The Linkielist

Linking ideas with the world

The Linkielist

Trustify CEO gets eight years for lying to investors, spending millions on homes, private jets, sports tickets

A tech CEO who lied to investors to get funding and then blew millions of it on maintaining a luxury lifestyle, which included private jets and top seats at sporting events, has been sentenced to just over eight years in prison.

Daniel Boice, 41, set up what he claimed would be the “Uber of private investigators,” called Trustify, in 2015. He managed to pull in over $18m in funding from a range of investors by lying about how successful the business was.

According to the criminal indictment [PDF] against him, investors received detailed financial statements that claimed Trustify was pulling in $500,000 a month and had hundreds of business relationships that didn’t exist. Boice also emailed, called, and texted potential investors claiming the same. But, prosecutors say, the truth was that the biz was making “significantly less” and the documentation was all fake.

The tech upstart started to collapse in November 2018 when losses mounted to the point where Boice was unable to pay his staff. When they complained, he grew angry, fired them, and cut off all company email and instant messaging accounts, they allege in a separate lawsuit [PDF] demanding unpaid wages.

Even as Trustify was being evicted from its office, however, Boice continued to lie to investors, claiming he had $18m in the bank when accounts show he had less than $10,000. Finally in 2019 the company was placed into corporate receivership, leading to over $18m in losses to investors and over $250,000 in unpaid wages.

As well as creating false income and revenue documents, Boice was found to have faked an email from one large investor saying that it was going to invest $7.5m in the business that same day – and then forwarded it to another investor as proof of interest. That investor then sank nearly $2m into the business.

Profligate

While the business was failing, however, Boice used millions invested in it to fund his own lifestyle. He put down deposits on two homes in the US – a $1.6m house in Virginia and a $1m beach house in New Jersey – using company funds. He also paid for a chauffeur, house manager, and numerous other personal expenses with Trustify cash. More money was spent on holidays, a $83,000 private jet flight to Vermont, and over $100,000 was spent on seats at various sporting events. His former employees also allege in a separate lawsuit that he spent $600,000 on a documentary about him and his wife.

[…]

Source: Trustify CEO gets eight years for lying to investors, spending millions on homes, private jets, sports tickets

Why People’s Expensive NFTs Keep Vanishing

When you buy an NFT for potentially as much as an actual house, in most cases you’re not purchasing an artwork or even an image file. Instead, you are buying a little bit of code that references a piece of media located somewhere else on the internet. This is where the problems begin. Ed Clements is a community manager for OpenSea who fields these kinds of problems daily. In an interview, he explained that digital artworks themselves are not immutably registered “on the blockchain” when a purchase is made. When you buy an artwork, rather, you’re “minting” a new cryptographic signature that, when decoded, points to an image hosted elsewhere. This could be a regular website, or it might be the InterPlanetary File System, a large peer-to-peer file storage system.

Clements distinguished between the NFT artwork (the image) and the NFT, which is the little cryptographic signature that actually gets logged. “I use the analogy of OpenSea and similar platforms acting like windows into a gallery where your NFT is hanging,” he said. “The platform can close the window whenever they want, but the NFT still exists and it is up to each platform to decide whether or not they want to close their window.” […] “Closing the window” on an NFT isn’t difficult. NFTs are rendered visually only on the front-end of a given marketplace, where you see all the images on offer. All the front-end code does is sift through the alphanumeric soup on the blockchain to produce a URL that links to where the image is hosted, or less commonly metadata which describes the image. According to Clement: “the code that finds the information on the blockchain and displays the images and information is simply told, ‘don’t display this one.'”

An important point to reiterate is that while NFT artworks can be taken down, the NFTs themselves live inside Ethereum. This means that the NFT marketplaces can only interact with and interpret that data, but cannot edit or remove it. As long as the linked image hasn’t been removed from its source, an NFT bought on OpenSea could still be viewed on Rarible, SuperRare, or whatever — they are all just interfaces to the ledger. The kind of suppression detailed by Clements is likely the explanation for many cases of “missing” NFTs, such as one case documented on Reddit when user “elm099” complained that an NFT called “Big Boy Pants” had disappeared from his wallet. In this case, the user could see the NFT transaction logged on the blockchain, but couldn’t find the image itself. In the case that an NFT artwork was actually removed at the source, rather than suppressed by a marketplace, then it would not display no matter which website you used. If you saved the image to your phone before it was removed, you could gaze at it while absorbing the aura of a cryptographic signature displayed on a second screen, but that could lessen the already-tenuous connection between NFT and artwork. If you’re unable to find a record of the token itself on the Ethereum blockchain, it “has to do with even more arcane Ethereum minutiae,” writes Ben Munster via Motherboard. He explains: “NFTs are generally represented by a form of token called the ERC-721. It’s just as simple to locate this token’s whereabouts as ether (Ethereum’s in-house currency) and other tokens such as ERC-20s. The NFT marketplace SuperRare, for instance, sends tokens directly to buyers’ wallets, where their movements can be tracked rather easily. The token can then generally be found under the ERC-721 tab. OpenSea, however, has been experimenting with a new new token variant: the ERC-1155, a ‘multitoken’ that designates collections of NFTs.

This token standard, novel as it is, isn’t yet compatible with Etherscan. That means ERC-1155s saved on Ethereum don’t show up, even if we know they are on the blockchain because the payments record is there, and the ‘smart contracts’ which process the sale are designed to fail instantly if the exchange can’t be made. […]”

In closing, Munster writes: “This is all illustrative of a common problem with Ethereum and cryptocurrencies generally, which despite being immutable and unhackable and abstractly perfect can only be taken advantage of via unreliable third-party applications.”

Source: Why People’s Expensive NFTs Keep Vanishing – Slashdot

Posted in Art

Privacy Laws Giving Big Internet Companies A Convenient Excuse To Avoid Academic Scrutiny – or not? A Balanced argument

For years we’ve talked about how the fact that no one really understands privacy, leads to very bad attempts at regulating privacy in ways that do more harm than good. They often don’t do anything that actually protects privacy — and instead screw up lots of other important things, from competition to free speech. In fact, in some ways, there’s a big conflict between open internet systems and privacy. There are ways to get around that — usually by moving the data from centralized silos out towards the ends of the network — but that’s rarely happening in practice. I mean, going back over thirteen years ago, we were writing about the inherent conflict between Facebook’s (then) open social graph and privacy. Yet, at the time, Facebook was cheered on for opening up its social graph. It was creating a more “open” internet, an internet that others could build upon.

But, of course, over the years things have changed. A lot. In 2018, after the Cambridge Analytica scandal, Mark Zuckerberg more or less admitted that the world was telling Facebook to lock everything down again:

I do think early on on the platform we had this very idealistic vision around how data portability would allow all these different new experiences, and I think the feedback that we’ve gotten from our community and from the world is that privacy and having the data locked down is more important to people than maybe making it easier to bring more data and have different kinds of experiences.

As we pointed out in response — this was worrisome thinking, because it would likely take us away from a better world in which the data is more controlled by end users. Instead, so many people have now come to think that “protecting privacy” means making the big internet companies lock down our data rather than the much better approach which would be giving us full control over our own data. Those are two different things, that only sometimes look alike.

I say all of that as preamble in suggesting people read an excellent Protocol article by Issie Lapowsky, which — in a very thoughtful and nuanced way — highlights the unfortunate conflict between academic researchers trying to study the big internet companies and the companies’ insistence that they need to keep data private. We’ve touched on this topic before ourselves, in covering the still ongoing fight between Facebook and NYU regarding NYU’s Ad Observer project.

That project involves getting individuals to install a browser extension that shares data back to NYU about what ads the user sees. Facebook insists that it violates their privacy rules — and points to how much trouble it got in (and the massive fines it paid) over the Cambridge Analytica mess. Though, as we explained then, the scenarios are quite different.

Lapowsky’s article goes further — noting how Facebook told her that the Ad Observer project was collecting data without the user’s permission, which worried the PhD student who was working on the project. It turns out that was false. The project only collects data from the user who installs it and agrees (giving permission) to collect the data in question.

But the story and others in the article highlight an unfortunate situation: the somewhat haphazard demands on the big internet companies to “protect privacy” are now providing convenient excuses to those same companies to shut down academic research on those companies and their practices. In some cases there are legitimate concerns. For example, as the article notes, there were concerns about how much Facebook is willing to share regarding ad targeting. That information could be really important for those studying disinformation or civil rights issues. But… it could also be used in nefarious ways:

Facebook released an API for its political ad archive and invited the NYU team to be early testers. Using the API, Edelson and McCoy began studying the spread of disinformation and misinformation through political ads and quickly realized that the dataset had one glaring gap: It didn’t include any data on who the ads were targeting, something they viewed as key to understanding advertisers’ malintent. For example, last year, the Trump campaign ran an ad envisioning a dystopian post-Biden presidency, where the world is burning and no one answers 911 calls due to “defunding of the police department.” That ad, Edelson found, had been targeted specifically to married women in the suburbs. “I think that’s relevant context to understanding that ad,” Edelson said.

But Facebook was unwilling to share targeting data publicly. According to Satterfield, that could make it too easy to reverse-engineer a person’s interests and other personal information. If, for instance, a person likes or comments on a given ad, it wouldn’t be too hard to check the targeting data on that ad, if it were public, and deduce that that person meets those targeting criteria. “If you combine those two data sets, you could potentially learn things about the people who engaged with the ad,” Satterfield said.

Legitimate concern… but also allows the company to shield data that could be really useful to academics. Of course, it doesn’t help that so many people are so distrustful of these big companies that no matter what they do it will be portrayed — sometimes by the very same people — as evil. It was just a few weeks ago that we saw people screaming both about the big internet companies willing to cave in and pay Rupert Murdoch the Australian link tax… and when they refused to. Both options were painted as evil.

So, sharing data will inevitably be presented by some as violating people’s privacy, while not sharing data will be presented as hiding from researchers and trying to avoid transparency. And there’s probably some truth in every angle to these stories.

Of course, that all leaves out a better approach that these companies could do: give more power to the end users themselves to control their own data. Let the users decide what data is shared and what is not. Let the users decide where and how that data is stored (even if it’s not on the platform itself). But, instead, we just have people yelling about how these companies both have to protect everyone’s privacy and give access to researchers to see what they’re doing with all this data. I don’t think the “middle ground” laid out in the article is all that tenable. Right now it’s just to basically create special exceptions in which academics are “allowed” — under strict conditions — to get access to that data.

The problem with that framing is that the big internet companies still end up in control of the data, rather than the end users. The situation with NYU seems like a perfectly good example. Facebook shouldn’t have to share data from people who don’t consent, but with the Ad Observer, it’s all people who are actually consenting to handing over their own data, and Facebook shouldn’t be in the business of blocking that — even if it’s inevitable that some reporter at some future date will try to spin that into a story claiming that Facebook “violated” privacy because these researchers convinced people to turn over their own info.

Source: Privacy Laws Giving Big Internet Companies A Convenient Excuse To Avoid Academic Scrutiny | Techdirt

The argument Mike makes above is basically a plea for what Sir Tim Berners Lee, inventor of the internet is pleading for and already making in his companies Solid and Inrupt. User data is placed in personal Pods / Silos and the user can determine what data is given to who.

It’s an idealistic scenario that seems to ignore a few things:

  • who hosts the pods? the hoster can usually see into things or at any rate gather metadata (which is usually more valuable than the actual data). Who pays for hosting the pods?
  • will people understand and be willing to take the time to curate their pod access? people have trouble finding privacy settings on their social networks, this promises to be more complex
  • if a site requires access to data in a pod, won’t people blindly click on accept without understanding that they are giving away their data? Or will they be coerced into giving away data they don’t want because there are no alternatives to using the service?

The New York Times has a nice article on what he’s doing: He Created the Web. Now He’s Out to Remake the Digital World.

OpenSSL fixes high-severity flaw that allows hackers to crash huge amount servers globally

OpenSSL, the most widely used software library for implementing website and email encryption, has patched a high-severity vulnerability that makes it easy for hackers to completely shut down huge numbers of servers.

[…]

On Thursday, OpenSSL maintainers disclosed and patched a vulnerability that causes servers to crash when they receive a maliciously crafted request from an unauthenticated end user. CVE-2021-3449, as the denial-of-server vulnerability is tracked, is the result of a null pointer dereference bug. Cryptographic engineer Filippo Valsorda said on Twitter that the flaw could probably have been discovered earlier than now.

“Anyway, sounds like you can crash most OpenSSL servers on the Internet today,” he added.

Hackers can exploit the vulnerability by sending a server a maliciously formed renegotiating request during the initial handshake that establishes a secure connection between an end user and a server.

“An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client,” maintainers wrote in an advisory. “If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack.”

The maintainers have rated the severity high. Researchers reported the vulnerability to OpenSSL on March 17. Nokia developers Peter Kästle and Samuel Sapalski provided the fix.

Certificate verification bypass

OpenSSL also fixed a separate vulnerability that, in edge cases, prevented apps from detecting and rejecting TLS certificates that aren’t digitally signed by a browser-trusted certificate authority. The vulnerability, tracked as CVE-2021-3450, involves the interplay between a X509_V_FLAG_X509_STRICT flag found in the code and several parameters.

Thursday’s advisory explained:

If a “purpose” has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named “purpose” values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application.

In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose.

[…]

Source: OpenSSL fixes high-severity flaw that allows hackers to crash servers | Ars Technica

One of America’s $135.8 Million Fighter F-35 Jets Shot Itself

An F-35B Joint Strike Fighter shot itself in the skies above Arizona earlier this month, doing at least $2.5 million in damage. The pilot was unharmed and successfully landed the jet. The Pentagon isn’t quite sure how or why the jet shot itself and the incident is still under investigation.

As first reported by Military.com, the F-35 was flying in a training mission at night on March 12 at the Yuman Range Complex in Arizona when it shot itself. This particular F-35 has an externally mounted gatling gun that fires a 25mm armor piercing high explosive round. Sometime during the training, the gun discharged and the round exploded, damaging the underside of the jet.

The pilot landed the jet and a Navy investigation classified the accident as Class A. Class A accidents are the most severe, it’s a classification used when someone in the weapon dies, the whole jet is lost, or the property damage is $2.5 million or greater. “The mishap did not result in any injury to personnel, and an investigation of the incident is currently taking place,” Marine Corps spokesperson Captain Andrew Wood told Military.com.

[…]

Source: One of America’s $135.8 Million Fighter Jets Shot Itself

In 2019 a Dutch F-16 shot itself by flying into a stream of its’ own bullets. In 1956 an F-11 did the same thing. So not unheard of.

Source: A Dutch F-16 Flew Into Its Own Gunfire

Apple Webkit exploited to hack your idevice whilst browsing. Update now!

iOS 14.4.2 and iPadOS 14.4.2

Released March 26, 2021

WebKit

Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited.

Description: This issue was addressed by improved management of object lifetimes.

CVE-2021-1879: Clement Lecigne of Google Threat Analysis Group and Billy Leonard of Google Threat Analysis Group

Source: About the security content of iOS 14.4.2 and iPadOS 14.4.2 – Apple Support

GM, Ford, Tesla, Nio, Nissan, Toyota, VW, Subaru, Fiat – electric car companies shutdown due to global chip shortage

New York (CNN Business)A computer chip shortage has shut down the Louisville, Kentucky, Ford plant this week, the latest shutdown because of an industry-wide problem that is expected to spread to many other auto plants in the coming months.The Louisville plant employs 3,800 hourly workers, who will receive about 75% of their normal pay during the one-week shutdown. It assembles the Ford Escape and the Lincoln version of that SUV, the Corsair.

[…]

Automakers cut back orders for computer chips early last year when the pandemic slammed the brakes on auto sales and production because of temporary plant closings.When car sales bounced back sooner than expected, it left the industry struggling with a chip shortage. That was exacerbated by increased demand for laptops during the stay-at-home era — and the electronic and computer industries snapping up the excess supply of chips, said Kristin Dziczek, vice president of research at the Center for Automotive Research, a Michigan think tank.

[…]

Source: Ford shuts down a plant because it can’t find enough computer chips

The computer chip shortage is taking a bigger bite out of General Motors’ production plans than the company originally expected.Last week GM announced that three of itsNorth American plants — the Fairfax plant in Kansas City, Kansas, the CAMI plant in Ingersoll, Ontario and the San Luis Potosi plant in Mexico — would be shuttered this week due to the chip shortage. But on Tuesday the automaker said it would extend the shutdown through at least mid-March, at which time it will reassess its production plans.

[…]

Last week Ford said that its first quarter production would be cut by between 10% to 20% because of chip scarcity, which if it extends into the second quarter could cost the company between $1 billion and $2.5 billion in 2021. The problem for the industry cannot be fixed quickly according to Kristin Dziczek, vice president of research at the Center for Automotive Research, a Michigan think tank. “The magnitude of the impact of the semiconductor issues continues to grow week-to-week,” she said. “It looks like while the industry will resolve the shortages in 2021, the production impact may stretch into the third quarter.”

[…]

The Fairfax plant has about 2,000 hourly workers and 230 salaried staff. They will get about 75% of their normal pay during the shutdown through a combination of unemployment benefits and supplemental pay from GM.

[…]

Source: GM extends shutdown at three plants due to chip shortage

Tesla is shutting down a Model 3 production line at the Fremont, California, factory for two weeks amid an industrywide microchip shortage.

According to a new report from Bloomberg, Tesla has informed employees from a Model 3 production line at the Fremont factory that their line is being shut down until March 7:

Workers on a Model 3 production line in Fremont were told their line would be down from Feb. 22 until March 7, said the person, who asked not to be identified because the information is private. Impacted staff were told they would be paid for Feb. 22 and Feb. 23 and not paid for Feb. 28, March 1, 2 and 3. They were advised to take vacation time, if they had it.

The employees in question weren’t informed of the reason behind the shutdown, which remains unconfirmed.

Unlike Model S and Model X production at the Fremont factory, Tesla is not making any significant update to the Model 3 program, which received a refresh late last year.

[…]

The entire auto industry is currently dealing with a global shortage of microchips.

The shortage has already resulted in many vehicle production lines behind halted around the world. GM, Ford, Nissan, Toyota, Volkswagen, Suburu, and Fiat Chrysler have all announced halted or decelerated production lines due to the issue.

[…]

With the cold weather resulting in frequent power outages in Texas last week, Samsung was forced to shut down its semiconductor plant in Austin, which likely affected Tesla’s chip supply.

[…]

Source: Tesla shuts down Model 3 production line for 2 weeks amid chip shortage

China’s electric car startup Nio will shut down for five days due to the global semiconductor shortage, the company announced on Friday in a press release. The five day shutdown will start on Monday and will mean the company produces slightly fewer cars this year than it had planned.

“The overall supply constraint of semiconductors has impacted the Company’s production volume in March 2021,” Nio said in a statement. “The Company expects to deliver approximately 19,500 vehicles in the first quarter of 2021, adjusted from previously released outlook of 20,000 to 20,500 vehicles.”

Nio makes several different models, including a seven-seater electric SUV, a two-seater sports car, and has plans to produce a minivan in 2022. But Nio isn’t the only car company around the world feeling the pinch from the computer chip shortage. CNBC estimates the global auto industry as a whole will lose as much as $US60 ($79) billion from the lack of chips this year as it ripples around the world.

[…]

China is the largest EV market in the world, though Norway outpaces China in EV sales as a percentage of the country’s total car market. An estimated 1.3 million electric vehicles were sold in China last year, representing roughly 40% of all EVs sold around the world, according to research by Canalys. The U.S. market represented just 2.4% of all EV sales in 2020.

Source: Electric Car Company Nio Shuts Down Temporarily in China Over Global Chip Shortage

Data Broker Looking To Sell Global Real-Time Vehicle Location Data To Government Agencies, Including The Military

[…]

utting a couple of middle men between the app data and the purchase of data helps agencies steer clear of Constitutional issues related to the Supreme Court’s Carpenter decision, which introduced a warrant mandate for engaging in proxy tracking of people via cell service providers.

But phones aren’t the only objects that generate a wealth of location data. Cars go almost as many places as phones do, providing data brokers with yet another source of possibly useful location data that government agencies might be interested in obtaining access to. Here’s Joseph Cox of Vice with more details:

A surveillance contractor that has previously sold services to the U.S. military is advertising a product that it says can locate the real-time locations of specific cars in nearly any country on Earth. It says it does this by using data collected and sent by the cars and their components themselves, according to a document obtained by Motherboard.

“Ulysses can provide our clients with the ability to remotely geolocate vehicles in nearly every country except for North Korea and Cuba on a near real time basis,” the document, written by contractor The Ulysses Group, reads. “Currently, we can access over 15 billion vehicle locations around the world every month,” the document adds.

Historical data is cool. But what’s even cooler is real-time tracking of vehicle movements. Of course the DoD would be interested in this. It has a drone strike program that’s thirsty for location data and has relied on even more questionable data in the past to make extrajudicial “death from above” decisions in the past.

Phones are reliable snitches. So are cars — a fact that may come as a surprise to car owners who haven’t been paying attention to tech developments over the past several years. Plenty of data is constantly captured by internal “black boxes,” but tends to only be retained when there’s a collision. But the interconnectedness of cars and people’s phones provides new data-gathering opportunities.

Then there are the car manufacturers themselves, which apparently feel driver data is theirs for the taking and are willing to sell it to third parties who are (also apparently) willing to sell all of this to government agencies.

“Vehicle telematics is data transmitted from the vehicle to the automaker or OEM through embedded communications systems in the car,” the Ulysses document continues. “Among the thousands of other data points, vehicle location data is transmitted on a constant and near real time basis while the vehicle is operating.”

This document wasn’t obtained from FOIA requests. It actually couldn’t be — not if Ulysses isn’t currently selling to government agencies. It was actually obtained by Senator Ron Wyden, who shared it with Vice’s tech-related offshoot, Motherboard. As Wyden noted while handing it over, very little is known about these under-the-radar suppliers of location data and their government customers. This company may have no (acknowledged) government customers at this point, but real-time access to vehicle movement is something plenty of government agencies would be willing to pay for.

[…]

Source: Data Broker Looking To Sell Real-Time Vehicle Location Data To Government Agencies, Including The Military | Techdirt

Clothes retailer Fatface: Someone’s broken in and accessed your personal data, including partial card payment details… Don’t tell anyone

British clothes retailer Fatface has infuriated some customers by telling them “an unauthorised third party” gained access to systems holding their data earlier this year, and then asking them to keep news of the blunder to themselves.

Several people wrote into The Register to let us know about the personal data leak, with reader Terry saying: “You will notice the Fatface email is marked as confidential. This annoyed me.”

Chief exec Liz Evans wrote in an email titled “Strictly private and confidential – Notice of security incident” sent to users yesterday:

—–

Please do keep this email and the information included within it strictly private and confidential.

What happened?

On 17 January 2021, FatFace identified some suspicious activity within its IT systems. We immediately launched an investigation… [and] determined that an unauthorised third party had gained access to certain systems operated by us during a limited period of time earlier the same month….

Some of your personal data may have been involved in the incident. This could include some or all of the below listed categories of information relating to you.

  • First name and surname.
  • Email address.
  • Address details.
  • Partial payment card information by way of the last 4 digits and expiry date.

Please rest assured that full payment card information was not compromised. We have been working with the relevant authorities and external security experts to ensure a comprehensive response to the incident. In addition, we have notified the Information Commissioner’s Office in the UK and other law enforcement authorities of this incident.

We have taken various additional steps to further strengthen the security of our systems. Please rest assured that our systems are secure, our website remains fully operational and FatFace is a safe place to shop, both in store (when we can reopen our shops) and online.

—-

Quite reasonably, customers quickly took to social media to ask where they could find “a public statement on your data breach,” why it had waited so long to inform customers, why the mail was marked “confidential” and whether it was genuine. All were directed to kindly “DM” the firm’s social media handler.

It also noted that it would be giving recipients “access to a complimentary Experian Identity Plus membership… purely out of an abundance of caution and not because we consider your data specifically to be at risk.”

It did not detail how many people had been affected. The firm has “200 stores across the UK and Ireland” – doing particularly well in seaside areas – and offers international shipping, although its website currently says this is unavailable.

[…]

Source: Clothes retailer Fatface: Someone’s broken in and accessed your personal data, including partial card payment details… Don’t tell anyone • The Register

I guess they don’t have to notify anyone now that the UK is out of the EU and doesn’t have to conform to GDPR rules…

Guns.Com Got Hacked – personal data available on forum

Watch out, firearm lovers. The subtly-named guns.com, a place where Americans can go to pick out whatever stylish boomstick they like and have it shipped straight to their neck of the woods, seems to have a pretty awful data breach on its hands.

Back in January, a hacker temporarily disabled the company’s website, interfering with the site’s retail operations and forcing the weapons peddler to apologize to its confused customers for the whole debacle.

Guns.com has claimed that this attack was meant to prevent the “business from operating”—and that there is “no indication” of any attempt to steal data. However, this assessment may be wrong.

This week a large cache of files allegedly taken from the site appeared on the popular dark web site Raid Forums. In fact, an anonymous user offered Guns.com’s entire kit and caboodle—allegedly everything from troves of consumer and administrative data to the site’s stolen source code—free to all comers.

The data dump shows substantial gun buyer information, including user IDs, full names, email addresses, phone numbers, hashed passwords, and, most alarmingly, physical addresses—including city, state, and zip code information. The site data has been viewed by Gizmodo and it was originally reported on by Hackread.

The dump also seems to show access to information about many of the firearms providers that sell through the platform (the site acts as a location for sellers as much as for buyers), and Hackread reports that an excel file within the data tranche shows “sensitive login details of Guns.com including its administrator’s WordPress, MYSQL, and Cloud (Azure) credentials,” though it’s unclear if this is recent information. We also found back-end code for a Laravel-powered version of the site although it isn’t clear what platform the retailer is currently using.

[…]

Source: Guns.Com Got Hacked

Big Tech CEOs Waffle on Banning the 12 Major Anti-Vaxxers that cause 73% of misinformation

After a report from the Center for Countering Digital Hate (CCDH) and Anti-Vax Watch found that a huge percentage of misinformation and conspiracy theories about vaccines can be traced back to just a dozen people, the CEOs of Facebook, Google, and Twitter told Congress they weren’t sure they would ban them.

The CCDH/Anti-Vax Watch report found that some 73 percent of misinformation on Facebook, and 17 percent on Twitter, is linked to a group of 12 accounts including prominent anti-vaxxers Joseph Mercola, Robert F. Kennedy Jr., Ty & Charlene Bollinger, Sherri Tenpenny, and Rizza Islam. The report also identified what it concluded were clear violations of platform policies on the spread of disinformation about the novel coronavirus pandemic and vaccines in general. The report was prominently cited in a letter by 12 state attorneys general to Twitter CEO Jack Dorsey and Facebook CEO Mark Zuckerberg demanding they do more to fight coronavirus-related misinformation; according to the Washington Post, this mirrors internal Facebook research showing relatively tiny groups of users are primarily responsible for flooding the site with anti-vaccine content.

“Analysis of a sample of anti-vaccine content that was shared or posted on Facebook and Twitter a total of 812,000 times between 1 February and 16 March 2021 shows that 65 percent of anti-vaccine content is attributable to the Disinformation Dozen,” the report states. “Despite repeatedly violating Facebook, Instagram, and Twitter’s terms of service agreements, nine of the Disinformation Dozen remain on all three platforms, while just three have been comprehensively removed from just one platform.”

“Research conducted by CCDH last year has shown that platforms fail to act on 95 percent of the Covid and vaccine misinformation reported to them, and we have uncovered evidence that Instagram’s algorithm actively recommends similar misinformation,” they added. “Tracking of 425 anti-vaccine accounts by CCDH shows that their total following across platforms now stands at 59.2 million as a result of these failures.”

[…]

Source: Big Tech CEOs Waffle on Banning the 12 Major Anti-Vaxxers

Venus Flytraps Have Magnetic Fields Like the Human Brain

[…]

a group of mavericks out of Switzerland have detected a magnetic signal in a plant. Using a highly sensitive magnetometer, an interdisciplinary team of researchers have measured signals from a Venus flytrap of up to .5 picotesla. To make matters even more mind-blowing, this signal is roughly equivalent to the biomagnetic field strength of the human brain. The full report is here.

The findings shine a light on a whole new world of plant communications we never knew was there and paves the path for new approaches to diagnose and treat plant diseases. It’s a parade-worthy “I told you so” for champions of plant intelligence, and a new dawn for how we live in harmony with the green kingdom.

[…]

So, why does it matter that a plant has a detectable biomagnetic signal? Well,  bioelectromagnetism is the amount of magnetic signal given off by a living thing,

[…]

The Venus flytrap boasts three trigger hairs that serve as mechanosensors. When a prey insect touches a trigger hair, an Action Potential is generated and travels along both trap lobes. If a second touch-induced Action Potential is fired within 30 seconds, the energy stored in the open trap is released and the capture organ closes. This is the plant-insect equivalent of a repeat offender. Imprisonment ensues.

Crucial to making these findings was the fact that this electrical activity doesn’t carry into the stalk of traps, which allowed the researchers to isolate the lobe by slicing it from the rest of the plant. Biologically intact, it was then placed on to a sensor.

Venus Flytraps Have Magnetic Fields Like the Human Brain

 

[…]

The readings returned pretty much identical results four times in a row.

Venus Flytraps Have Magnetic Fields Like the Human Brain

The discovery is as huge for biomagnetism in plants as it is for electro-physiology in general. We now have proof of a pathway for long-distance signal propagation between plant cells. Talk amongst your cells.

Both signal a new era of understanding plant systems we are only just coming to grips with.

https___bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com_public_images_186597a2-8314-4f7d-8901-cbd3c80dbcce_1000x483.jpg

A 2017 study published in ‘Frontiers in Plant Science’ looked at the photosynthetic properties of pale green leaf rice. Image: Gu, et. al.

Now what?

The report’s introduction ponders, “in the future, magnetometry may be used to study long-distance electrical signaling in a variety of plant species, and to develop noninvasive diagnostics of plant stress and disease.”

With the help of this current research, crops could be scanned for temperature shifts, chemical changes, or pests without having to damage the plants themselves.

[…]

Perhaps our best next step is looking at how other species interact with these magnetic fields. Since these fields exist, they may serve some practical purpose. “Plants and insects have co-evolved for millions of years,” explained Crutsinger. “The trap is getting prey. But insects could leverage that to their own benefit as well. They’re super sensitive and they have antennas. How might they cue in on the magn

[…]

Source: Venus Flytraps Have Magnetic Fields Like the Human Brain

Scientists discover how humans develop larger brains than other apes

[…]

The study, published in the journal Cell, compared ‘brain organoids’ – 3-D tissues grown from stem which model early brain development—that were grown from human, gorilla and chimpanzee stem cells.

Similar to actual brains, the human brain organoids grew a lot larger than the organoids from other apes.

[…]

During the early stages of brain development, neurons are made by called neural progenitors. These initially have a cylindrical shape that makes it easy for them to split into identical daughter cells with the same shape.

The more times the neural cells multiply at this stage, the more neurons there will be later.

As the cells mature and slow their multiplication, they elongate, forming a shape like a stretched ice-cream cone.

Previously, research in mice had shown that their mature into a conical shape and slow their multiplication within hours.

Now, brain organoids have allowed researchers to uncover how this development happens in humans, gorillas and chimpanzees.

They found that in and chimpanzees this transition takes a long time, occurring over approximately five days.

After only 5 days, gorilla neural progenitor cells have matured into a conical shape (right), while human cells (left) remain cylindrical. Credit: S.Benito-Kwiecinski/MRC LMB/Cell

Human progenitors were even more delayed in this transition, taking around seven days. The human progenitor cells maintained their cylinder-like shape for longer than other apes and during this time they split more frequently, producing more cells.

This difference in the speed of transition from neural progenitors to neurons means that the human cells have more time to multiply. This could be largely responsible for the approximately three-fold greater number of neurons in compared with gorilla or chimpanzee brains.

[…]

To uncover the genetic mechanism driving these differences, the researchers compared —which genes are turned on and off—in the human brain organoids versus the other apes.

They identified differences in a gene called ‘ZEB2’, which was turned on sooner in gorilla brain organoids than in the human organoids.

To test the effects of the gene in gorilla progenitor cells, they delayed the effects of ZEB2. This slowed the maturation of the progenitor cells, making the gorilla brain organoids develop more similarly to human—slower and larger.

Conversely, turning on the ZEB2 gene sooner in human progenitor cells promoted premature transition in human organoids, so that they developed more like ape organoids.

The researchers note that organoids are a model and, like all models, do not to fully replicate real brains, especially mature brain function. But for fundamental questions about our evolution, these brain tissues in a dish provide an unprecedented view into key stages of development that would be impossible to study otherwise.

Dr. Lancaster was part of the team that created the first brain organoids in 2013.

Source: Scientists discover how humans develop larger brains than other apes

Rabble Rousing Mob who can’t Read Seek Removal of Richard Stallman and Entire FSF Board

Richard Stallman’s return to the Free Software Foundation’s board of directors has drawn condemnation from many people in the free software community. An open letter signed by hundreds of people today called for Stallman to be removed again and for the FSF’s entire board to resign. Letter signers include Neil McGovern, GNOME Foundation executive director and former Debian Project Leader; Deb Nicholson, general manager of the Open Source Initiative; Matthew Garrett, a former member of the FSF board of directors; seven of the eight members of the X.org Foundation board of directors; Elana Hashman of the Debian Technical Committee, Open Source Initiative, and Kubernetes project; Molly de Blanc of the Debian Project and GNOME Foundation; and more than 300 others. That number has been rising quickly today: the open letter contains instructions for signing it.

The letter said all members of the FSF board should be removed because they ‘have enabled and empowered RMS for years. They demonstrate this again by permitting him to rejoin the FSF Board. It is time for RMS to step back from the free software, tech ethics, digital rights, and tech communities, for he cannot provide the leadership we need.’ The letter also called for Stallman to be removed from his position leading the GNU Project. “We urge those in a position to do so to stop supporting the Free Software Foundation,” they wrote. “Refuse to contribute to projects related to the FSF and RMS. Do not speak at or attend FSF events, or events that welcome RMS and his brand of intolerance. We ask for contributors to free software projects to take a stand against bigotry and hate within their projects. While doing these things, tell these communities and the FSF why.” UPDATE: For a quick summary of the controversy, long-time Slashdot reader Jogar the Barbarian recommends this article from It’s Foss.

Source: Free Software Advocates Seek Removal of Richard Stallman and Entire FSF Board – Slashdot

From the comments:

Your misleading quoting is mendacious, wrong, and sickening from someone on Slashdot who ought to know better. Here is the RMS quote, as quoted by the MIT cancellor (I’ve bolded the parts that you tried to hide):

RMS:

The injustice is in the word “assaulting”. The term “sexual assault” is so vague and slippery that it facilitates accusation inflation: taking claims that someone did X and leading people to think of it as Y, which is much worse than X.

The accusation quoted is a clear example of inflation. The reference reports the claim that Minsky had sex with one of Epstein’s harem. … Let’s presume that was true (I see no reason to disbelieve it).

The word “assaulting” presumes that he applied force or violence, in some unspecified way, but the article itself says no such thing. Only that they had sex.

We can imagine many scenarios, but the most plausible scenario is that she presented herself to him as entirely willing. Assuming she was being coerced by Epstein, he would have had every reason to tell her to conceal that from most of his associates.

https://news.slashdot.org/comments.pl?sid=18535476&cid=61195002 / Moridineas

This really frightens me. Moridineas, you have provided the precise quote, and it is absolutely clear that you are right. Stallman did not speak in vague metaphors or with sloppy grammar. What was written is clear as crystal, and easily objectively verified by absolutely anyone who bothers to read the quote.

The objective truth here is Stallman DID NOT say that these girls were entirely willing. If he had said that, we would all be having a very different conversation here. But he did not, and that is that. He speculated that they presented as entirely willing. This is a completely different statement, and it is not the moral sin that Stallman is being accused of committing.

And yet, there is an army of angry people adamantly insisting that he said they were entirely willing. People who seem to be otherwise intelligent and capable of understanding English. Every one of these people can read the quote just like you did, and see that he did not say what they insist he said.

So what is motivating this? How can so many otherwise-normal people insist on an obvious lie to the point of insisting that so many people resign? What is wrong with these people? Don’t they care about the truth? Doesn’t that matter?

What good is speaking precisely when people will just change what you say and then crucify you for it?

https://news.slashdot.org/comments.pl?sid=18535476&cid=61195246 / Brain-Fu

A Crash Course On Sniffing & Inserting commands into Bluetooth Low Energy

Bluetooth Low Energy (BLE) is everywhere these days. If you fire up a scanner on your phone and walk around the neighborhood, we’d be willing to bet you’d pick up dozens if not hundreds of devices. By extension, from fitness bands to light bulbs, it’s equally likely that you’re going to want to talk to some of these BLE gadgets at some point. But how?

Well, watching this three part video series from [Stuart Patterson] would be a good start. He covers how to get a cheap nRF52480 BLE dongle configured for sniffing, pulling the packets out of the air with Wireshark, and perhaps most crucially, how to duplicate the commands coming from a device’s companion application on the ESP32.

Testing out the sniffed commands.

The first video in the series is focused on getting a Windows box setup for BLE sniffing, so readers who aren’t currently living under Microsoft’s boot heel may want to skip ahead to the second installment. That’s where things really start heating up, as [Stuart] demonstrates how you can intercept commands being sent to the target device.

It’s worth noting that little attempt is made to actually decode what the commands mean. In this particular application, it’s enough to simply replay the commands using the ESP32’s BLE hardware, which is explained in the third video. Obviously this technique might not work on more advanced devices, but it should still give you a solid base to work from.

In the end, [Stuart] takes an LED lamp that could only be controlled with a smartphone application and turns it into something he can talk to on his own terms. Once the ESP32 can send commands to the lamp, it only takes a bit more code to spin up a web interface or REST API so you can control the device from your computer or other gadget on the network. While naturally the finer points will differ, this same overall workflow should allow you to get control of whatever BLE gizmo you’ve got your eye on.

 

Source: A Crash Course On Sniffing Bluetooth Low Energy | Hackaday

Cloudflare debuts zero-trust browsing service for remote enterprise workforce

[…]

Working from home, whether as a permanent option or as part of hybrid models, may become standard, and so the corporate world needs to consider how best to keep their networks protected whilst also catering to a remote workforce.

To this end, Cloudflare has contributed a new zero-trust solution for browser sessions. On Tuesday, the web security firm launched Cloudflare Browser Isolation, software that creates a “gap” between browsers and end-user devices in the interests of safety.

Instead of employees launching local browser sessions to access work-related resources or collaborative tools, the service runs the original, requested web page in the cloud and streams a replica to the end-user.

Cloudflare says that tapping into the firm’s global network to run browser sessions circumvents the usual speed downgrades and potential lag caused by typical, pixel-based streaming.

As there is no direct browser link, this can mitigate the risk of exploits, phishing, and cyberattacks. In addition, Cloudflare automatically blocks high-risk websites based on existing threat intelligence.

The solution has now been made available through Cloudflare for Teams.

[…]

Source: Cloudflare debuts zero-trust browsing service for remote enterprise workforce | ZDNet

Suez Canal Totally Blocked After One Of the World’s Largest Container Ships Runs Aground

One of the world’s most important international shipping arteries remains blocked this evening after the MV Ever Given, a 1,300-foot, 220,000-ton container ship, ran aground and got stuck almost completely sideways in the Suez Canal—cutting off a vital shipping lane between Europe and Asia and leading to a massive backup of over a hundred giant vessels as attempts to refloat the ship have so far failed, according to Bloomberg, local reports and satellite data.

Loaded with nearly 20,000 containers, the Panama-flagged MV Ever Given—notably one of the largest container ships in the world—was sailing from China for Rotterdam in the Netherlands and had just left port in Suez, Egypt at the southern edge of the canal when it ran aground Tuesday morning. It’s not known yet how exactly it happened, but at only 80 feet deep and 673 feet wide, the canal offers little room for maneuvering, relatively speaking, should a huge ship veer off course or suffer some sort of control failure.

via Twitter

Satellite tracking data and photos from the scene show a flotilla of small tugs and even a land-bound excavator have spend all day trying to free the ship, but so far, it remains lodged lengthwise across the canal. There’s literally no room for anything larger than a tugboat to pass by. The fleet director for the company that manages the Ever Given confirmed to Bloomberg that the ship suffered a “grounding incident” but added there were no injuries or reports of any pollution.

Source: Suez Canal Totally Blocked After One Of the World’s Largest Container Ships Runs Aground

Dutch ISPs and Webhoster TransIP hit by DDOS

Several internet companies repelled DDOS attacks on Monday night. Among them are at least three Internet providers Freedom Internet, Tweak and Kabelnoord.

Web hosting company TransIP also faced a DDOS attack targeting so-called name servers on Monday.

While averting this attack and resolving its consequences, the company was hit by a second, more violent attack on the entire infrastructure.

It is not clear whether there is any link between the attacks.

Source: Nederlandse internetbedrijven getroffen door DDOS aanvallen – Emerce

Yandex’s autonomous cars have driven over six million miles in ‘challenging conditions’ in Moscow

Yandex
Yandex Yandex

Yandex, Russia’s multi-hyphenate internet giant, began testing its autonomous cars on Moscow’s icy winter roads over three years ago. The goal was to create a “universal” self-driving vehicle that could safely maneuver around different cities across the globe. Now, Yandex says its trials have been a resounding success. The vehicles recently hit a major milestone by driving over six million miles (10 million kilometers) in autonomous mode, with the majority of the distance traveled in the Russian capital.

That’s significant because Moscow poses some of the most difficult weather conditions in the world. In January alone, the city was hit by a Balkan cyclone that blanketed the streets in snow and caused temperatures to plummet to as low as minus 25 degrees Celsius (-13 degrees Fahrenheit). For self-driving cars — which rely on light-emitting sensors, known as LIDAR, to track the distance between objects — snowfall and condensation can play havoc with visibility.

Yandex
Yandex

To overcome the hazardous conditions, Yandex says it cranked up its LIDAR performance by implementing neural networks to filter snow from the lidar point cloud, thereby enhancing the clarity of objects and obstacles around the vehicle. It also fed historical winter driving data in to the system to help it to distinguish car exhaust fumes and heating vent condensation clouds. To top it all, Yandex claims the neural “filters” can help its vehicles beat human drivers in identifying pedestrians obscured by winter mist.

Driving on Moscow’s roads also helped improve the tech’s traffic navigation. The system was able to adjust to both sleet and harder icy conditions over time, according to Yandex, allowing it to gradually make better decisions on everything from acceleration to braking to switching lanes. In addition, the winter conditions pushed the system’s built-in localization tech to adapt to hazards such as hidden road signs and street boundaries and snow piles the “size of buildings.” This was made possible by the live mapping, motion, position and movement data measured by the system’s mix of sensors, accelerometers and gyroscopes.

When it launched the Moscow trial in 2017, Yandex was among the first to put autonomous cars through their paces in a harsh, frosty climate. But, soon after, Google followed suit by taking its Waymo project to the snowy streets of Ohio and Michigan.

Source: Yandex’s autonomous cars have driven over six million miles in ‘challenging conditions’ | Engadget

Double bongcloud: why grandmasters are playing the worst move in chess

An otherwise meaningless game during Monday’s preliminary stage of the $200,000 Magnus Carlsen Invitational left a pair of grandmasters in stitches while thrusting one of chess’s most bizarre and least effective openings into the mainstream.

Norway’s Magnus Carlsen and Hikaru Nakamura of the United States had already qualified for the knockout stage of the competition with one game left to play between them. Carlsen, the world’s top-ranked player and reigning world champion, started the dead rubber typically enough by moving his king’s pawn with the common 1 e4. Nakamura, the five-time US champion and current world No 18, mirrored it with 1 … e5. And then all hell broke loose.

Carlsen inched his king one space forward to the rank where his pawn had started. The self-destructive opening (2 Ke2) is known as the bongcloud for a simple reason: you’d have to be stoned to the gills to think it was a good idea.

The wink-wink move immediately sent Nakamura, who’s been a visible champion of the bongcloud in recent years, into an uncontrollable fit of laughter. Naturally, the American played along with 2 … Ke7, which marked the first double bongcloud ever played in a major tournament and its official entry to chess theory (namely, the Bongcloud Counter-Gambit: Hotbox Variation).

[…]

Why is the bongcloud so bad? For one, it manages to break practically all of the principles you’re taught about chess openings from day one: it doesn’t fight for the center, it leaves the king exposed and it wastes time, all while eliminating the possibility of castling and managing to impede the development of the bishop and queen. Even the worst openings tend to have some redeeming quality. The bongcloud, not so much.

What makes it funny (well, not to everyone) is the idea that two of the best players on the planet would use an opening so pure in its defiance of conventional wisdom.

This bongcloud has been a cult favorite in chess circles since the dawn of the internet, a popularity only fueled by Bobby Fischer’s rumored deployment of the opening in his alleged series of games with Nigel Short on the Internet Chess Club back in 2000. But its origins as a meme can be traced to Andrew Fabbro’s underground book Winning with the Bongcloud, a pitch-perfect parody of chess opening manuals and the purple, ponderous language that fills their pages.

[…]

 

Source: Double bongcloud: why grandmasters are playing the worst move in chess | Chess | The Guardian

Hong Kong’s fragile coral reefs boosted by 3D printing

In jade waters off Hong Kong’s eastern shoreline, scientists are thrilled to spot a cuttlefish protecting her eggs inside an artificial, 3D-printed clay seabed helping to restore the city’s fragile coral reefs.

[…]

Around 84 species of coral are found in Hong Kong’s waters, scientists say, more diverse than those found in the Caribbean Sea.

Most can be found on remote inlets, far from the sediment-filled Pearl River Delta and its busy shipping channels.

[…]

They have begun using 3D printed tiles that work as an artificial bed for corals to latch onto and thrive, with promising results.

“The first time we put down the tiles, there were a few fish around,” she told AFP on a recent inspection by University of Hong Kong (HKU) researchers.

Now the artificially produced reef laid down last summer is teeming with wildlife, including the cuttlefish, something Yu described as “very, very exciting”.

[…]

Corals are colonies of billions of living polyp invertebrates and are hugely sensitive to temperature changes.

When they get too hot, they lose their vibrant colour and die.

Repopulating a dead or damaged reef requires suitable ground for the remaining coral larvae to latch onto and build a new home—and the printed tiles have so far proven dependable.

“3D printing allows us to customise a tile or a solution for any type of environment and I think that’s the real potential that the technology brings,” David Baker, an associate professor at HKU’s School of Biological Sciences who led development of the technology, told AFP.

Tiles carrying 400 coral fragments have been laid on a 40 square-metre (430 square-foot) section of sea floor in the .

“The corals now on the tiles definitely survive better than the traditional way of transplantation,” said Yu, putting the at around 90 percent.

Some projects around the world have deliberately sunk ships or concrete onto the sea floor to encourage coral growth. And while those methods have had some success, they can change the chemistry of the water.

The tiles used in the Hong Kong project are made with terracotta, minimising the .

“Clay is basically soil, so soil you can find everywhere on earth,” said Christian Lange, an associate professor from HKU’s Department of Architecture.

It leaves water chemistry unchanged, Lange added, and if a tile fails to spawn a new colony it will simply erode without leaving a trace.

[…]

Source: Hong Kong’s fragile coral reefs boosted by 3D printing

26 author report: bottom trawling for fish is responsible for one gigaton of carbon emissions a year—a higher annual total than (pre-pandemic) aviation emissions.

It’s been well established by now that the agricultural systems producing our food contribute at least one fifth of global anthropogenic carbon emissions—and up to a third if waste and transportation are factored in. A troubling new report points to a previously overlooked source: an industrial fishing process practiced by dozens of countries around the world, including the United States, China, and the E.U.

The study, published today in the scientific journal Nature, is the first to calculate the carbon cost of bottom trawling, in which fishing fleets drag immense weighted nets along the ocean floor, scraping up fish, shellfish and crustaceans along with significant portions of their habitats.

According to calculations conducted by the report’s 26 authors, bottom trawling is responsible for one gigaton of carbon emissions a year—a higher annual total than (pre-pandemic) aviation emissions. Not only does the practice contribute to climate change, it is extremely damaging to ocean biodiversity—the “equivalent of ploughing an old-growth forest into the ground, over and over and over again until there is nothing left” according to lead author Enric Sala, a marine biologist who is also National Geographic’s Explorer in Residence.

Bottom trawling is also one of the least cost effective methods of fishing. Most locations have been trawled so many times, there is little left worth catching, says Sala. “Without government subsidies, no one would be making a penny.” But Sala didn’t set out to condemn bottom trawlers when he designed the research project back in 2018. He was looking for the incentives that just might make the fishing industry, and governments, give up on the practice on their own. The carbon findings may just do the trick.

[…]

Refuting a long-held view that ocean protection harms fisheries, the study found that well placed marine protected areas (MPAs) that ban fishing would actually boost the production of marine life by functioning as fish nurseries and biodiversity generators capable of seeding stocks elsewhere. According to the study results, protecting the right places could increase the global seafood catch by over 8 million metric tons a year, despite the challenges of overfishing and climate change.

Bottom trawling, however, would have to stop, says Sala. While mangroves, kelp forests and sea grass meadows are good at capturing carbon, the bottom of the ocean, piled deep with marine animal debris, is a far greater carbon sink. But when the trawlers’ weighted nets scrape the sea floor that carbon is released back into the water. Excess carbon in water turns it acidic, which is damaging to sea life.

Worse still, the practice also impacts the ocean’s ability to absorb atmospheric carbon: if the water is already saturated from sources down below, it will be unable to absorb human-caused emissions from above, hamstringing one of our best assets in the fight against climate change. By combining publicly-available data on global bottom trawler activity with pixel-level assessments of carbon stored in the top layers of ocean sediments, Sala and his team were able to calculate the amount of emissions produced by the technique, down to the level of national fleets. The European Union, for example, releases 274,718,086 metric tons of marine sediment carbon into the ocean a year, while Chinese fleets release 769,294,185 metric tons, and the United States releases 19,373,438.

[…]

Source: Bottom Trawling for Fish Boosts Carbon Emissions, Study Says | Time

Nissan finds use for old LEAF batteries in their factory. Still no way to recycle them.

Nissan has found a second-life for old LEAF batteries inside mobile machines that help workers at Nissan factories worldwide. The old batteries are being used in automated guided vehicles or AGVs used for various tasks inside the manufacturing facilities, including delivering parts to workers on the assembly line.

AGVs are used as robotic mail carriers operating on magnetic tracks taking mail and parts exactly where they’re needed on the assembly line. The idea is to use the AGV to deliver parts so the worker doesn’t waste time searching for a component and can stay focused on installing parts. Nissan and other automotive manufacturers have found that AGVs are indispensable when it comes to saving time and increasing productivity on the assembly line.

Nissan currently operates more than 4000 AGVs around the world at its various manufacturing facilities. The factories have a system that includes 30-second automatic quick charging to keep battery packs on the electric vehicles topped off and working correctly. AGVs also have sensors that keep them operating on a set route and allow them to stop when needed. They also have wireless communications capabilities that enable them to communicate with each other to avoid collisions.

Nissan says that it has been exploring ways to reuse old LEAF batteries since 2010. The first-generation LEAF used a 24-kilowatt hour battery pack made by combining 48 modules. Nissan said eight years ago, its engineers discovered a way to take three of those modules and repackage them to fit inside the AGV. Last year, the engineers began to repurpose used battery modules instead of using new ones to power the AGVs. The team also found the repurposed LEAF batteries last a lot longer thanks to their lithium-ion design compared to the lead-acid batteries used previously.

Source: Nissan finds a second use for old LEAF batteries – SlashGear

Feeding cattle seaweed reduces their greenhouse gas emissions 82 percent

A bit of seaweed in cattle feed could reduce methane emissions from beef cattle as much as 82 percent, according to new findings from researchers at the University of California, Davis. The results, published today in the journal PLOS ONE, could pave the way for the sustainable production of livestock throughout the world.

“We now have sound evidence that seaweed in cattle diet is effective at reducing greenhouse gases and that the efficacy does not diminish over time,”

[…]

Over the course of five months last summer, Kebreab and Roque added scant amounts of seaweed to the diet of 21 beef cattle and tracked their weight gain and methane emissions. Cattle that consumed doses of about 80 grams (3 ounces) of seaweed gained as much weight as their herd mates while burping out 82 percent less methane into the atmosphere. Kebreab and Roque are building on their earlier work with dairy cattle, which was the world’s first experiment reported that used seaweed in cattle.

[…]

Results from a taste-test panel found no differences in the flavor of the beef from seaweed-fed steers compared with a control group. Similar tests with dairy cattle showed that seaweed had no impact on the taste of milk.

Also, scientists are studying ways to farm the type of seaweed—Asparagopsis taxiformis—that Kebreab’s team used in the tests. There is not enough of it in the wild for broad application.

Another challenge: How do ranchers provide seaweed supplements to grazing cattle on the open range? That’s the subject of Kebreab’s next study.

[…]

Source: Feeding cattle seaweed reduces their greenhouse gas emissions 82 percent

Also, do the bovines eat the seaweed happily or do they need to be force fed it?

Microsoft Office 365 Down For Some Users

Microsoft is reporting an outage of Office 365, including Microsoft Teams. On its status page, Microsoft adds: Users may be unable to access multiple Microsoft services. User impact: Users may be unable to access multiple Microsoft 365, Azure, and Dynamics 365 services, including the Service Health Dashboard. More info: Any service that leverages Azure Active Directory (AAD) may be affected. This includes but is not limited to Microsoft Teams, Forms, Exchange Online, Intune and Yammer. Current status: We’ve identified the underlying cause of the problem and are taking steps to mitigate impact. We’ll provide an updated ETA on resolution as soon as one is available. Scope of impact: This issue could affect any user.

Source: Microsoft Office 365 Down For Some Users – Slashdot

Yay cloud