Scientists make transparent materials absorb light

A group of physicists from Russia, Sweden and the U.S. has demonstrated a highly unusual optical effect. They managed to “virtually” absorb light using a material that has no light-absorbing capacity. The research findings, published in Optica, break new ground for the creation of memory elements for light.

The absorption of electromagnetic radiation, including light, is one of the main effects of electromagnetism. This process takes place when electromagnetic energy is converted to heat or another kind of energy within an absorbing material (for instance, during electron excitation). Coal, black paint and carbon nanotube arrays—also known as Vantablack—appear black because they absorb the energy of the incident light almost completely. Other materials, such as glass or quartz, have no absorbing properties and therefore look transparent.

In their theoretical research, the results of which were published in the journal Optica, the physicists managed to dispel that simple and intuitive notion by making a completely transparent material appear perfectly absorbing. To achieve that, the researchers employed special mathematical properties of the scattering matrix—a function that relates an incident electromagnetic field with the one scattered by the system. When a light beam of time-independent intensity hits a transparent object, the light is not absorbed, but is scattered by the material—a phenomenon caused by the unitary property of the scattering matrix. It turned out, however, that if the intensity of the incident beam is varied with time in a certain fashion, the unitary property can be disrupted, at least temporarily. In particular, if the intensity growth is exponential, the total incident light energy will accumulate in the transparent material without leaving it (fig. 1). That being the case, the system will appear perfectly absorbent from the outside

Source: Scientists make transparent materials absorb light

AirHelp zet volgende stap in kunstmatige intelligentie

Air Help, het claimbedrijf voor vliegtuigpassagiers, zet kunstmatige intelligentie in om real-time te beslissen of een claim sterk genoeg is om in te dienen. De juridische bot Lara bepaalt of vertragingen en annuleringen conform de Europese regelgeving in aanmerking komen voor een vergoeding.De bot is geprogrammeerd om onder andere de vluchtstatus, luchthavenstatistieken en weerrapporten te beoordelen. Lara is getest op meer dan zesduizend aanvragen. Het zelflerende systeem beoordeelt claims met een accuratesse van 95 procent vergeleken met een menselijke score van 91 procent.

Source: AirHelp zet volgende stap in kunstmatige intelligentie – Emerce

66 Percent of Popular Android Cryptocurrency Apps Don’t Use Encryption

High-Tech Bridge used its free mobile app analysis software, called Mobile X-Ray, to peek under the hood of the top 30 cryptocurrency apps in the Google Play store at three different popularity levels: apps with up to 100,000 downloads, up to 500,000 downloads, and apps with more than 500,000 downloads. So, a total of 90 apps altogether. Of the most popular apps, 94 percent used outdated encryption, 66 percent didn’t use HTTPS to encrypt user information in transit, 44 percent used hard-coded default passwords (stored in plain text in the code), and overall 94 percent of the most popular apps were found to have “at least three medium-risk vulnerabilities.”

Source: 66 Percent of Popular Android Cryptocurrency Apps Don’t Use Encryption – Motherboard

Former DHS employee had 246000 DHS employee records at home to sell. DHS waits 3 months(!) to notify employees.

The sensitive personal information of 246,000 Department of Homeland Security employees was found on the home computer server of a DHS employee in May, according to documents obtained by USA TODAY.

Also discovered on the server was a copy of 159,000 case files from the inspector general’s investigative case management system, which suspects in an ongoing criminal investigation intended to market and sell, according to a report sent by DHS Inspector General John Roth on Nov. 24 to key members of Congress.

The information included names, Social Security numbers and dates of birth, the report said.

The inspector general’s acting chief information security officer reported the breach to DHS officials on May 11, while IG agents reviewed the details.

.Acting DHS Secretary Elaine Duke decided on Aug. 21 to notify affected employees who were employed at the department through the end of 2014 about the breach.

Source: Former DHS employee had sensitive info stashed on home computer s

As Apple fixes macOS root password hole, here’s what went wrong (note: get patching!)

The patch addresses a flaw in its operating system that allows anyone sitting at a Mac to gain administrator access by entering “root” as the username and leaving the password box blank in authentication prompts. This works when altering system settings, logging into the machine, and accessing it remotely via VNC, RDP, screen sharing, and so on. It can also be used to log into system accounts, such as _uucp, and via the command line, which is useful for malware seeking to gain superuser privileges.

If you’re running High Sierra, you’re urged to install the update as soon as possible.

Source: As Apple fixes macOS root password hole, here’s what went wrong • The Register

Coinbase ordered to report 14,355 users to the IRS

A California federal court has ordered Coinbase to turn over identifying records for all users who have bought, sold, sent, or received more than $20,000 through their accounts in a single year between 2013 and 2015. Coinbase estimates that 14,355 users meet the government’s requirements. The full order is embedded below.

For each account, the company has been asked to provide the IRS with the user’s name, birth date, address, and taxpayer ID, along with records of all account activity and any associated account statements. The result is both a definitive link to the user’s identity and a comprehensive record of everything they’ve done with their Coinbase account, including other accounts to which they’ve sent money.

Source: Coinbase ordered to report 14,355 users to the IRS – The Verge

Bacteria found on International Space Station may be alien in origin, says cosmonaut

Bacteria found on the outside of the International Space station could be alien life, according to a cosmonaut who has visited the satellite.

Spacewalkers regularly take samples and materials from the outside of the station when they head outside for what are officially called “extravehicular activity”. Those samples are then taken down to scientists on Earth, who study them to understand the workings of the International Space Station and possibly life in space.

“Bacteria that had not been there during the launch of the ISS module were found on the swabs,” Mr Shkaplerov told TASS. “So they have flown from somewhere in space and settled on the outside hull.”

He made clear that “it seems, there is no danger​”, and that scientists are doing more work to find out what they are.

He said also that similar missions had found bacteria that could survive temperatures between -150 degrees celsius and 150. That bacteria appears to have made its way from Earth – but suggests that it can survive in the harsh environments of space.

Source: Bacteria found on International Space Station may be alien in origin, says cosmonaut | The Independent

Amazon Announces Five New Machine Learning Services and the World’s First Deep Learning-Enabled Video Camera for Developers

AWS Announces Five New Machine Learning Services and the World’s First Deep Learning-Enabled Video Camera for Developers

Amazon SageMaker makes it easy to build, train, and deploy machine learning models

AWS DeepLens is the world’s first deep learning-enabled wireless video camera built to give developers hands-on experience with machine learning

Amazon Transcribe, Amazon Translate, Amazon Comprehend, and Amazon Rekognition Video allow app developers to easily build applications that transcribe speech to text, translate text between languages, extract insights from text, and analyze videos

Source: Amazon – Press Room – RSS Content

Using heart size by scanning using doppler radar as a biometric

Forget fingerprint computer identification or retinal scanning. A University at Buffalo-led team has developed a computer security system using the dimensions of your heart as your identifier.

The system uses low-level Doppler radar to measure your heart, and then continually monitors your heart to make sure no one else has stepped in to run your computer.

Source: Goodbye, login. Hello, heart scan. – University at Buffalo

Empirical evidence on how to interrogate: build rapport, not conflict

The Alisons, husband and wife, have done something no scholars of interrogation have been able to do before. Working in close cooperation with the police, who allowed them access to more than 1,000 hours of tapes, they have observed and analysed hundreds of real-world interviews with terrorists suspected of serious crimes. No researcher in the world has ever laid hands on such a haul of data before. Based on this research, they have constructed the world’s first empirically grounded and comprehensive model of interrogation tactics.

The Alisons’ findings are changing the way law enforcement and security agencies approach the delicate and vital task of gathering human intelligence. “I get very little, if any, pushback from practitioners when I present the Alisons’ work,” said Kleinman, who now teaches interrogation tactics to military and police officers. “Even those who don’t have a clue about the scientific method, it just resonates with them.” The Alisons have done more than strengthen the hand of advocates of non-coercive interviewing: they have provided an unprecedentedly authoritative account of what works and what does not, rooted in a profound understanding of human relations. That they have been able to do so is testament to a joint preoccupation with police interviews that stretches back more than 20 years.
[…]
Each interview had to be minutely analysed according to an intricate taxonomy of interrogation behaviours, developed by the Alisons. Every aspect of the interaction between interviewee and interviewer (or interviewers – sometimes there are two) was classified and scored. They included the counter-interrogation tactics employed by the suspects (complete silence? humming?), the manner in which the interviewer asked questions (confrontational? authoritative? passive?), the demeanour of the interviewee (dominating? disengaged?), and the amount and quality of information yielded. Data was gathered on 150 different variables in all.
[…]
Despite its reputation among elite practitioners, “rapport” has been vaguely defined and poorly understood. It is often conflated with simply being nice – Laurence Alison refers to this, derisively, as the “cappuccinos and hugs” theory. In fact, he observes, interviewers can fail because they are too nice, acquiescing too quickly to the demands of a suspect, or neglecting to pursue a line of purposeful questioning at a vital moment.

The best interviewers are versatile: they know when to be sympathetic, when to be direct and forthright. What they rarely do is impose their will on the interviewee, either overtly, through aggression, or covertly, through the use of “tricks” – techniques of unconscious manipulation, which make the interviewer feel smart but are often seen through by interviewees. Above all, rapport, in the sense used by the Alisons, describes an authentic human connection. “You’ve got to mean it,” is one of Laurence’s refrains.

Source: The scientists persuading terrorists to spill their secrets | News | The Guardian

Paltering: lying by using the truth

There are three types of lies: omission, where someone holds out on the facts; commission, where someone states facts that are untrue; and paltering, where someone uses true facts to mislead you. It’s not always easy to detect, but there are a few telltale signs.

A recent study, published in the Journal of Personality and Social Psychology, suggests the practice of paltering is pretty common, especially among business executives. Not only that, but the people who do it don’t seem to think they’re doing anything wrong—despite the fact that most people feel like it’s just as unethical and untrustworthy as intentional lies of commission. It’s not just execs who do it, though. If you’ve ever tried to buy a used car from a slimy salesman, been in a salary negotiation with a tough as nails boss, or watched basically any presidential debate, you’ve definitely seen paltering in action.

Lifehacker

Boffins craft perfect ‘head generator’ to beat facial recognition

Researchers from the Max Planck Institute for Informatics have defeated facial recognition on big social media platforms – by removing faces from photos and replacing them with automatically-painted replicas.

As the team of six researchers explained in their arXiv paper this month, people who want to stay private often blur their photos, not knowing that this is “surprisingly ineffective against state-of-the-art person recognisers.”
[…]
The result, the boffins claimed, is that their model can provide a realistic-looking result, even when it’s faced with “challenging poses and scenarios” including different lighting conditions, such that the “fake” face “blends naturally into the context”.

In common with modern facial recognition systems, Sun’s software builds a point cloud of landmarks captured from someone’s face; its adversarial attack against recognition perturbed those points.

Pairs of points from the original landmarks (real) and the generated landmarks (fake) are fed into the “head generator and discriminator” software to create the inpainted face.

The Register

Facebook rolls out AI to detect suicidal posts before they’re reported

Facebook’s new “proactive detection” artificial intelligence technology will scan all posts for patterns of suicidal thoughts, and when necessary send mental health resources to the user at risk or their friends, or contact local first-responders. By using AI to flag worrisome posts to human moderators instead of waiting for user reports, Facebook can decrease how long it takes to send help.

Facebook previously tested using AI to detect troubling posts and more prominently surface suicide reporting options to friends in the U.S. Now Facebook is will scour all types of content around the world with this AI, except in the European Union, where General Data Protection Regulation privacy laws on profiling users based on sensitive information complicate the use of this tech.
[…]
Unfortunately, after TechCrunch asked if there was a way for users to opt out, of having their posts a Facebook spokesperson responded that users cannot opt out. They noted that the feature is designed to enhance user safety, and that support resources offered by Facebook can be quickly dismissed if a user doesn’t want to see them.]

Facebook trained the AI by finding patterns in the words and imagery used in posts that have been manually reported for suicide risk in the past. It also looks for comments like “are you OK?” and “Do you need help?”

Techcrunch

Pornhub owner may become the UK’s gatekeeper of online porn

Mindgeek may be the most powerful company that you’ve never heard of, or at least, a company you’ll claim never to have heard about in polite company. It’s the conglomerate that owns some of the world’s most visited porn sites, including Pornhub, RedTube and YouPorn. Far from simply being a popular and free way for people to consume adult content, it may soon have a powerful political role in the UK that will ensure its dominance for decades to come. That’s because, within the next year, Mindgeek may become the principal gatekeeper between the country’s internet users and their porn.

In April, the UK passed the Digital Economy Act 2017, legislation that mandated that any website showing adult content must verify the ages of its visitors. It was pushed through in response to concerns that children were being corrupted by easy access to and exposure to adult content at an early age. Section 15(1) of the bill requires that “pornographic material” not be published online, on a “commercial basis,” unless it is “not normally accessible by those under 18.” The bill has several flaws, not least the number of vague proposals it contains, and the ad hoc definition of what pornography actually is.

Section 17 of the same act outlined the creation of an “age-verification regulator,” the digital equivalent of a bouncer standing between you and your porn. This gatekeeper will have the right, and duty, to demand you show proof of age, or else refuse you access. In addition, the body will be able to impose fines and enforcement notices on those who either neglect or circumvent the policy.
[…]
Mindgeek’s discussions with the UK government are a matter of public record, as are some of the documents relating to the discussions. In one email, an unnamed Mindgeek representative proposed the gray-listing — essentially a temporary block — of more than four million URLs that (British ISP) Sky has cataloged. Each one of these sites, including Twitter, would then be contacted and told to sign up to the age verification system — like Mindgeek’s nascent AgeID — or face blacklisting. A Mindgeek spokesperson confirmed to Engadget that it believes up to 25 million Britons could sign up to its system.
Yahoo news

Posted in Sex

Using LED lighting has resulted in more light, no energy savings

Using satellite-based sensors, an international team of scientists sought to understand if our planet’s surface is getting brighter or darker at night, and to determine if LEDs are saving energy at the global scale. With the introduction of solid-state lighting—such as LEDs, OLEDs, and PLEDs—it was thought (and hoped) that the transition to it from conventional lighting—like electrical filaments, gas, and plasma—would result in big energy savings. According to the latest research, however, the use of LEDs has resulted in a “rebound” effect whereby many jurisdictions have opted to use even more light owing to the associated energy savings.

Gizmodo

Using Generative Adverserial Networks to create terrain maps

A team of researchers from the University of Lyon, Purdue and Ubisoft have published a paper showing what may well be the future of creating video game worlds: an AI that is able to construct most of its own 3D landscapes.

Similar to Nvidia’s work that is able to conjure its own celebrity mugshots, the tech would require only minimal input from a human, who would just have to contribute some basic requirements, draw some lines then let the AI do all the hard work: namely, filling in all the gaps with elevation, ridges and natural-looking rock formations.

Kotaku

Canon TS6050 – the printer to not get

Having been very happy about my old Canon printer, I decided to get another one when it died after four years of trusted service. This one is absolutely horrific. It started off with difficulties connecting via WiFi. The amount of paper jams I have is around 1 page printed to 1 page jammed. The scanner can’t remember if you want to scan a PDF or a PNG and defaults to PNG. Scans are unceremoniously dumped into the Documents folder. When you open the lid to change pages to scan, you are as likely to open the ink drawer. Occassionaly the printer decides to forget what type of paper is in the drawer and asks you to register the paper type (it has never been anything BUT A4!). Sometimes it just randomly prints off blank pages. Because it feels like it. A true frustration, getting behind this damn thing.

EU passes law that allows it to shut down websites without judicial oversight

The European Union (EU) has voted on Tuesday, November 14, to pass the new Consumer Protection Cooperation regulation, a new EU-wide applicable law that gives extra power to national consumer protection agencies, but which also contains a vaguely worded clause that also grants them the power to block and take down websites without judicial oversight.

The new law “establishes overreaching Internet blocking measures that are neither proportionate nor suitable for the goal of protecting consumers and come without mandatory judicial oversight,” Member of the European Parliament Julia Reda said in a speech in the European Parliament Plenary during a last ditch effort to amend the law.

“According to the new rules, national consumer protection authorities can order any unspecified third party to block access to websites without requiring judicial authorization,” Reda added later in the day on her blog.

This new law is an EU regulation and not a directive, meaning its obligatory for all EU states, which do not have to individually adopt it.

German Regulators Ban Smartwatches for Kids, Urge Parents to Destroy Them

Last month, the European Consumer Organization (BEUC) warned that smartwatches marketed to kids were a serious threat to children’s privacy. A report published by the Norwegian Consumer Council in mid-October revealed serious flaws in several of the devices that could easily allow hackers to seize control.

Doing so could grant attackers access to both real-time and historical locational data, as well as a wealth of personal information.

You have to wonder who thought attaching a low-cost, internet-enabled microphone and a GPS tracker to a kid would be a good idea in the first place. Almost none of the companies offering these “toys” implement reasonable security standards, nor do they typically promise that the data they collect—from your children—won’t be used be used for marketing purposes.

Gizmodo

An Ethereum Startup (Confido) Just Vanished After People Invested $374K

Confido is a startup that pitched itself as a blockchain-based app for making payments and tracking shipments. It sold digital tokens to investors over the Ethereum blockchain in an ICO that ran from November 6 to 8. During the token sale, Confido sold people bespoke digital tokens that represent their investment in exchange for ether, Ethereum’s digital currency.

But on Sunday, the company unceremoniously deleted its Twitter account and took down its website. A company representative posted a brief comment to the company’s now-private subforum on Reddit, citing legal problems that prevent the Confido team from continuing their work. The same message was also posted to Medium but quickly deleted.

“Right now, we are in a tight spot, as we are having legal trouble caused by a contract we signed,” the message stated (a cached version of the Medium post is viewable). “It is likely that we will be able to find a solution to rectify the situation. However, we cannot assure you with 100% certainty that we will get through this.” The message was apparently written by Confido’s founder, one Joost van Doorn, who seems to have no internet presence besides a now-removed LinkedIn profile.

Even the Confido representative on Reddit doesn’t seem to know what’s going on, though, posting hours after the initial message, “Look I have absolutely no idea what has happened here. The removal of all of our social media platforms and website has come as a complete surprise to me.” Motherboard reached out to this representative over Reddit, but hasn’t received a response.

Confido tokens had a market cap of $10 million last week, before the company disappeared, but now the tokens are worthless. And investors are crying foul.

Motherboard

Yup, the wild wild west!

OnePlus phones have a secret root backdoor and the password is ‘angela’

An apparent factory cockup has left OnePlus Android smartphones with an exposed diagnostics tool that can be potentially exploited to root the handsets.

Security researcher Robert Baptiste suggested the EngineerMode APK was made by Qualcomm, and was intended to be used by factory staff to test phones for basic functionality before they are shipped out to the public.

Unfortunately, it seems someone at OnePlus forgot to remove or disable the package before kicking the handsets out to the general public, and as a result folks now have access to what is effectively a backdoor in their Android phones.

In addition to basic diagnostic tasks like checking the functionality of the phone’s hardware components – such as the GPS and wireless electronics – the tool can also allow people, using the password ‘angela’, to obtain root access and gain full control over a device:

The Register

Being able to root your phone gives you access to the full functionality of the OS, however. This is something I think is a good idea – there are plenty of apps (eg battery monitors) that require root access to function.

Scientists edit a person’s DNA to try to cure disease

Scientists for the first time have tried editing a gene inside the body in a bold attempt to permanently change a person’s DNA to cure a disease.

The experiment was done Monday in California on 44-year-old Brian Madeux. Through an IV, he received billions of copies of a corrective gene and a genetic tool to cut his DNA in a precise spot.

“It’s kind of humbling” to be the first to test this, said Madeux, who has a metabolic disease called Hunter syndrome. “I’m willing to take that risk. Hopefully it will help me and other people.”

Signs of whether it’s working may come in a month; tests will show for sure in three months.
[…]
“We cut your DNA, open it up, insert a gene, stitch it back up. Invisible mending,” said Dr. Sandy Macrae, president of Sangamo Therapeutics, the California company testing this for two metabolic diseases and hemophilia. “It becomes part of your DNA and is there for the rest of your life.”

AP News

Pawnbroker pwnd: Cash Converters says hacker slurped customer data

Pawnbroking and secondhand goods outlet Cash Converters has suffered a data breach.

Customers were notified of the leak on Thursday by email, samples of which have been posted on social media.

Cash Converters said it had discovered that a third party gained unauthorised access to customer data within the company’s UK webshop.

Credit card data was not stored. However, hackers may have accessed user records including personal details, passwords, and purchase history from a website that was run by a third party and decommissioned back in September. The current webshop site is not affected, the firm said.

The Register