Large diet study suggests it’s carbs, not fats, that are bad for your health

A large, 18-country study may turn current nutritional thinking on its head.

The new research suggests that it’s not the fat in your diet that’s raising your risk of premature death, it’s too many carbohydrates — especially the refined, processed kinds of carbs — that may be the real killer.

The research also found that eating fruits, vegetables and legumes can lower your risk of dying prematurely. But three or four servings a day seemed to be plenty. Any additional servings didn’t appear to provide more benefit.

What does all this mean to you? Well, a cheeseburger may be OK to eat, and adding lettuce and tomato to the burger is still good for you, but an excess of white flour burger buns may boost your risk of dying early.

People with a high fat intake — about 35 percent of their daily diet — had a 23 percent lower risk of early death and 18 percent lower risk of stroke compared to people who ate less fat, said lead author Mahshid Dehghan. She’s an investigator with the Population Health Research Institute at McMaster University in Ontario.

The researchers also noted that a very low intake of saturated fats (below 3 percent of daily diet) was associated with a higher risk of death in the study, compared to diets containing up to 13 percent daily.

At the same time, high-carb diets — containing an average 77 percent carbohydrates — were associated with a 28 percent increased risk of death versus low-carb diets, Dehghan said.

Source: Large diet study suggests it’s carbs, not fats, that are bad for your health

Uber riders can choose not to be tracked after they are dropped off

In response to a chorus of complaints from its users, Uber is revamping privacy settings that it rolled out last fall.

Beginning this week, Uber riders using the iOS version of the ride-hailing company’s app will find a new series of privacy prompts that includes the ability to deny Uber the right to track your whereabouts. Uber is working on similar tweaks to the Android version of its app.

The new options for Uber app users are: Always (Uber is allowed to collect rider location information from the moment the app is opened until the trip ends), While Using The App (information flows to Uber while the app is visible on the screen) and Never (no info is transmitted but riders have to manually input their pick-up and drop-off locations).

One of the old privacy features that gave many users pause was Uber’s ability to track the whereabouts of riders up to 5 minutes after a ride was completed.

Uber says the 5-minute feature was never activated on the iOS version of its app, and that it was disabled a few months after being initiated on the Android version.

Source: Uber riders can make their trips more private

Experts excited by brain ‘wonder-drug’ – BBC News

Scientists hope they have found a drug to stop all neurodegenerative brain diseases, including dementia.In 2013, a UK Medical Research Council team stopped brain cells dying in an animal for the first time, creating headline news around the world.But the compound used was unsuitable for people, as it caused organ damage.Now two drugs have been found that should have the same protective effect on the brain and are already safely used in people.”It’s really exciting,” said Prof Giovanna Mallucci, from the MRC Toxicology Unit in Leicester.She wants to start human clinical trials on dementia patients soon and expects to know whether the drugs work within two to three years.

Source: Experts excited by brain ‘wonder-drug’ – BBC News

An A.I. Says There Are Six Main Kinds of Stories

That’s what a group of researchers, from the University of Vermont and the University of Adelaide, set out to do. They collected computer-generated story arcs for nearly 2,000 works of fiction, classifying each into one of six core types of narratives (based on what happens to the protagonist):

1. Rags to Riches (rise)

2. Riches to Rags (fall)

3. Man in a Hole (fall then rise)

4. Icarus (rise then fall)

5. Cinderella (rise then fall then rise)

6. Oedipus (fall then rise then fall)

Their focus was on the emotional trajectory of a story, not merely its plot. They also analyzed which emotional structure writers used most, and how that contrasted with the ones readers liked best, then published a preprint paper of their findings on the scholarship website arXiv.org. More on that in a minute.

First, the researchers had to find a workable dataset. Using a collection of fiction from the digital library Project Gutenberg, they selected 1,737 English-language works of fiction between 10,000 and 200,000 words long. 

Source: An A.I. Says There Are Six Main Kinds of Stories

Make money with open source

Further on my preachings on making money from open source (see video), it turns out that there is a Fair Source license already available on Github

Not open source. Not closed source. The Fair Source License allows everyone to see the source code and makes the software free to use for a limited number of users in your organization. It offers some of the benefits of open source while preserving the ability to charge for the software.

Intel ME controller chip can be disabled after all – for governments

Security researchers at Moscow-based Positive Technologies have identified an undocumented configuration setting that disables Intel Management Engine 11, a CPU control mechanism that has been described as a security risk.

Intel’s ME consists of a microcontroller that works with the Platform Controller Hub chip, in conjunction with integrated peripherals. It handles much of the data travelling between the processor and external devices, and thus has access to most of the data on the host computer.

If compromised, it becomes a backdoor, giving an attacker control over the affected device.

Source: Intel ME controller chip has secret kill switch

Smart home IoT stuff gives away a lot of your personal patterns

Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic – reveals that even when data from devices is encrypted, the metadata can help identify both the device and what it is signaling.

Some devices such as the Nest indoor camera directly communicate with identifiable domain names – in this case ‘dropcam.com.’ That immediately identifies what the product is, and it is then possible to infer from that and the resulting signal what is happening: whether it has detected motion or whether it is live streaming.

Likewise the Sense sleep monitor, TP‑Link smart plug, and Amazon Echo. Even when the devices communicate with a generic DNS server – like Amazon’s AWS service – they typically have a specific IP address that can be used to identify the sensor (the Belkin WeMo switch for example communicated with the very-specific prod1-fs-xbcs-net-1101221371.us-east-1.elb.amazonaws.com address).

By digging into each device’s signal, the team was able to figure out with some certainty exactly what was happening: someone was waking up, someone was turning on a light switch, someone had walked into the kitchen, and so on.

Source: How the CIA, Comcast can snoop on your sleep patterns, sex toy usage

Inside the Massive 711 Million Record Onliner Spambot Dump

Last week I was contacted by someone alerting me to the presence of a spam list. A big one. That’s a bit of a relative term though because whilst I’ve loaded “big” spam lists into Have I been pwned (HIBP) before, the largest to date has been a mere 393m records and belonged to River City Media. The one I’m writing about today is 711m records which makes it the largest single set of data I’ve ever loaded into HIBP. Just for a sense of scale, that’s almost one address for every single man, woman and child in all of Europe. This blog posts explains everything I know about it.

Source: Inside the Massive 711 Million Record Onliner Spambot Dump

Hit App Sarahah Quietly Uploads Your Address Book

Sarahah, a new app that lets people sign up to receive anonymized, candid messages, has been surging in popularity; somewhere north of 18 million people are estimated to have downloaded it from Apple and Google’s online stores, making it the No. 3 most downloaded free software title for iPhones and iPads.

Sarahah bills itself as a way to “receive honest feedback” from friends and employees. But the app is collecting more than just feedback messages. When launched for the first time, it immediately harvests and uploads all phone numbers and email addresses in your address book. Although Sarahah does in some cases ask for permission to access contacts, it does not disclose that it uploads such data, nor does it seem to make any functional use of the information.

Zachary Julian, a senior security analyst at Bishop Fox, discovered Sarahah’s uploading of private information when he installed the app on his Android phone, a Galaxy S5 running Android 5.1.1. The phone was outfitted with monitoring software, known as Burp Suite, which intercepts internet traffic entering and leaving the device, allowing the owner to see what data is sent to remote servers. When Julian launched Sarahah on the device, Burp Suite caught the app in the act of uploading his private data.

“As soon as you log into the application, it transmits all of your email and phone contacts stored on the Android operating system,” he said. He later verified the same occurs on Apple’s iOS, albeit after a prompt to “access contacts,” which also appears in newer versions of Android. Julian also noticed that if you haven’t used the application in a while, it’ll share all of your contacts again. He did some testing of the app on a Friday night, and when he booted the app on a Sunday morning, it pushed all of his contacts again.

Source: Hit App Sarahah Quietly Uploads Your Address Book

The callous way companies like this, Sonos, Uber, Google, Microsoft etc etc etc handle your privacy like it’s dogshit is completely incredible.

‘Data is the new oil’: Your personal information is now the world’s most valuable commodity

What “the big five” are selling — or not selling, as in the case of free services like Google or Facebook — is access. As we use their platforms, the corporate giants are collecting information about every aspect of our lives, our behaviour and our decision-making. All of that data gives them tremendous power. And that power begets more power, and more profit.

On one hand, the data can be used to make their tools and services better, which is good for consumers. These companies are able to learn what we want based on the way we use their products, and can adjust them in response to those needs.

“It enables certain companies with orders of magnitude more surveillance capacity than rivals to develop a 360-degree view of the strengths and vulnerabilities of their suppliers, competitors and customers,” says Frank Pasquale, professor of law at the University of Maryland and author of Black Box Society.

Access to such sweeping amounts of data also allows these giants to spot trends early and move on them, which sometimes involves buying up a smaller company before it can become a competitive threat. Pasquale points out that Google/Alphabet has been using its power “to bully or take over rivals and adjacent businesses” at a rate of about “one per week since 2010.”

But it’s not just newer or smaller tech companies that are at risk, says Taplin. “When Google and Facebook control 88 per cent of all new internet advertising, the rest of the internet economy, including things like online journalism and music, are starved for resources.”

Traditionally, this is where the antitrust regulators would step in, but in the data economy it’s not so easy. What we’re seeing for the first time is a clash between the concept of the nation state and these global, borderless corporations.

Source: ‘Data is the new oil’: Your personal information is now the world’s most valuable commodity

AccuWeather caught sending user location data — even when location sharing is off

Security researcher Will Strafach intercepted the traffic from an iPhone running the latest version of AccuWeather and its servers and found that even when the app didn’t have permission to access the device’s precise location, the app would send the Wi-Fi router name and its unique MAC address to the servers of data monetization firm Reveal Mobile every few hours. That data can be correlated with public data to reveal an approximate location of a user’s device.

We independently verified the findings, and were able to geolocate an AccuWeather-running iPhone in our New York office within just a few meters, using nothing more than the Wi-Fi router’s MAC address and public data.

Source: AccuWeather caught sending user location data — even when location sharing is off

Around the same time Sonos is ignoring privacy as well, it looks like everyone is basically just taking the piss with your privacy.

Towards quantum communications in free-space seawater

Here we experimentally demonstrate that polarization quantum states including general qubits of single photon and entangled states can survive well after travelling through seawater. We perform experiments with seawater collected over a range of 36 kilometers in the Yellow Sea. For single photons at 405 nm in a blue-green window, we obtain an average process fidelity above 98%

The Optical Society

Pirate Bay Founders Ordered to Pay Music Labels $477,000

Two founders of The Pirate Bay have been ordered by a court in Finland to pay record labels more than $477,000 in compensation. Fredrik Neij and Gottfrid Svartholm were found liable for ongoing copyright breaches on the site. Neither appeared to mount a defense so both were found guilty in their absence.

In November 2011, the International Federation of the Phonographic Industry (IFPI), with support from Finnish anti-piracy group Copyright Information and Anti-Piracy Center (CIAPC), filed a lawsuit in the Helsinki District Court against The Pirate Bay.

IFPI, which represents the world’s major labels, demanded that the site’s operators stop facilitating the unauthorized distribution of music and pay compensation to IFPI and CIAPC-affiliated rightsholders for the damages caused through their website.

Progress in the case has been somewhat glacial but this morning, almost six years after the complaint was first filed, a decision was handed down.

Source: Pirate Bay Founders Ordered to Pay Music Labels $477,000 – TorrentFreak

The law is insane – why has Google not been sued to this extent? So the labels get a load of money: how will they divide this amongst their artists? I think the answer is NOT.

Mini-antennas 100,000 x more efficient, could be used for brain interface machinery, anything tiny.

Antennas receive information by resonating with EM waves, which they convert into electrical voltage. For such resonance to occur, a traditional antenna’s length must roughly match the wavelength of the EM wave it receives, meaning that the antenna must be relatively big. However, like a guitar string, an antenna can also resonate with acoustic waves. The new antennas take advantage of this fact. They will pick up EM waves of a given frequency if its size matches the wavelength of the much shorter acoustic waves of the same frequency. That means that that for any given signal frequency, the antennas can be much smaller.

The trick is, of course, to quickly turn the incoming EM waves into acoustic waves. To do that, the two-part antenna employs a thin sheet of a so-called piezomagnetic material, which expands and contracts when exposed to a magnetic field. If it’s the right size and shape, the sheet efficiently converts the incoming EM wave to acoustic vibrations. That piezomagnetic material is then attached to a piezoelectric material, which converts the vibrations to an oscillating electrical voltage. When the antenna sends out a signal, information travels in the reverse direction, from electrical voltage to vibrations to EM waves. The biggest challenge, Sun says, was finding the right piezomagnetic material—he settled on a combination of iron, gallium, and boron—and then producing it at high quality.

The team created two kinds of acoustic antennas. One has a circular membrane, which works for frequencies in the gigahertz range, including those for WiFi. The other has a rectangular membrane, suitable for megahertz frequencies used for TV and radio. Each is less than a millimeter across, and both can be manufactured together on a single chip. When researchers tested one of the antennas in a specially insulated room, they found that compared to a conventional ring antenna of the same size, it sent and received 2.5 gigahertz signals about 100,000 times more efficiently, they report today in Nature Communications.

Source: Mini-antennas could power brain-computer interfaces, medical devices | Science | AAAS

Sonos strongarms customers into giving up privacy, or hardware stops working. Here’s how to to Stop Your Sonos From Collecting (As Much) Personal Data

Bad news, Sonos customers: to lay the groundwork for its upcoming voice assistant support, the company is asking users to agree to an updated privacy policy, one that includes both mandatory data collection rules and a mention about future device functionality. Should you disagree with said policy update, your device’s basic functions could stop working, according to Consumerist.

Source: How to Stop Your Sonos From Collecting (As Much) Personal Data

In a blog post, Sonos claimed the update was necessary to “improve your listening experience” and identify issues by analyzing collected error information. Its earlier privacy policy (you can check it out here) allowed users to choose whether or not they wanted to register their device with Sonos for data collection. The new one says that opting out of “Functional Data collection” is not an option.
Data Collection is Mandatory

Data collected previously included information about equalizer usage, playback errors, and time spent listening to local or streaming music. Its new privacy policy, however, collects what the company is calling “Functional Data,” information Sonos claims is “absolutely necessary for your Sonos System to perform its basic functions in a secure way.” Functional Data includes personal information like location data, IP addresses, and more:

Registration data:

This data includes your email address, location, language preference, Product serial number, IP address, and Sonos account login information (as described above).

System data:

This data includes things like product type, controller device type, operating system of controller, software version information, content source (audio line in), signal input (for example, whether your TV outputs a specific audio signal such as Dolby to your Sonos system), information about wifi antennas, audio settings (such as equalization or stereo pair), Product orientation, room names you have assigned to your Sonos Product, whether your product has been tuned using Sonos Trueplay technology, and error information.

Sonos is also trying to collect performance and activity information shown below, otherwise known as Additional Usage Data:

Performance Information:

This includes things like temperature of your Product, Wi-Fi information such as signal strength, what music services you have connected to your Sonos system (including, for some services, your login username – but not password – for such service), information about how often you use the Sonos app versus another control mechanism, flow of interactions within the Sonos app, how often you use the physical controls on the unit, and location data when the Sonos app is in use, and duration of Sonos Product use.

Activity Information:

This includes duration of music service use, Product or room grouping information; command information such as play, pause, change volume, or skip tracks; information about track, playlist, or station container data; and Sonos playlist or Sonos favorites information; each correlated to individual Sonos Products.

How to (Partially) Protect Yourself

For now, as long as you don’t enable voice assistant support, you can opt out of sharing the aforementioned Additional Usage Data with Sonos by adjusting some settings in your apps.

Sonos for iOS or Android:

From the Sonos music menu, tap Settings.
Tap Advanced Settings.
Tap Usage Data then Turn off Usage Data Sharing.

Sonos for Mac:

From the menu bar at the top of your screen click Sonos then Preferences.
On the left side of the window, click Advanced.
Click Improve Sonos.
Check the box that reads Turn usage data sharing off.

Sonos for PC:

From the menu bar at the top of the Sonos app click Manage then Settings.
On the left side of the window, click Advanced.
Click Improve Sonos.
Check the box that reads Turn usage data sharing off.

If you’re concerned about the data Sonos may have already collected, you can edit or delete it by accessing your Sonos account online or going through the Sonos app, though deleting personal data could render your Sonos device useless. You can also shoot Sonos an email and ask them to delete your personal data, if you’re into that.

And the US high courts still say that accepting these kind of terms of service is legal. Sonos hardware is expensive and forcing people to change the terms of their use after the financial investment makes it even worse than the disgrace that this kind of behavior is already.

Buying a new Monitor / TV

When buying a new monitor there are 5 sites you should have open at all times:
1. The site selling monitors (eg plattetv.nl)
2. The comparison site Display specifications which allows you to search for models, add them to comparison lists and then view detailed specifications next to each other
3. A google search for the reviews of the model
4. AV Forums to search for good or bad experiences with the model.
5. Your price comparison site (eg Tweakers Pricewatch)

Also useful are sites that tell you what each model means, how the model number is built up. For Samsung you can use This site

The important specifications are:
What type of panel is it? (IPS / VA / PQL / OLED / Quantum Dot / QLED / MicroLED / etc)

Panel bit depth: is it 8 bits, 10 bits native or 10 bits (8 bits + FRC)

Colour bit depth: 30 bits?

Resolution: native UHD 3840×2160 pixels

Pixel density: higher is better

Display area: bigger is better

Static contrast: more is better

Response times (minimum / average) and input lag (for gaming): less is better

3D: if you think that’s important

frequency: most are 60Hz, some are 120Hz or 200Hz (higher is better)

Interpolation value: most are around 1200, higher is better

Power consumption: less is better

Other features:

  • connectivity (what kind of USB ports (3.0?), HDMI, Displayport etc fit in)
  • sizes
  • colour
  • stand size at the back
  • network (does it do 802.11n 5G and 802.11ac?)
  • features

Good luck!

Amazons Macie detects data leaks in S3 buckets using AI

Think of Macie as a data loss prevention agent, a DLPbot, that uses machine learning to understand a user’s pattern of access to data in S3 buckets. The buckets have permission levels and the data in a bucket can be ranked for sensitivity or risk, using items such as credit card numbers, and other sensitive personal information.

The software monitors users’ behaviour and profiles it. If there are changes in the pattern of that behaviour and they are directed towards high-risk data then Macie can alert admin staff to a potential breach risk.

For example, if a hacker successfully impersonates a valid user and then goes searching for data in unexpected places and/or from an unknown IP address then Macie can flag this unusual pattern of activity. The product could also identify a valid employee going rogue, say, generating a store of captured data ready to steal it.

Source: If there’s a hole in your S3 bucket, data thieves will be sprayed by Macie

Bitcoin-accepting sites leave cookie trail that crumbles anonymity

Of the 130 sites the researchers checked:

In total, 107 sites leaked some kind of transaction information;
31 allowed third-party scripts to access users’ Bitcoin addresses;
104 shared the non-BTC denominated price of a transaction; and
30 shared the transaction price in Bitcoin.

It doesn’t help that even for someone running tracking protection, a substantial amount of personal information was passed around by the sites examined in the study.
Information type With tracking protection Without protection
E-mail 32 25
First name 27 20
Last name 25 19
User ID 15 12
Address 13 9
Full name 11 4
Phone 10 4
Company 5 4

A total of 49 merchants shared users’ identifying information, and 38 shared that even if the user tries to stop them with tracking protection.

Users have very little protection against all this, the paper says: the danger is created by pervasive tracking, and it’s down to merchants to give users better privacy.

Source: Bitcoin-accepting sites leave cookie trail that crumbles anonymity

Peanut allergy cured for 4 years in majority of children in immunotherapy trial

A small clinical trial conducted at the Murdoch Children’s Research Institute has led to two-thirds of children treated with an experimental immunotherapy treatment being cured of their allergy. Importantly, this desensitisation to peanuts persisted for up to four years after treatment.
[…]
Forty-eight children were enrolled in the PPOIT trial and were randomly given either a combination of the probiotic Lactobacillus rhamnosus with peanut protein in increasing amounts, or a placebo, once daily for 18 months.

At the end of the original trial in 2013, 82% of children who received the immunotherapy treatment were deemed tolerant to peanuts compared with just 4% in the placebo group.

Four years later, the majority of the children who gained initial tolerance were still eating peanuts as part of their normal diet and 70% passed a further challenge test to confirm long-term tolerance.

Source: Peanut allergy cured in majority of children in immunotherapy trial

USA: those massive terms &c you never read are legally binding: and can stop you from using the legal system to sue! (Victory for Uber!)

You may never read those lengthy terms and conditions attached to every digital download or app but, in America at least, they are legally binding. Sorry.

That’s the conclusion of a panel of appeal judges earlier this week when shining beacon of corporate responsibility Uber insisted its users had agreed not to sue the company somewhere in its long list of lengthy legal locutions.

On Thursday, the US Second Court of Appeals decided [PDF] that when customers installed Uber’s ride-hailing app and agreed to the terms and conditions – even though virtually none of them actually read the details – they were obliged to go through arbitration if they had a dispute with the company.

The case was very closely watched by technology companies for obvious reasons – if the court ruled differently it could have opened them up to a wave of potential liability and public scrutiny.

As it stands, the arbitration requirement will hold: a situation that enables many companies to keep embarrassing cock-ups and business practices under wraps since unhappy consumers are obliged to go through the process privately and details are not made public.

Source: Sorry, but those huge walls of terms and conditions you never read are legally binding

Absolute legal lunacy!