch of cells that Dolly came from.”
[…]
Dolly’s life did not turn out as scientists in the cloning field hoped it would. She died young — 6 1/2 — with a nasty lung virus. “That was really just bad luck,” Sinclair says, and had “nothing to do” with the fact that Dolly was a clone.

But she also had osteoarthritis in her knees and rear hip at a surprisingly early age and the tips of her chromosomes were short — both signs that she’d aged more quickly than a normal sheep.

“That sort of threw fuel to the fire and strengthened concerns that clones might be aging prematurely,” says Sinclair. Because clones like Dolly were derived from the cell of an adult animal, the thinking went, her body might be set to an older clock from the start.
[…]
But, the good health of the 13 clones in the Nottingham herd suggest better prospects for the procedure. Sinclair and his colleagues evaluated the animals’ blood pressure, metabolism, heart function, muscles and joints, looking for signs of premature aging. They even fattened them up (since obesity is a risk factor for metabolic problems including diabetes) and gave them the standard tests to gauge how their bodies would handle glucose and insulin.

The results? Normal, normal, normal.

“There is nothing to suggest that these animals were anything other than perfectly normal,” says Sinclair. They had slight signs of arthritis (Debbie in particular), but not enough to cause problems. “If I put them in with a bunch of other sheep, you would never be able to identify them,” he says.

Source: ‘Sister Clones’ Of Dolly The Sheep Are Alive And Kicking

Hackers Steal $72 Million in Bitcoin From Hong Kong Exchange Bitfinex

Hong Kong bitcoin exchange Bitfinex reported yesterday that hackers had stolen 119,756 bitcoin, which is worth as much as $72 million dollars (with some reports going even higher). News of the hack sent bitcoin tumbling 23 percent, with its current value hovering around $556. Bitfinex confirmed that no other digital currency except bitcoin was targeted in the hack.

Source: Hackers Steal $72 Million in Bitcoin From Hong Kong Exchange

Your battery status is being used to track you online

A little-known web standard that lets site owners tell how much battery life a mobile device has left has been found to enable tracking online, a year after privacy researchers warned that it had the potential to do just that.

The battery status API was introduced in HTML5, the fifth version of the code used to lay out the majority of the web, and had already shipped in Firefox, Opera and Chrome by August 2015. It allows site owners to see the percentage of battery life left in a device, as well as the time it will take to discharge or the time it will take to charge, if connected to a power source.

Intended to allow site owners to serve low-power versions of sites and web apps to users with little battery capacity left, soon after it was introduced, privacy researchers pointed out that it could also be used to spy on users. The combination of battery life as a percentage and battery life in seconds provides offers 14m combinations, providing a pseudo-unique identifier for each device.
[…]
Now, two security researchers from Princeton University have shown that the battery status indicator really is being used in the wild to track users. By running a specially modified browser, Steve Engelhard and Arvind Narayanan found two tracking scripts that used the API to “fingerprint” a specific device, allowing them to continuously identify it across multiple contexts.

Source: Your battery status is being used to track you online | Technology | The Guardian

Report: Operating Systems Should Actively Block Pirated Downloads – TorrentFreak

While most of the media attention focused on the role of ISPs, there is an even more controversial proposal that has been largely overlooked. According to the report, pirated content should be banned on the operating system level.

“Other players that possess the potential ability to limit piracy are the companies that own the major operating systems which control computers and mobile devices such as Apple, Google and Microsoft,” one of the main conclusions reads.

“The producers of operating systems should be encouraged, or regulated, for example, to block downloads of copyright infringing material,” the report adds.

The report references last year’s Windows 10 controversy, noting that these concerns were great enough for some torrent sites to block users with the new operating system.

Source: Report: Operating Systems Should Actively Block Pirated Downloads – TorrentFreak

Really? Just like cassette and DVD players make decisions on what content to play? Oh wait they don’t. Is this a money making scam, forcing people to pay someone to certify their content or else the OS won’t download it? This is not a decision the OS should be making.

Simply not credible: The extraordinary verdict against ICANN – the body that hopes to run the internet

In an extraordinary judgment, the organization that hopes to take over running the top level of the internet later this year has been slammed by an independent review as at best incompetent and at worst deliberately mendacious.

The decision [PDF] by ICANN’s Independent Review Panel (IRP) over the organization’s decision to refuse “community” status for three applications covering business suffixes has exposed a level of double-dealing that many suspected occurred in the non-profit organization but has been difficult to prove.

Source: Simply not credible: The extraordinary verdict against the body that hopes to run the internet

This is an incredible story of lawyers who feel they are above the law, insider dealing and nepotism. What a mess at ICANN

Characterizing and Avoiding Routing Detours Through Surveillance States

We find that 84\% of paths originating in Brazil traverse the United States, but when relays are used for country avoidance, only 37\% of Brazilian paths traverse the United States. Using the open DNS resolver infrastructure allows Kenyan clients to avoid the United States on 17\% more paths. Unfortunately, we find that some of the more prominent surveillance states (e.g., the U.S.) are also some of the least avoidable countries.

Cornell University Library

A legal approach to mitigate anonymisation with risk

Perfect anonymization of data sets that contain personal information has failed. But the process of protecting data subjects in shared information remains integral to privacy practice and policy. While the deidentification debate has been vigorous and productive, there is no clear direction for policy. As a result, the law has been slow to adapt a holistic approach to protecting data subjects when data sets are released to others. Currently, the law is focused on whether an individual can be identified within a given set. We argue that the best way to move data release policy past the alleged failures of anonymization is to focus on the process of minimizing risk of reidentification and sensitive attribute disclosure, not preventing harm. Process-based data release policy, which resembles the law of data security, will help us move past the limitations of focusing on whether data sets have been “anonymized.” It draws upon different tactics to protect the privacy of data subjects, including accurate deidentification rhetoric, contracts prohibiting reidentification and sensitive attribute disclosure, data enclaves, and query-based strategies to match required protections with the level of risk. By focusing on process, data release policy can better balance privacy and utility where nearly all data exchanges carry some risk.
paper here

Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites

These nodes — ordinary nodes, not exit nodes — sorted through all the traffic that passed through them, looking for anything bound for a hidden service, which allowed them to discover hidden services that had not been advertised. These nodes then attacked the hidden services by making connections to them and trying common exploits against the server-software running on them, seeking to compromise and take them over.

The researchers used “honeypot” .onion servers to find the spying computers: these honeypots were .onion sites that the researchers set up in their own lab and then connected to repeatedly over the Tor network, thus seeding many Tor nodes with the information of the honions’ existence. They didn’t advertise the honions’ existence in any other way and there was nothing of interest at these sites, and so when the sites logged new connections, the researchers could infer that they were being contacted by a system that had spied on one of their Tor network circuits.

boingboing

Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites

These nodes — ordinary nodes, not exit nodes — sorted through all the traffic that passed through them, looking for anything bound for a hidden service, which allowed them to discover hidden services that had not been advertised. These nodes then attacked the hidden services by making connections to them and trying common exploits against the server-software running on them, seeking to compromise and take them over.

The researchers used “honeypot” .onion servers to find the spying computers: these honeypots were .onion sites that the researchers set up in their own lab and then connected to repeatedly over the Tor network, thus seeding many Tor nodes with the information of the honions’ existence. They didn’t advertise the honions’ existence in any other way and there was nothing of interest at these sites, and so when the sites logged new connections, the researchers could infer that they were being contacted by a system that had spied on one of their Tor network circuits.

boingboing

Amazon randomly kills PriceZombie price comparison site

Unfortunately, it seems our service has to come to an untimely end. After being previously told we were in 100% compliance with the rules, our Amazon affiliate account was closed a few months ago. Amazon claimed we were violating their rules against showing product and price information that was more than 24 hours old. Obviously, this is something ALL price history trackers do, not just PriceZombie. Overnight, we lost over 90% of our income but we kept going, hoping to resolve any issues and return to compliance. However, our appeals to Amazon affiliate program administrators (associates@amazon.com) and even Jeff Bezos (jeff@amazon.com) were either ignored or answered incompletely

Source: Important Announcement – PriceZombie will be shutting down unless..

Wtf?

Amazon randomly destroys price tracking site PriceZombie

Unfortunately, it seems our service has to come to an untimely end. After being previously told we were in 100% compliance with the rules, our Amazon affiliate account was closed a few months ago. Amazon claimed we were violating their rules against showing product and price information that was more than 24 hours old. Obviously, this is something ALL price history trackers do, not just PriceZombie. Overnight, we lost over 90% of our income but we kept going, hoping to resolve any issues and return to compliance. However, our appeals to Amazon affiliate program administrators (associates@amazon.com) and even Jeff Bezos (jeff@amazon.com) were either ignored or answered incompletely

Source: Important Announcement – PriceZombie will be shutting down unless..

Wtf?

Dark Patterns make you do stuff you don’t want to on websites

Everyone has been there. So in 2010, London-based UX designer Harry Brignull decided he’d document it. Brignull’s website, darkpatterns.org, offers plenty of examples of deliberately confusing or deceptive user interfaces. These dark patterns trick unsuspecting users into a gamut of actions: setting up recurring payments, purchasing items surreptitiously added to a shopping cart, or spamming all contacts through prechecked forms on Facebook games.

Dark patterns aren’t limited to the Web, either. The Columbia House mail-order music club of the ’80s and ’90s famously charged users exorbitant rates for music they didn’t choose if they forgot to specify what they wanted. In fact, negative-option billing began as early as 1927, when a book club decided to bill members in advance and ship a book to anyone who didn’t specifically decline. Another common offline example? Some credit card statements boast a 0 percent balance transfer but don’t make it clear that the percentage will shoot up to a ridiculously high number unless a reader navigates a long agreement in tiny print.

“The way that companies implement the deceptive practices has gotten more sophisticated over time,” said UX designer Jeremy Rosenberg, a contributor to the Dark Patterns site. “Today, things are more likely to be presented as a benefit or obscured as a benefit even if they’re not.”

When you combine the interactive nature of the Web, increasingly savvy businesses, and the sheer amount of time users spend online, it’s a recipe for dark pattern disaster. And after gaining an awareness for this kind of deception, you’ll recognize it’s nearly ubiquitous.

Source: Dark Patterns are designed to trick you (and they’re all over the Web)