Hackers Target Surveillance Firm, Exposing thousands Live Camera Feeds at Tesla, Cloudflare, Hospitals, Jails, Police, etc etc etc in anti-surveillance ideology

A hacker group claims to have broken into the networks of cloud-based surveillance startup Verkada, gaining unfiltered access to thousands and thousands of live security camera feeds in the process.

The hack first gained public attention Tuesday afternoon, when a Twitter user who goes by the name “Tillie” began leaking purported images of the hack onto the internet: “ever wondered what a @Tesla warehouse looks like?” the hacker quipped, dangling a picture of what appears to be an industrial facility.

Tillie, who goes by the full name Tillie Kottmann and uses they/them pronouns, is allegedly part of an international hacker collective responsible for having breached Verkada, according to a report from Bloomberg. Once inside, the hackers were able to use the firm’s security feeds to peer into the internal workings of droves of organizations, including medical facilities, psychiatric hospitals, jails, schools and police departments, and even large companies like Tesla, Equinox and Cloudflare. The scope of the hack appears massive.

Among other things, Kottmann implied Tuesday that they could have used their access to Verkada to hack into the laptop of Cloudflare CEO Matthew Prince:

The hacker group has very noticeably courted public attention, calling the intrusion campaign “Operation Panopticon” and claiming they want to “end surveillance capitalism” by bringing attention to the ways in which ubiquitous surveillance dominates people’s lives.

[…]

According to Bloomberg, “Arson Cats” gained entry to the company via a pretty massive security blunder: The hackers discovered a password and username for a Verkada administrative account publicly exposed to the internet. In a Twitter message, Tillie reiterated this to Gizmodo, claiming that once they had compromised the administrator account (called a “super administrator”), they were able to hook into any of the 150,000 video feeds in Verkada’s library.

“The access we had allowed us to impersonate any user of the system and access their view of the platform,” said the hacker, further explaining that the “superadmin rights are also what granted us access to the root shell at the click of a button.”

[…]

Source: Hackers Target Surveillance Firm, Exposing Live Camera Feeds

Russian Cracker / Cybercrime Forums Hacked

n the latest in a string of “hits” on Russian dark web forums, the prominent crime site Maza appears to have been hacked by someone earlier this week.

This is kind of big news since Maza (previously called “Mazafaka”) has long been a destination for all assortment of criminal activity, including malware distribution, money laundering, carding (i.e., the selling of stolen credit card information), and lots of other bad behavior. The forum is considered “elite” and hard to join, and in the past, it has been a cesspool for some of the world’s most prolific cybercriminals.

Whoever hacked Maza netted thousands of data points about the site’s users, including usernames, email addresses, and hashed passwords, a new report from intelligence firm Flashpoint shows. Two warning messages were then scrawled across the forum’s home page: “Your data has been leaked” and “This forum has been hacked.”

KrebsOnSecurity reports that the intruder subsequently dumped the stolen data on the dark web, spurring fears among criminals that their identities might be exposed (oh, the irony). The validity of the data has been verified by threat intelligence firm Intel 471.

This hack comes shortly after similar attacks on two other Russian cybercrime forums, Verified and Exploit, that occurred earlier this year. It’s been noted that the successive targeting of such high-level forums is somewhat unusual.

[…]

Source: Hacker Forum Maza Hacked

GPS jamming around Cyprus gives our air traffic controllers a headache, says Eurocontrol

[…]

Jamming of the essential navigational satellite signal has caused enough headaches for the EU air traffic control organisation to prompt an investigation, complete with an instrumented aircraft designed to detect signs of GPS jamming.

Airliners rely on GPS to a great extent, and air traffic management (the science of making sure airliners don’t come dangerously close to each other) is almost solely focused nowadays on building approach paths and airways that are defined by GPS waypoints.

[…]

Eurocontrol “started collecting GNSS outage reports by pilots in 2014, following up significant numbers of outage reports in a given area to determine cause and impact, and to support the [air traffic control company] and operators in question,” said the organisation in its report [PDF], adding that between 2017 and 2018, reported outages increased by 2,000 percentage points, rising from 154 in 2017 to a whopping 4,364 the following year.

Most of this jamming is focused on the Eastern Mediterranean and specifically affects Cyprus, Eurocontrol said. During a three-hour period in February 2020, a fifth of all flights passing through Cypriot airspace were affected, said the air traffic control org, extrapolating from a research flight it operated with an instrumented Airbus A320 that flew south of Cyprus itself.

The eastern Med, especially around Syria and Lebanon, has long been a conflict zone – and air forces from West and East alike have long been jamming GPS as part of their military operations there.

“Larnaca could become an absolute shitshow when the Americans jammed it,” an airline pilot told The Register. Describing one incident, where a radar* contact that was “going at least 50 per cent faster than us” passed below his aircraft, the pilot said it seemed to be on course for Sicily shortly before his own aircraft had a GPS failure.

“Luckily at that point, because at high altitude, it’s irritating, but not a major issue. Because for short term, you’ve got your eyes and your internal navigation system,” said the pilot.

It has deeper effects, however. “The main issue is when it happens in Larnaca (eastern Cyprus), because you’re right next to mountains and [you’re following a] GNSS approach. And if you get jammed, it causes the map to shift and the plane then decides that it’s currently inside a mountain. Sets off all of your terrain warnings.”

[…]

Triggering a terrain warning means immediately having to perform a prescribed escape manoeuvre that can mean breaking off an otherwise safe approach to land, said the pilot, who spoke on condition of anonymity because he is not an official spokesman for his airline. This causes delays and potentially extra costs to the airline and its passengers.

[…]

As for Eurocontrol, the body plaintively concluded: “At national level, local RFI [radio frequency interference] mitigation measures need to be taken, ideally including the ability to conduct in-flight RFI measurements.

“While the majority of RFI hotspots appear to originate in conflict zones, they affect commercial aviation at large distances from these zones, reflecting a disproportionate use of jamming that appears to go well beyond simple military mission effectiveness.”

So far the problem’s been formally identified: but, other than flying around jamming zones, what else can pilots do?

Source: GPS jamming around Cyprus gives our air traffic controllers a headache, says Eurocontrol • The Register

How Solar Panels Work

[…] How exactly do those panels work? Unlike power from a wind turbine or even a power plant, solar panels don’t seem to have any moving parts — so how exactly is that energy being produced?

The simple answer is that solar panels are made up of silicon and conductive metals, which form an electric field. When sunlight hits, the solar energy shakes electrons in the silicon out of their “natural” state, while a circuit attached to the panel is able to generate a current out of those electrons’ desire to return to their original positions within the panel. If this seems a little too complicated, don’t worry! Our animated visualization breaks down everything into easy-to-understand sections — you won’t need to remember your physics or chemistry classes to understand. You can see it for yourself directly below:

Source: How Solar Panels Work | SaveOnEnergy.com

Volumetric OLED Display Shows Bladerunner Vibe, Curious Screen Tech

Sean Hodgins] is out with his latest video and it’s a piece of art in itself. Beyond a traditional project show and tell, he’s spun together a cyberpunk vibe to premiere the volumetric display he built from an OLED stackup.

The trick of a volumetric display is the ability to add a third dimension for positioning pixels. Here [Sean] delivered that ability with a stack up of ten screens to add a depth element. This is not such an easy trick. These small OLED displays are all over the place but they share a common element: a dark background over which the pixels appear. [Sean] has gotten his hands on some transparent OLED panels and with some Duck-Duck-Go-Fu we think it’s probably a Crystalfontz 128×56 display. Why is it we don’t see more of these? Anyone know if it’s possible to remove the backing from other OLED displays to get here. (Let us know in the comments.)

The rest of the built is fairly straight-forward with a Feather M4 board driving the ten screens via SPI, and an MPU-6050 IMU for motion input. The form factor lends an aesthetic of an augmented reality device and the production approach for the video puts this in a Bladerunner or Johnny Mneumonic universe. Kudos for expanding the awesome of the build with an implied backstory!

If you can’t find your own transparent displays, spinning things are a popular trend in this area. We just saw one last week that spun an LED matrix to form cylindrical display. Another favorite of ours is a volumetric display that spins a helix-shaped projection screen.

Source: Volumetric OLED Display Shows Bladerunner Vibe, Curious Screen Tech | Hackaday

Bag maker Peak Design calls out Amazon for its copycat ways

Amazon is well-known for its copycat ways, but it’s not so often that another company calls it out on it, much less in a way that’s funny. But that’s exactly what Peak Design did today when it uploaded a video to YouTube comparing its Everyday Sling to a camera bag from AmazonBasics that shares the exact same name.

“It looks suspiciously like the Peak Design Everyday Sling, but you don’t pay for all those needless bells and whistles,” the video’s narrator declares. Those extras include things like a lifetime warranty, BlueSign approved recycled materials, as well as the time and effort the company’s design team put into creating the bag.

In its most on-the-nose jab at Amazon, the video includes a “dramatization” of how the AmazonBasics design team created their take on the bag. “Keep combing that data,” a googly-eyed executive tells his subordinate, who’s played here by Peak Design founder and CEO Peter Dering. “Let’s Basic that bad boy,” they say after finding the Everyday Sling.

Source: Bag maker Peak Design calls out Amazon for its copycat ways | Engadget

RAWGraphs releases version 2

RAW Graphs is an open source data visualization framework built with the goal of making the visual representation of complex data easy for everyone.

Primarily conceived as a tool for designers and vis geeks, RAW Graphs aims at providing a missing link between spreadsheet applications (e.g. Microsoft Excel, Apple Numbers, OpenRefine) and vector graphics editors (e.g. Adobe Illustrator, Inkscape, Sketch).

The project, led and maintained by the DensityDesign Research Lab (Politecnico di Milano) was released publicly in 2013 and is regarded by many as one of the most important tools in the field of data visualization.

Source: About | RAWGraphs

Posted in Art

Hackers exploit websites to give them excellent SEO before deploying malware

According to Sophos, the so-called search engine “deoptimization” method includes both SEO tricks and the abuse of human psychology to push websites that have been compromised up Google’s rankings.

[…]

In a blog post on Monday, the cybersecurity team said the technique, dubbed “Gootloader,” involves deployment of the infection framework for the Gootkit Remote Access Trojan (RAT) which also delivers a variety of other malware payloads.

The use of SEO as a technique to deploy Gootkit RAT is not a small operation. The researchers estimate that a network of servers — 400, if not more — must be maintained at any given time for success.

[…]

Websites compromised by Gootloader are manipulated to answer specific search queries. Fake message boards are a constant theme in hacked websites observed by Sophos, in which “subtle” modifications are made to “rewrite how the contents of the website are presented to certain visitors.”

“If the right conditions are met (and there have been no previous visits to the website from the visitor’s IP address), the malicious code running server-side redraws the page to give the visitor the appearance that they have stumbled into a message board or blog comments area in which people are discussing precisely the same topic,” Sophos says.

If the attackers’ criteria aren’t met, the browser will display a seemingly-normal web page — that eventually dissolves into garbage text.

[…]

Victims who click on the direct download links will receive a .zip archive file, named in relation to the search term, that contains a .js file.

The .js file executes, runs in memory, and obfuscated code is then decrypted to call other payloads.

According to Sophos, the technique is being used to spread the Gootkit banking Trojan, Kronos, Cobalt Strike, and REvil ransomware, among other malware variants, in South Korea, Germany, France, and the United States.

“At several points, it’s possible for end-users to avoid the infection, if they recognize the signs,” the researchers say. “The problem is that, even trained people can easily be fooled by the chain of social engineering tricks Gootloader’s creators use. Script blockers like NoScript for Firefox could help a cautious web surfer remain safe by preventing the initial replacement of the hacked web page to happen, but not everyone uses those tools.”

[…]

Source: Hackers exploit websites to give them excellent SEO before deploying malware | ZDNet

ICANN Refuses to Accredit Pirate Bay Founder Peter Sunde Due to His ‘Background’

Peter Sunde was one of the key people behind The Pirate Bay in the early years, a role for which he was eventually convicted in Sweden.

While Sunde cut his ties with the notorious torrent site many years ago, he remains an active and vocal personality on the Internet.

[…]

Sunde is also involved with the domain registrar Sarek, which caters to technology enthusiasts and people who are interested in a fair and balanced Internet, promising low prices for domain registrations

As a business, everything was going well for Sarek. The company made several deals with domain registries to offer cheap domains but there is one element that’s missing. To resell the most popular domains, including .com and .org, it has to be accredited by ICANN.

ICANN is the main oversight body for the Internet’s global domain name system. Among other things, it develops policies for accredited registrars to prevent abuse and illegal use of domain names. Without this accreditation, reselling several popular domains simply isn’t an option.

ICANN Denies Accreditation

Sunde and the Sarek team hoped to overcome this hurdle and started the ICANN accreditation process in 2019. After a long period of waiting, the organization recently informed Sunde that his application was denied.

[…]

“After the background check I get a reply that I’ve checked the wrong boxes,” Sunde wrote. “Not only that, but they’re also upset I was wanted by Interpol.”

The Twitter thread didn’t go unnoticed by ICANN who contacted Sunde over the phone to offer clarification. As it turns out, the ‘wrong box’ issue isn’t the main problem, as he explains in a follow-up Twitter thread.

“I got some sort of semi-excuse regarding their claim that I lied on my application. They also said that they agreed it wasn’t fraud or similar really. So both of the points they made regarding the denial were not really the reason,” Sunde clarifies.

ICANN is Not Comfortable With Sunde

Over the phone, ICANN explained that the matter was discussed internally. This unnamed group of people concluded that the organization is ‘not comfortable’ doing business with him.

“They basically admitted that they don’t like me. They’ve banned me for nothing else than my political views. This is typical discrimination. Considering I have no one to appeal to except them, it’s concerning, since they control the actual fucking center of the internet.”

[…]

Making matters worse, ICANN will also keep the registration fee, so this whole ordeal is costing money as well.

Source: ICANN Refuses to Accredit Pirate Bay Founder Peter Sunde Due to His ‘Background’ * TorrentFreak

Yup. ICANN. It’s an autocracy run by no-one but themselves. This is clearly visible in their processes, which almost led to the whole .org TLD being sold off for massive profit (.org is not for profit!) to an ex board member.

SpaceX Mars prototype rocket nails landing for the first time – then explodes

SpaceX rocket prototype, known as SN10, soared over South Texas during test flight Wednesday before swooping down to a pinpoint landing near its launch site. Approximately three minutes after landing, however, multiple independent video feeds showed the rocket exploding on its landing pad.

SpaceX’s SN10, an early prototype of the company’s Starship Mars rocket, took off around 5:15 pm CT and climbed about six miles over the coastal landscape, mimicking two previous test flights SpaceX has conducted that ended in an explosive crash. Wednesday marked the first successful landing for a Starship prototype.
“We’ve had a successful soft touch down on the landing pad,” SpaceX engineer John Insprucker said during a livestream of the event. “That’s capping a beautiful test flight of Starship 10.”
It was unclear what caused the rocket to explode after landing, and the SpaceX livestream cut out before the conflagration.
[…]

Source: SpaceX aborts Mars prototype rocket nails landing for the first time – CNN

No wonder that Japanese businessman is trying to give away his tickets to space on Musk’s explody rides

How I cut GTA Online loading times by 70% (GTA fix JSON handler pls)

[…]

tl;dr

  • There’s a single thread CPU bottleneck while starting up GTA Online
  • It turns out GTA struggles to parse a 10MB JSON file
  • The JSON parser itself is poorly built / naive and
  • After parsing there’s a slow item de-duplication routine

R* please fix

If this somehow reaches Rockstar: the problems shouldn’t take more than a day for a single dev to solve. Please do something about it :<

You could either switch to a hashmap for the de-duplication or completely skip it on startup as a faster fix. For the JSON parser – just swap out the library for a more performant one. I don’t think there’s any easier way out.

Source: How I cut GTA Online loading times by 70%

Ticketcounter leaks data for millions of people, didn’t delete sensitive data and was outed

Data of visitors to Diergaarde Blijdorp, Apenheul, Dierenpark Amersfoort and dozens of other theme parks are on the street. Ticket seller Ticketcounter is also extorted for 3 tons.

An employee accidentally posted data online where they didn’t have to. As a result, the data could be found there for months (from 5 August 2020 to 22 February 2021). The data is then offered for sale on the dark web.

This mainly concerns data of people who have purchased day tickets via the website.

Source: Groot datalek bij Ticketcounter, ook hack bij InHolland – Emerce

It turns out they kept all this data they shouldn’t have.

The database contained the data of 1.5 million people who had purchased a ticket through Ticketcounter. These include their names, email addresses, telephone numbers, dates of birth and address details. If people with iDEAL have paid for their entrance ticket, their bank account number (IBAN) has also fallen into the wrong hands.

Source: Datalek Ticketcounter treft ook bezoekers musea en attracties

Why did they keep all this data? And why wasn’t it encrypted?

It was leaked when someone made a backup which a) wasn’t encrypted and b) was placed somewhere stunningly easy to find. Now they are being extorted to the tune of 7 BTC which they are not planning to give.

Ticketcounter makes it sound like they are some kind of victim in this but their security practices are abysmal and hopefully they will be fined a serious amount.

First Fully Weaponized Spectre Exploit Discovered Online

A fully weaponized exploit for the Spectre CPU vulnerability was uploaded on the malware-scanning website VirusTotal last month, marking the first time a working exploit capable of doing actual damage has entered the public domain.

The exploit was discovered by French security researcher Julien Voisin. It targets Spectre, a major vulnerability that was disclosed in January 2018.

According to its website, the Spectre bug is a hardware design flaw in the architectures of Intel, AMD, and ARM processors that allows code running inside bad apps to break the isolation between different applications at the CPU level and then steal sensitive data from other apps running on the same system.

The vulnerability, which won a Pwnie Award in 2018 for one of the best security bug discoveries of the year, was considered a milestone moment in the evolution and history of the modern CPU.

Its discovery, along with the Meltdown bug, effectively forced CPU vendors to rethink their approach to designing processors, making it clear that they cannot focus on performance alone, to the detriment of data security.

[…]

But today, Voisin said he discovered new Spectre exploits—one for Windows and one for Linux—different from the ones before. In particular, Voisin said he found a Linux Spectre exploit capable of dumping the contents of /etc/shadow, a Linux file that stores details on OS user accounts.

Such behavior is clearly malicious; however, there is no evidence that the exploit was used in the wild, as it could have also been uploaded on VirusTotal by a penetration tester as well.

[…]

the most interesting part of Voisin’s discovery is in the last paragraph of his blog, where he hints that he may have discovered who may be behind this new Spectre exploit.

“Attribution is trivial and left as an exercise to the reader,” the French security researcher said in a mysterious ending.

But while Voisin did not want to name the exploit author, several people were not as shy. Security experts on both Twitter and news aggregation service HackerNews were quick to spot that the new Spectre exploit might be a module for CANVAS, a penetration testing tool developed by Immunity Inc.

[…]

Source: First Fully Weaponized Spectre Exploit Discovered Online | The Record by Recorded Future

EU law requires companies to fix electronic goods for up to 10 years

Companies that sell refrigerators, washers, hairdryers, or TVs in the European Union will need to ensure those appliances can be repaired for up to 10 years, to help reduce the vast mountain of electrical waste that piles up each year on the continent.

The “right to repair,” as it is sometimes called, comes into force across the 27-nation bloc on Monday. It is part of a broader effort to cut the environmental footprint of manufactured goods by making them more durable and energy-efficient.

[…]

“This is a really big step in the right direction,” said Daniel Affelt of the environmental group BUND-Berlin, which runs several “repair cafes” where people can bring in their broken appliances and get help fixing them up again.

Modern appliances are often glued or riveted together, he said. “If you need special tools or have to break open the device, then you can’t repair it.”

Lack of spare parts is another problem, campaigners say. Sometimes a single broken tooth on a tiny plastic sprocket can throw a proverbial wrench in the works.

“People want to repair their appliances,” Affelt said. “When you tell them that there are no spare parts for a device that’s only a couple of years old then they are obviously really frustrated by that.”

Under the new EU rules, manufacturers will have to ensure parts are available for up to a decade, though some will only be provided to professional repair companies to ensure they are installed correctly.

Source: EU law requires companies to fix electronic goods for up to 10 years | Euronews

Far-Right Platform Gab Has Been Hacked, Private Data and all – not encrypted in the backend

When Twitter banned Donald Trump and a slew of other far-right users in January, many of them became digital refugees, migrating to sites like Parler and Gab to find a home that wouldn’t moderate their hate speech and disinformation. Days later, Parler was hacked, and then it was dropped by Amazon web hosting, knocking the site offline. Now Gab, which inherited some of Parler’s displaced users, has been badly hacked too. An enormous trove of its contents has been stolen—including what appears to be passwords and private communications.

On Sunday night the WikiLeaks-style group Distributed Denial of Secrets is revealing what it calls GabLeaks, a collection of more than 70 gigabytes of Gab data representing more than 40 million posts. DDoSecrets says a hacktivist who self-identifies as “JaXpArO and My Little Anonymous Revival Project” siphoned that data out of Gab’s backend databases in an effort to expose the platform’s largely right-wing users. Those Gab patrons, whose numbers have swelled after Parler went offline, include large numbers of Qanon conspiracy theorists, white nationalists, and promoters of former president Donald Trump’s election-stealing conspiracies that resulted in the January 6 riot on Capitol Hill.

DDoSecrets cofounder Emma Best says that the hacked data includes not only all of Gab’s public posts and profiles—with the exception of any photos or videos uploaded to the site—but also private group and private individual account posts and messages, as well as user passwords and group passwords. “It contains pretty much everything on Gab, including user data and private posts, everything someone needs to run a nearly complete analysis on Gab users and content,” Best wrote in a text message interview with WIRED. “It’s another gold mine of research for people looking at militias, neo-Nazis, the far right, QAnon, and everything surrounding January 6.”

DDoSecrets says it’s not publicly releasing the data due to its sensitivity and the vast amounts of private information it contains. Instead the group says it will selectively share it with journalists, social scientists, and researchers. WIRED viewed a sample of the data, and it does appear to contain Gab users’ individual and group profiles—their descriptions and privacy settings—public and private posts, and passwords. Gab CEO Andrew Torba acknowledged the breach in a brief statement Sunday.

Passwords for private groups are unencrypted, which Torba says the platform discloses to users when they create one. Individual user account passwords appear to be cryptographically hashed—a safeguard that may help prevent them from being compromised—but the level of security depends on the hashing scheme used and the strength of the underlying password.

[…]

According to DDoSecrets’ Best, the hacker says that they pulled out Gab’s data via a SQL injection vulnerability in the site—a common web bug in which a text field on a site doesn’t differentiate between a user’s input and commands in the site’s code, allowing a hacker to reach in and meddle with its backend SQL database.

[…]

Source: Far-Right Platform Gab Has Been Hacked—Including Private Data | WIRED

This is a comedy of bad security on the part of Gab.

Rocket Lab Unveils Plans for New 8-Ton Class Reusable Rocket for Mega-Constellation Deployment. Probably won’t explode as much as SpaceX. Also to become publically traded.

Rocket Lab today unveiled plans for its Neutron rocket, an advanced 8-ton payload class launch vehicle tailored for mega-constellation deployment, interplanetary missions and human spaceflight.

Neutron will build on Rocket Lab’s proven experience developing the reliable workhorse Electron launch vehicle, the second most frequently launched U.S. rocket annually since 2019. Where Electron provides dedicated access to orbit for small satellites of up to 300 kg (660 lb), Neutron will transform space access for satellite constellations and provide a dependable, high-flight-rate dedicated launch solution for larger commercial and government payloads.

“Rocket Lab solved small launch with Electron. Now we’re unlocking a new category with Neutron,” said Peter Beck, Rocket Lab founder and CEO.

[…]

The medium-lift Neutron rocket will be a two-stage launch vehicle that stands 40 meters (131 feet) tall with a 4.5-meter (14.7 ft) diameter fairing and a lift capacity of up to 8,000 kg (8 metric tons) to low-Earth orbit, 2,000 kg to the Moon (2 metric tons), and 1,500 kg to Mars and Venus (1.5 metric tons). Neutron will feature a reusable first stage designed to land on an ocean platform, enabling a high launch cadence and decreased launch costs for customers. Initially designed for satellite payloads, Neutron will also be capable of International Space Station (ISS) resupply and human spaceflight missions.

Neutron launches will take place from Virginia’s Mid-Atlantic Regional Spaceport located at the NASA Wallops Flight Facility. By leveraging the existing launch pad and integration infrastructure at the Mid-Atlantic Regional Spaceport, Rocket Lab eliminates the need to build a new pad, accelerating the timeline to first launch, expected in 2024.

Source: Rocket Lab Unveils Plans for New 8-Ton Class Reusable Rocket for Mega-Constellation Deployment | Rocket Lab

Rocket Lab, an End-to-End Space Company and Global Leader in Launch, to Become Publicly Traded Through Merger with Vector Acquisition Corporation

End-to-end space company with an established track record, uniquely positioned to extend its lead across a launch, space systems and space applications market forecast to grow to $1.4 trillion by 2030

One of only two U.S. commercial companies delivering regular access to orbit: 97 satellites deployed for governments and private companies across 16 missions

Second most frequently launched U.S. orbital rocket, with proven Photon spacecraft platform already operating on orbit and missions booked to the Moon, Mars and Venus

Transaction will provide capital to fund development of reusable Neutron launch vehicle with an 8-ton payload lift capacity tailored for mega constellations, deep space missions and human spaceflight

[…]

Transaction is expected to close in Q2 2021, upon which Rocket Lab will be publicly listed on the Nasdaq under the ticker RKLB

Current Rocket Lab shareholders will own 82% of the pro forma equity of combined company

Source: Rocket Lab, an End-to-End Space Company and Global Leader in Launch, to Become Publicly Traded Through Merger with Vector Acquisition Corporation

SmartThings bricks all hardware (2013 – 2021) wtf?

If you own a 2013 SmartThings hub (that’s the original) or a SmartThings Link for the Nvidia Shield TV, your hardware will stop working on June 30 of this year. The device depreciation is part of the announced exodus from manufacturing and supporting its own hardware and the Groovy IDE that Samsung Smartthings announced last summer.  SmartThings has set up a support page for customers still using those devices to help those users transition to newer hubs.

[…]

Those who purchased one of these products in the last three years (Kevin just missed the window with his March 2018 purchase of the SmartThings Link for the Nvidia Shield) can share their proof-of-purchase at Samsung’s Refund Portal to find out if they are eligible for a refund. And in a win for those of us worried about e-waste, Samsung is also planning to recycle the older gear (or it will at least send you a prepaid shipping label so you can send back the devices for theoretical recycling).

[…]

Source: SmartThings starts saying goodbye to its hardware – Stacey on IoT | Internet of Things news and analysis

At least they are willing to recycle some of the stuff but this is why you don’t buy stuff that is dependent on the cloud.

Same Energy: Visual search engine for pictures

This search engine finds other pictures with the same “energy” as the picture you select on the homepage, upload or paste the URL of

 

We believe that image search should be visual, using only a minimum of words. And we believe it should integrate a rich visual understanding, capturing the artistic style and overall mood of an image, not just the objects in it.

We hope Same Energy will help you discover new styles, and perhaps use them as inspiration. Try it with one of these images:

This website is in beta and will be regularly updated in response to your feedback.

[…]

Same Energy’s core search uses deep learning. The most similar published work is CLIP by OpenAI.

The default feeds available on the home page are algorithmically curated: a seed of 5-20 images are selected by hand, then our system builds the feed by scanning millions of images in our index to find good matches for the seed images. You can create feeds in just the same way: save images to create a collection of seed images, then look at the recommended images.

Source: About | Same Energy