The Linkielist

Linking ideas with the world

The Linkielist

About Robin Edgar

Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft

UK Company House Demands Company Stop Using Name Which Includes an HTML Closing Tag

A British software engineer came up with “a fun playful name” for his consulting business. He’d named it:

“”>

Unfortunately, this did not amuse the official registrar of companies in the United Kingdom (known as Companies House). The Guardian reports that the U.K. agency “has forced the company to change its name after it belatedly realised it could pose a security risk.” Henceforward, the software engineer’s consulting business will instead be legally known as “THAT COMPANY WHOSE NAME USED TO CONTAIN HTML SCRIPT TAGS LTD.” He now says he didn’t realise that Companies House was actually vulnerable to the extremely simple technique he used, known as “cross-site scripting”, which allows an attacker to run code from one website on another.
Engadget adds: Companies House, meanwhile, said it had “put measures in place” to prevent a repeat. You won’t be trying this yourself, at least not in the U.K.

It’s more than a little amusing to see a for-the-laughs code name stir up trouble, but this also illustrates just how fragile web security can be.

Source: UK Agency Demands Company Stop Using Name Which Includes an HTML Closing Tag – Slashdot

To Prevent Free, Frictionless Access To Human Knowledge, Publishers Want Librarians To Be Afraid, Very Afraid

After many years of fierce resistance to open access, academic publishers have largely embraced — and extended — the idea, ensuring that their 35-40% profit margins live on. In the light of this subversion of the original hopes for open access, people have come up with other ways to provide free and frictionless access to knowledge — most of which is paid for by taxpayers around the world. One is preprints, which are increasingly used by researchers to disseminate their results widely, without needing to worry about payment or gatekeepers. The other is through sites that have taken it upon themselves to offer immediate access to large numbers of academic papers — so-called “shadow libraries”. The most famous of these sites is Sci-Hub, created by Alexandra Elbakyan. At the time of writing, Sci-Hub claims to hold 79 million papers.

Even academics with access to publications through their institutional subscriptions often prefer to use Sci-Hub, because it is so much simpler and quicker. In this respect, Sci-Hub stands as a constant reproach to academic publishers, emphasizing that their products aren’t very good in terms of serving libraries, which are paying expensive subscriptions for access. Not surprisingly, then, Sci-Hub has become Enemy No. 1 for academic publishers in general, and the leading company Elsevier in particular. The German site Netzpolitik has spotted the latest approach being taken by publishers to tackle this inconvenient and hugely successful rival, and other shadow libraries. At its heart lies the Scholarly Networks Security Initiative (SNSI), which was founded by Elsevier and other large publishers earlier this year. Netzpolitik explains that the idea is to track and analyze every access to libraries, because “security”

[…]

Since academic publishers can’t compete against Sci-Hub on ease of use or convenience, they are trying the old “security risk” angle — also used by traditional software companies against open source in the early days. Yes, they say, Sci-Hub/open source may seem free and better, but think of the terrible security risks… An FAQ on the main SNSI site provides an “explanation” of why Sci-Hub is supposedly a security risk

[…]

As Techdirt pointed out when that Washington Post article came out, there is no evidence of any connections between Elbakyan and Russian Intelligence. Indeed, it’s hard not to see the investigation as simply the result of whining academic publishers making the same baseless accusation, and demanding that something be “done“. An article in Research Information provides more details about what those “wider ramifications than just getting access to content that sits behind a paywall” might be:

In the specific case of Sci-Hub, academic content (journal articles and books) is illegally harvested using a variety of methods, such as abusing legitimate log in credentials to access the secure computer networks of major universities and by hijacking “proxy” credentials of legitimate users that facilitate off campus remote access to university computer systems and databases. These actions result in a front door being opened up into universities’ networks through which Sci-Hub, and potentially others, can gain access to other valuable institutional databases such as personnel and medical records, patent information, and grant details.

But that’s not how things work in this context. The credentials of legitimate users that Sci-Hub draws on — often gladly “lent” by academics who believe papers should be made widely available — are purely to access articles held on the system. They do not provide access to “other valuable institutional databases” — and certainly not sensitive information such as “personnel and medical records” — unless they are designed by complete idiots. That is pure scaremongering, while this further claim is just ridiculous:

Such activities threaten the scholarly communications ecosystem and the integrity of the academic record. Sci-Hub has no incentive to ensure the accuracy of the research articles being accessed, no incentive to ensure research meets ethical standards, and no incentive to retract or correct if issues arise.

Sci-Hub simply provides free, frictionless access for everyone to existing articles from academic publishers. The articles are still as accurate and ethical as they were when they first appeared. To accuse Sci-Hub of “threatening” the scholarly communications ecosystem by providing universal access is absurd. It’s also revealing of the traditional publishers’ attitude to the uncontrolled dissemination of publicly-funded human knowledge, which is what they really fear and are attacking with the new SNSI campaign.

Source: To Prevent Free, Frictionless Access To Human Knowledge, Publishers Want Librarians To Be Afraid, Very Afraid | Techdirt

Nasal spray might prevent COVID-19 infections – it does in ferrets

Many hopes for a return to a semi-normal life after COVID-19 revolve around vaccines, but those injections have limits — they’re harder to deploy in low-income and rural areas where there’s no guarantee of easy distribution. Science may offer a more accessible alternative, though. Columbia University researchers have developed a nasal spray that has successfully prevented COVID-19 infections in tests with ferrets as well as a 3D model of human lungs.

The lipopeptide (that is, a lipid and peptide combination) prevents the coronavirus from fusing with a target cell’s membrane by blocking a key protein from adopting a necessary shape. It should work immediately and last for at least 24 hours. It’s also affordable, lasts a long time, and doesn’t need refrigeration.

A spray like this is still some ways from reaching the public. There would need to be human clinical trials, not to mention large-scale production to provide enough access. Scientists are planning to “rapidly advance” to further testing, Columbia said.

The move could bring protection to many parts of the world where mass COVID-19 vaccinations would be difficult. It might also serve as a “complement” even in places where vaccines are readily available, key researchers Anne Moscona and Matteo Porotto said. People who can’t take vaccines, or those for whom vaccinations don’t work, could spray themselves daily knowing they’d be safe. That, in turn, could further limit the spread of the virus and hasten the end to the pandemic.

Source: Nasal spray might prevent COVID-19 infections | Engadget

Android v 7.1.1 and lower Won’t Support Many Secure Certificates in 2021

One of the world’s top certificate authorities warns that phones running versions of Android prior to 7.1.1 Nougat will be cut off from large portions of the secure web starting in 2021, Android Police reported Saturday.

The Mozilla-partnered nonprofit Let’s Encrypt said that its partnership with fellow certificate authority IdenTrust will expire on Sept. 1, 2021. Since it has no plans to renew its cross-signing agreement, Let’s Encrypt plans to stop default cross-signing for IdenTrust’s root certificate, DST Root X3, beginning on Jan. 11 as the organization switches over to solely using its own ISRG Root X1 root.

It’s a pretty significant shift considering that as much as one-third of all web domains rely on the organization’s certificates. But since older software won’t trust Let’s Encrypt’s root certificate, this could “introduce some compatibility woes,” lead developer Jacob Hoffman-Andrews said in a blog post Friday.

“Some software that hasn’t been updated since 2016 (approximately when our root was accepted to many root programs) still doesn’t trust our root certificate, ISRG Root X1,” he said. “Most notably, this includes versions of Android prior to 7.1.1. That means those older versions of Android will no longer trust certificates issued by Let’s Encrypt.”

The only workaround for these users would be to install Firefox since it relies on its own certificate store that includes Let’s Encrypt’s root, though that wouldn’t keep applications from breaking or ensure functionality beyond your browser.

Let’s Encrypt noted that roughly 34% of Android devices are running a version older than 7.1 based on data from Google’s Android development suite. That translates to millions of users potentially being cut off from large portions of the secure web beginning in 2021

Source: Older Android Phones Won’t Support Many Secure Websites in 2021

AST & Science wants to launch 243 mobile broadband satellites into space used by the A Train – and NASA’s quite worried about crashes into scientific craft

AST & Science, a Texas-based company, has applied for approval to build SpaceMobile, which claims to be the “first and only space-based cellular broadband network to be accessible by standard smartphones.” Its proposed network is under review by the FCC. However, NASA reckons it will heighten the risk of contact between spacecraft within a region that is already crowded.

The space agency is particularly concerned about the gap between 690 and 740km above Earth, an area home to the so-called A-train. The A-train consists of ten spacecraft used to monitor Earth, operated by various groups including NASA, the United States Geological Survey, France’s National Centre for Space Studies, and Japan’s Aerospace Exploration Agency. AST wants to place its satellites across 16 orbital planes at an altitude of 700km, a distance that’s too close for comfort.

“The AST constellation would be essentially collocated with the A-Train if the proposed orbit altitude is chosen,” Samantha Fonder, NASA’s Representative to the Commercial Space Transportation Interagency Group, and a member of its Human Exploration and Operations Mission Directorate, wrote in a letter [PDF] addressed to the FCC.

What’s more the area is also particularly risky since it contains chunks of debris leftover from a previous orbital crash. “Additionally, this is an orbit regime that has a large debris object density (resulting from the Fengyun1-C ASAT test and the Iridium33-COSMOS 2251collision) and therefore experiences frequent conjunctions with debris objects,” she continued.

Fonder reckons that placing another 243 satellites near the A-train will increase the chances of a space smash. NASA has arrived at that conclusion by taking into account various factors, including the size of the AST’s SpaceMobile birds. They are much bigger than the spacecraft in the A-train and carry 900-square-metre antennas.

Source: FYI: Someone wants to launch mobile broadband satellites into space used by scientific craft – and NASA’s not happy • The Register

Uncle Sam’s legal eagles hope to get their claws on $1bn in Bitcoin ‘stolen by hacker’ from dark-web souk Silk Road

The US Department of Justice on Thursday filed a legal request to formally take control of more than $1bn in Bitcoin (BTC) generated from the sales of illicit goods at Silk Road.

It is believed the crypto-coins were stolen from the dark-web market at some point, and now the Feds want to take ownership of the haul.

Between 2011 and 2013, Silk Road sold a variety of illegal drugs and services online, until it was shut down by US law enforcement. In 2015, the site’s operator, Ross Ulbricht, was sentenced to life in prison without the possibility of parole. Now the Feds say they have an agreement to get a billion-dollar payday with Bitcoins used on the site.

In that brief period, the site racked up total revenue of more than 9.5m BTC resulting in about 600K BTC of sales commissions, according to the DoJ’s forfeiture filing.

When Ulbricht was arrested in October, 2013, the FBI said it had seized 144,336 BTC from Ulbricht’s hardware, plus 29,655 BTC from a prior seizure, totaling 173,991 BTC, which was worth about $33.6m at the time or about $2.6bn at the current exchange rate.

Prior to that, in May, 2012, according to Tom Robinson, chief scientist and co-founder of cryptocurrency analytics biz Elliptic, about 70,000 BTC left Silk Road’s digital wallet before being moved to a Bitcoin wallet with the address 1HQ3Go3ggs8pFnXuHVHRytPCq5fGG8Hbhx in 2013.

Since then, there have been a few transactions between BTC addresses related to the Silk Road funds that have remained beyond the reach of US authorities. According to a Dept of Justice court filing [PDF] today, law enforcement officers earlier this year worked with a third-party Bitcoin attribution company to analyze unattributed transactions and noticed an unusual pattern among some of them.

“These 54 transactions were not noted in the Silk Road database as a vendor withdrawal or a Silk Road employee withdrawal and therefore appear to represent Bitcoin that was stolen from Silk Road,” the court filing explained, noting that they amounted to 70,411.46 BTC. Worth about $354,000 at the time of the transfers, the value of that digital currency has skyrocketed to over $1bn today.

Investigators managed to link an unidentified individual with these transactions and the Bitcoin wallet identified above that begins 1HQ3.

“According to the investigation, Individual X was able to hack into Silk Road and gain unauthorized and illegal access to Silk Road and thereby steal the illicit cryptocurrency from Silk Road and move it into wallets that Individual X controlled,” the filing claimed. “…Ulbricht became aware of Individual X’s online identity and threatened Individual X for return of the cryptocurrency to Ulbricht.”

The government contends that Individual X failed to return the funds and kept the cryptocurrency without spending it. The complaint goes on to state that on Tuesday, Individual X signed an agreement with the US Attorney’s Office in Northern California to surrender the hacked funds.

Also on Tuesday, the 1HQ3 wallet shows a transfer of 69,369 BTC, worth about $1bn – presumably this represents Individual X providing the government with access to the funds it hopes to formally seize.

The Register has asked the Department of Justice to confirm that it controls the receiving digital wallet but we’ve not heard back.

The DoJ legal filing signals to the court that the government will present evidence that the cited property can be lawfully forfeited. If the court approves the forfeiture, the Feds will officially gain control of the funds

Source: Uncle Sam’s legal eagles hope to get their claws on $1bn in Bitcoin ‘stolen by hacker’ from dark-web souk Silk Road • The Register

Network driver issue shaves 12 more hours off Microsoft’s ‘365’ infrastructure, and yeah, it was Exchange Online again

Traditionally a night for fireworks, 5 November saw some sort of detonation within the Microsoft 365 infrastructure in the form of a borked update or, as the company delicately put it: “an issue wherein some users may be unable to access their mailboxes through Exchange Online via all connection methods.”

There was good news, however, as just over an hour later Microsoft confessed that a recent service update was “causing impact to mailbox access via Exchange Online” but a fix was being prepared that would sort it all out.

The joy was short-lived. Having realised that a network driver issue was to blame, the company then admitted the fix “was taking longer than anticipated.”

Six hours after its initial notification of trouble in the cloud, Microsoft also began looking at alternative options for “faster relief.”

Finally, nearly eight hours after the bad news first dropped from its social media orifice, the software giant claimed a fix was being rolled out. A further four hours was needed before Microsoft trumpeted that everything was up and running once again.

[…]

A glance at social media shows a substantial number of users struggled with the outage, with some making unkind comparisons with arch-rival Gmail and others expressing bewilderment that a driver could cause such an impact. Surely it was tested before hitting production systems?

Oh you sweet summer child. Have you forgotten Windows 10 1809 so soon? We await anxiously the arrival of the rebrandogun. Microsoft 352, anyone?

Source: Network driver issue shaves 12 more hours off Microsoft’s ‘365’ infrastructure, and yeah, it was Exchange Online again • The Register

Yay, cloud

Police Will Pilot a Program to Live-Stream Amazon Ring Cameras

This is not a drill. Red alert: The police surveillance center in Jackson, Mississippi, will be conducting a 45-day pilot program to live stream the Amazon Ring cameras of participating residents.

Since Ring first made a splash in the private security camera market, we’ve been warning of its potential to undermine the civil liberties of its users and their communities. We’ve been especially concerned with Ring’s 1,000+ partnerships with local police departments, which facilitate bulk footage requests directly from users without oversight or having to acquire a warrant.

While people buy Ring cameras and put them on their front door to keep their packages safe, police use them to build comprehensive CCTV camera networks blanketing whole neighborhoods. This  serves two police purposes. First, it allows police departments to avoid the cost of buying surveillance equipment and to put that burden onto consumers by convincing them they need cameras to keep their property safe. Second, it evades the natural reaction of fear and distrust that many people would have if they learned police were putting up dozens of cameras on their block, one for every house.

Now, our worst fears have been confirmed. Police in Jackson, Mississippi, have started a pilot program that would allow Ring owners to patch the camera streams from their front doors directly to a police Real Time Crime Center. The footage from your front door includes you coming and going from your house, your neighbors taking out the trash, and the dog walkers and delivery people who do their jobs in your street. In Jackson, this footage can now be live streamed directly onto a dozen monitors scrutinized by police around the clock. Even if you refuse to allow your footage to be used that way, your neighbor’s camera pointed at your house may still be transmitting directly to the police.

[…]

Source: Police Will Pilot a Program to Live-Stream Amazon Ring Cameras | Electronic Frontier Foundation

Carbon footprint for ‘training GPT-3’ AI same as driving to the moon and back

Training OpenAI’s giant GPT-3 text-generating model is akin to driving a car to the Moon and back, computer scientists reckon.

More specifically, they estimated teaching the neural super-network in a Microsoft data center using Nvidia GPUs required roughly 190,000 kWh, which using the average carbon intensity of America would have produced 85,000 kg of CO2 equivalents, the same amount produced by a new car in Europe driving 700,000 km, or 435,000 miles, which is about twice the distance between Earth and the Moon, some 480,000 miles. Phew.

This assumes the data-center used to train GPT-3 was fully reliant on fossil fuels, which may not be true. The point, from what we can tell, is not that GPT-3 and its Azure cloud in particular have this exact scale of carbon footprint, it’s to draw attention to the large amount of energy required to train state-of-the-art neural networks.

The eggheads who produced this guesstimate are based at the University of Copenhagen in Denmark, and are also behind an open-source tool called Carbontracker, which aims to predict the carbon footprint of AI algorithms. Lasse Wolff Anthony, one of Carbontracker’s creators and co-author of a study of the subject of AI power usage, believes this drain on resources is something the community should start thinking about now, as the energy costs of AI have risen 300,000-fold between 2012 and 2018, it is claimed.

[…]

Source: AI me to the Moon… Carbon footprint for ‘training GPT-3’ same as driving to our natural satellite and back • The Register

Supermarket giant Iceland sends chicken nugget into space to mark 50th anniversary

Supermarket chain Iceland has launched a chicken nugget into space to celebrate its 50th anniversary of trading.

The breaded snack was launched into the stratosphere from a location close to the company’s head office in Deeside, North Wales, as part a joint venture with Sent Into Space, a team of experts in the field of stratospheric exploration.

Iceland said the nugget took just under two hours to reach 110,000ft (33,528m) above the Earth, climbing to peak altitude and enduring temperatures of minus 60C before heading back towards terra firma at some 200mph (322kph).

Thankfully, the snack’s parachute deployed at around 62,000ft (19,000m) to enable a safe landing.

The altitude it reached was reported to be equivalent to the height of 880,000 Iceland chicken nuggets, one of the firm’s most popular items.

A Tweet from the retailer said: “We don’t know who needs to hear this, but we sent the first ever chicken nugget into space today.”

It added: “Why? We have no idea, but it was out of this world!”

Source: Supermarket giant Iceland sends chicken nugget into space to mark 50th anniversary | London Evening Standard

‘Sleeping giant’ Arctic methane deposits starting to release, scientists find

Scientists have found evidence that frozen methane deposits in the Arctic Ocean – known as the “sleeping giants of the carbon cycle” – have started to be released over a large area of the continental slope off the East Siberian coast, the Guardian can reveal.

High levels of the potent greenhouse gas have been detected down to a depth of 350 metres in the Laptev Sea near Russia, prompting concern among researchers that a new climate feedback loop may have been triggered that could accelerate the pace of global heating.

The slope sediments in the Arctic contain a huge quantity of frozen methane and other gases – known as hydrates. Methane has a warming effect 80 times stronger than carbon dioxide over 20 years. The United States Geological Survey has previously listed Arctic hydrate destabilisation as one of four most serious scenarios for abrupt climate change.

The international team onboard the Russian research ship R/V Akademik Keldysh said most of the bubbles were currently dissolving in the water but methane levels at the surface were four to eight times what would normally be expected and this was venting into the atmosphere.

“At this moment, there is unlikely to be any major impact on global warming, but the point is that this process has now been triggered. This East Siberian slope methane hydrate system has been perturbed and the process will be ongoing,” said the Swedish scientist Örjan Gustafsson, of Stockholm University, in a satellite call from the vessel.

Source: ‘Sleeping giant’ Arctic methane deposits starting to release, scientists find | Science | The Guardian

X.Org is now pretty much an ex-org: Maintainer declares the open-source windowing system largely abandoned

Red Hat’s Adam Jackson, project owner for the X.Org graphical and windowing system still widely used on Linux, said the project has been abandoned “to the extent that that means using it to actually control the display, and not just keep X apps running.”

Jackson’s post confirms suspicions raised a week ago by Intel engineer Daniel Vetter, who said in a discussion about enabling a new feature: “The main worry I have is that xserver is abandonware without even regular releases from the main branch. That’s why we had to blacklist X. Without someone caring I think there’s just largely downsides to enabling features.”

This was picked up by Linux watcher Michael Larabel, who noted that “the last major release of the X.Org server was in May 2018… don’t expect the long-awaited X.Org Server 1.21 to actually be released anytime soon.”

The project is not technically abandoned – the last code merge was mere hours ago at the time of writing – and Jackson observed in a comment on his post that “with my red hat on, I’m already on the hook for supporting the xfree86 code until RHEL8 goes EOL anyway, so I’m probably going to be writing and reviewing bugfixes there no matter what I do.”

[…]

Jackson said the future of X server is as “an application compatibility layer”, though he also said that having been maintaining X “for nearly the whole of [his] professional career” he is “completely burnt out on that on its own merits, let alone doing that and also being release manager and reviewer of last resort.”

He also mentioned related projects that he says are worthwhile such as Xwayland (X clients under Wayland), XWin (X Server on Cygwin, a Unix-like environment on Windows), and Xvnc (X applications via a remote VNC viewer).

When a response to Jackson’s post complained about issues with Wayland – such as lack of stability, poor compatibility with Nvidia hardware, lack of extension APIs – the maintainer said that keeping X server going was part of the problem. “I’m of the opinion that keeping xfree86 alive as a viable alternative since Wayland started getting real traction in 2010ish is part of the reason those are still issues, time and effort that could have gone into Wayland has been diverted into xfree86,” he said.

The hope then is that publicly announcing the end of the reliable but ancient X.Org server will stimulate greater investment in Wayland, using Xwayland for the huge legacy of existing X11 applications.

 

Source: X.Org is now pretty much an ex-org: Maintainer declares the open-source windowing system largely abandoned • The Register

AI has cracked a key mathematical puzzle for understanding our world – Partial Differential Equations

Unless you’re a physicist or an engineer, there really isn’t much reason for you to know about partial differential equations. I know. After years of poring over them in undergrad while studying mechanical engineering, I’ve never used them since in the real world.

But partial differential equations, or PDEs, are also kind of magical. They’re a category of math equations that are really good at describing change over space and time, and thus very handy for describing the physical phenomena in our universe. They can be used to model everything from planetary orbits to plate tectonics to the air turbulence that disturbs a flight, which in turn allows us to do practical things like predict seismic activity and design safe planes.

The catch is PDEs are notoriously hard to solve. And here, the meaning of “solve” is perhaps best illustrated by an example. Say you are trying to simulate air turbulence to test a new plane design. There is a known PDE called Navier-Stokes that is used to describe the motion of any fluid. “Solving” Navier-Stokes allows you to take a snapshot of the air’s motion (a.k.a. wind conditions) at any point in time and model how it will continue to move, or how it was moving before.

These calculations are highly complex and computationally intensive, which is why disciplines that use a lot of PDEs often rely on supercomputers to do the math. It’s also why the AI field has taken a special interest in these equations. If we could use deep learning to speed up the process of solving them, it could do a whole lot of good for scientific inquiry and engineering.

Now researchers at Caltech have introduced a new deep-learning technique for solving PDEs that is dramatically more accurate than deep-learning methods developed previously. It’s also much more generalizable, capable of solving entire families of PDEs—such as the Navier-Stokes equation for any type of fluid—without needing retraining. Finally, it is 1,000 times faster than traditional mathematical formulas, which would ease our reliance on supercomputers and increase our computational capacity to model even bigger problems. That’s right. Bring it on.

Hammer time

Before we dive into how the researchers did this, let’s first appreciate the results. In the gif below, you can see an impressive demonstration. The first column shows two snapshots of a fluid’s motion; the second shows how the fluid continued to move in real life; and the third shows how the neural network predicted the fluid would move. It basically looks identical to the second.

The paper has gotten a lot of buzz on Twitter, and even a shout-out from rapper MC Hammer. Yes, really.

[…]

Neural networks are usually trained to approximate functions between inputs and outputs defined in Euclidean space, your classic graph with x, y, and z axes. But this time, the researchers decided to define the inputs and outputs in Fourier space, which is a special type of graph for plotting wave frequencies. The intuition that they drew upon from work in other fields is that something like the motion of air can actually be described as a combination of wave frequencies, says Anima Anandkumar, a Caltech professor who oversaw the research alongside her colleagues, professors Andrew Stuart and Kaushik Bhattacharya. The general direction of the wind at a macro level is like a low frequency with very long, lethargic waves, while the little eddies that form at the micro level are like high frequencies with very short and rapid ones.

Why does this matter? Because it’s far easier to approximate a Fourier function in Fourier space than to wrangle with PDEs in Euclidean space, which greatly simplifies the neural network’s job. Cue major accuracy and efficiency gains: in addition to its huge speed advantage over traditional methods, their technique achieves a 30% lower error rate when solving Navier-Stokes than previous deep-learning methods.

[…]

Source: AI has cracked a key mathematical puzzle for understanding our world | MIT Technology Review

Unusual molecule found in atmosphere on Saturn’s moon Titan, precursor to life

Saturn’s largest moon, Titan, is the only moon in our solar system that has a thick atmosphere. It’s four times denser than Earth’s. And now, scientists have discovered a molecule in it that has never been found in any other atmosphere.

The particle is called cyclopropenylidene, or C3H2, and it’s made of carbon and hydrogen. This simple carbon-based molecule could be a precursor that contributes to chemical reactions that may create complex compounds. And those compounds could be the basis for potential life on Titan.
The molecule was first noticed as researchers used the Atacama Large Millimeter/submillimeter Array of telescopes in Chile. This radio telescope observatory captures a range of light signatures, which revealed the molecule among the unique chemistry of Titan’s atmosphere.
The study published earlier this month in the Astronomical Journal.
“When I realized I was looking at cyclopropenylidene, my first thought was, ‘Well, this is really unexpected,'” said lead study author Conor Nixon, planetary scientist at NASA’s Goddard Space Flight Center in Greenbelt, Maryland, in a statement.
Cyclopropenylidene has been detected elsewhere across our galaxy, mainly in molecular clouds of gas and dust including the Taurus Molecular Cloud. This cloud, where stars are born, is located 400 light-years away in the Taurus constellation. In these clouds, temperatures are too cold for many chemical reactions to occur.
Cyclopropenylidene has now been detected only in the Taurus Molecular Cloud and in the atmosphere of Titan.

But finding it in an atmosphere is a different story. This molecule can react easily when it collides with others to form something new. The researchers were likely able to spot it because they were looking through the upper layers of Titan’s atmosphere, where the molecule has fewer gases it can interact with.
“Titan is unique in our solar system,” Nixon said. “It has proved to be a treasure trove of new molecules.”
Cyclopropenylidene is the second cyclic or closed-loop molecule detected at Titan; the first was benzene in 2003. Benzene is an organic chemical compound composed of carbon and hydrogen atoms. On Earth, benzene is found in crude oil, is used as an industrial chemical and occurs naturally in the wake of volcanoes and forest fires.
Cyclic molecules are crucial because they form the backbone rings for the nucleobases of DNA, according to NASA.
[…]

Source: Unusual molecule found in atmosphere on Saturn’s moon Titan – CNN

Artificial intelligence model detects asymptomatic Covid-19 infections through cellphone-recorded coughs

MIT researchers have now found that people who are asymptomatic may differ from healthy individuals in the way that they cough. These differences are not decipherable to the human ear. But it turns out that they can be picked up by artificial intelligence.

In a paper published recently in the IEEE Journal of Engineering in Medicine and Biology, the team reports on an AI model that distinguishes asymptomatic people from healthy individuals through forced-cough recordings, which people voluntarily submitted through web browsers and devices such as cellphones and laptops.

The researchers trained the model on tens of thousands of samples of coughs, as well as spoken words. When they fed the model new cough recordings, it accurately identified 98.5 percent of coughs from people who were confirmed to have Covid-19, including 100 percent of coughs from asymptomatics — who reported they did not have symptoms but had tested positive for the virus.

The team is working on incorporating the model into a user-friendly app, which if FDA-approved and adopted on a large scale could potentially be a free, convenient, noninvasive prescreening tool to identify people who are likely to be asymptomatic for Covid-19. A user could log in daily, cough into their phone, and instantly get information on whether they might be infected and therefore should confirm with a formal test.

“The effective implementation of this group diagnostic tool could diminish the spread of the pandemic if everyone uses it before going to a classroom, a factory, or a restaurant,” says co-author Brian Subirana, a research scientist in MIT’s Auto-ID Laboratory.

Subirana’s co-authors are Jordi Laguarta and Ferran Hueto, of MIT’s Auto-ID Laboratory.

Vocal sentiments

Prior to the pandemic’s onset, research groups already had been training algorithms on cellphone recordings of coughs to accurately diagnose conditions such as pneumonia and asthma. In similar fashion, the MIT team was developing AI models to analyze forced-cough recordings to see if they could detect signs of Alzheimer’s, a disease associated with not only memory decline but also neuromuscular degradation such as weakened vocal cords.

They first trained a general machine-learning algorithm, or neural network, known as ResNet50, to discriminate sounds associated with different degrees of vocal cord strength. Studies have shown that the quality of the sound “mmmm” can be an indication of how weak or strong a person’s vocal cords are. Subirana trained the neural network on an audiobook dataset with more than 1,000 hours of speech, to pick out the word “them” from other words like “the” and “then.”

The team trained a second neural network to distinguish emotional states evident in speech, because Alzheimer’s patients — and people with neurological decline more generally — have been shown to display certain sentiments such as frustration, or having a flat affect, more frequently than they express happiness or calm. The researchers developed a sentiment speech classifier model by training it on a large dataset of actors intonating emotional states, such as neutral, calm, happy, and sad.

The researchers then trained a third neural network on a database of coughs in order to discern changes in lung and respiratory performance.

Finally, the team combined all three models, and overlaid an algorithm to detect muscular degradation. The algorithm does so by essentially simulating an audio mask, or layer of noise, and distinguishing strong coughs — those that can be heard over the noise — over weaker ones.

With their new AI framework, the team fed in audio recordings, including of Alzheimer’s patients, and found it could identify the Alzheimer’s samples better than existing models. The results showed that, together, vocal cord strength, sentiment, lung and respiratory performance, and muscular degradation were effective biomarkers for diagnosing the disease.

[…]

Surprisingly, as the researchers write in their paper, their efforts have revealed “a striking similarity between Alzheimer’s and Covid discrimination.”

[…]

Source: Artificial intelligence model detects asymptomatic Covid-19 infections through cellphone-recorded coughs

Daycares in Finland Built a ‘Forest Floor’, And It Changed Children’s Immune Systems

Playing through the greenery and litter of a mini forest’s undergrowth for just one month may be enough to change a child’s immune system, according to a small new experiment.

When daycare workers in Finland rolled out a lawn, planted forest undergrowth such as dwarf heather and blueberries, and allowed children to care for crops in planter boxes, the diversity of microbes in the guts and on the skin of young kids appeared healthier in a very short space of time.

Compared to other city kids who play in standard urban daycares with yards of pavement, tile and gravel, 3-, 4-, and 5-year-olds at these greened-up daycare centres in Finland showed increased T-cells and other important immune markers in their blood within 28 days.

“We also found that the intestinal microbiota of children who received greenery was similar to the intestinal microbiota of children visiting the forest every day,” says environmental scientist Marja Roslund from the University of Helsinki.

paivakodin pihatOne daycare before (left) and after introducing grass and planters (right). (University of Helsinki)

Prior research has shown early exposure to green space is somehow linked to a well-functioning immune system, but it’s still not clear whether that relationship is causal or not.

The experiment in Finland is the first to explicitly manipulate a child’s urban environment and then test for changes in their micriobiome and, in turn, a child’s immune system.

[…]

The results aren’t conclusive and they will need to be verified among larger studies around the world. Still, the benefits of green spaces appear to go beyond our immune systems.

Research shows getting outside is also good for a child’s eyesight, and being in nature as a kid is linked to better mental health. Some recent studies have even shown green spaces are linked to structural changes in the brains of children.

What’s driving these incredible results is not yet clear. It could be linked to changes to the immune system, or something about breathing healthy air, soaking in the sun, exercising more or having greater peace of mind.

Given the complexities of the real world, it’s really hard to control for all the environmental factors that impact our health in studies.

While rural children tend to have fewer cases of asthma and allergies, the available literature on the link between green spaces and these immune disorders is inconsistent.

The current research has a small sample size, only found a correlation, and can’t account for what children were doing outside daycare hours, but the positive changes seen are enough for scientists in Finland to offer some advice.

[…]

Bonding with nature as a kid is also good for the future of our planet’s ecosystems. Studies show kids who spend time outdoors are more likely to want to become environmentalists as adults, and in a rapidly changing world, that’s more important than ever.

Just make sure everyone’s up to date on their tetanus vaccinations, Sinkkonen advises.

The study was published in the Science Advances.

Source: Daycares in Finland Built a ‘Forest Floor’, And It Changed Children’s Immune Systems

Brave browser first to nix CNAME deception, the sneaky DNS trick used by marketers to duck privacy controls

The Brave web browser will soon block CNAME cloaking, a technique used by online marketers to defy privacy controls designed to prevent the use of third-party cookies.

The browser security model makes a distinction between first-party domains – those being visited – and third-party domains – from the suppliers of things like image assets or tracking code, to the visited site. Many of the online privacy abuses over the years have come from third-party resources like scripts and cookies, which is why third-party cookies are now blocked by default in Brave, Firefox, Safari, and Tor Browser.

Microsoft Edge, meanwhile, has a tiered scheme that defaults to a “Balanced” setting, which blocks some third-party cookies. Google Chrome has implemented its SameSite cookie scheme as a prelude to its planned 2022 phase-out of third-party cookies, maybe.

While Google tries to win support for its various Privacy Sandbox proposals, which aim to provide marketers with ostensibly privacy-preserving alternatives to increasingly shunned third-party cookies, marketers have been relying on CNAME shenanigans to pass their third-party trackers off as first-party resources.

The developers behind open-source content blocking extension uBlock Origin implemented a defense against CNAME-based tracking in November and now Brave has done so as well.

CNAME by name, cookie by nature

In a blog post on Tuesday, Anton Lazarev, research engineer at Brave Software, and senior privacy researcher Peter Snyder, explain that online tracking scripts may use canonical name DNS records, known as CNAMEs, to make associated third-party tracking domains look like they’re part of the first-party websites actually being visited.

They point to the site https://mathon.fr as an example, noting that without CNAME uncloaking, Brave blocks six requests for tracking scripts served by ad companies like Google, Facebook, Criteo, Sirdan, and Trustpilot.

But the page also makes four requests via a script hosted at a randomized path under the first-party subdomain 16ao.mathon.fr.

“Inspection outside of the browser reveals that 16ao.mathon.fr actually has a canonical name of et5.eulerian.net, meaning it’s a third-party script served by Eulerian,” observe Lazarev and Snyder.

When Brave 1.17 ships next month (currently available as a developer build), it will be able to uncloak the CNAME deception and block the Eulerian script.

Other browser vendors are planning related defenses. Mozilla has been working on a fix in Firefox since last November. And in August, Apple’s Safari WebKit team proposed a way to prevent CNAME cloaking from being used to bypass the seven-day cookie lifetime imposed by WebKit’s Intelligent Tracking Protection system

Source: Brave browser first to nix CNAME deception, the sneaky DNS trick used by marketers to duck privacy controls • The Register

Physical Security Blueprints of Many Companies Leaked in Hack of Swedish Firm Gunnebo

In March 2020, KrebsOnSecurity alerted Swedish security giant Gunnebo Group that hackers had broken into its network and sold the access to a criminal group which specializes in deploying ransomware. In August, Gunnebo said it had successfully thwarted a ransomware attack, but this week it emerged that the intruders stole and published online tens of thousands of sensitive documents — including schematics of client bank vaults and surveillance systems.

The Gunnebo Group is a Swedish multinational company that provides physical security to a variety of customers globally, including banks, government agencies, airports, casinos, jewelry stores, tax agencies and even nuclear power plants. The company has operations in 25 countries, more than 4,000 employees, and billions in revenue annually.

Acting on a tip from Milwaukee, Wis.-based cyber intelligence firm Hold Security, KrebsOnSecurity in March told Gunnebo about a financial transaction between a malicious hacker and a cybercriminal group which specializes in deploying ransomware. That transaction included credentials to a Remote Desktop Protocol (RDP) account apparently set up by a Gunnebo Group employee who wished to access the company’s internal network remotely.

[…]

Larsson quotes Gunnebo CEO Stefan Syrén saying the company never considered paying the ransom the attackers demanded in exchange for not publishing its internal documents. What’s more, Syrén seemed to downplay the severity of the exposure.

“I understand that you can see drawings as sensitive, but we do not consider them as sensitive automatically,” the CEO reportedly said. “When it comes to cameras in a public environment, for example, half the point is that they should be visible, therefore a drawing with camera placements in itself is not very sensitive.”

It remains unclear whether the stolen RDP credentials were a factor in this incident. But the password to the Gunnebo RDP account — “password01” — suggests the security of its IT systems may have been lacking in other areas as well.

[…]

Source: Security Blueprints of Many Companies Leaked in Hack of Swedish Firm Gunnebo — Krebs on Security

In a first, researchers extract secret key used to encrypt Intel CPU code

Researchers have extracted the secret key that encrypts updates to an assortment of Intel CPUs, a feat that could have wide-ranging consequences for the way the chips are used and, possibly, the way they’re secured.

The key makes it possible to decrypt the microcode updates Intel provides to fix security vulnerabilities and other types of bugs. Having a decrypted copy of an update may allow hackers to reverse engineer it and learn precisely how to exploit the hole it’s patching. The key may also allow parties other than Intel—say a malicious hacker or a hobbyist—to update chips with their own microcode, although that customized version wouldn’t survive a reboot.

“At the moment, it is quite difficult to assess the security impact,” independent researcher Maxim Goryachy said in a direct message. “But in any case, this is the first time in the history of Intel processors when you can execute your microcode inside and analyze the updates.” Goryachy and two other researchers—Dmitry Sklyarov and Mark Ermolov, both with security firm Positive Technologies—worked jointly on the project.

The key can be extracted for any chip—be it a Celeron, Pentium, or Atom—that’s based on Intel’s Goldmont architecture.

[…]

attackers can’t use Chip Red Pill and the decryption key it exposes to remotely hack vulnerable CPUs, at least not without chaining it to other vulnerabilities that are currently unknown. Similarly, attackers can’t use these techniques to infect the supply chain of Goldmont-based devices.

[…]

In theory, it might also be possible to use Chip Red Pill in an evil maid attack, in which someone with fleeting access to a device hacks it. But in either of these cases, the hack would be tethered, meaning it would last only as long as the device was turned on. Once restarted, the chip would return to its normal state. In some cases, the ability to execute arbitrary microcode inside the CPU may also be useful for attacks on cryptography keys, such as those used in trusted platform modules.

“For now, there’s only one but very important consequence: independent analysis of a microcode patch that was impossible until now,” Positive Technologies researcher Mark Ermolov said. “Now, researchers can see how Intel fixes one or another bug/vulnerability. And this is great. The encryption of microcode patches is a kind of security through obscurity.”

Source: In a first, researchers extract secret key used to encrypt Intel CPU code | Ars Technica

Another eBay exec pleads guilty after couple stalked, harassed for daring to criticize the internet tat bazaar – pig corpese involved

Philip Cooke, 55, oversaw eBay’s security operations in Europe and Asia and was a former police captain in Santa Clara, California. He pleaded guilty this week to conspiracy to commit cyberstalking and conspiracy to tamper with witnesses.

Cooke, based in San Jose, was just one of seven employees, including one manager, accused of targeting a married couple living on the other side of the United States, in Massachusetts, because they didn’t like their criticisms of eBay in the newsletter.

It’s said the team would post aggressive anonymous comments on the couple’s newsletter website, and at some point planned a concerted campaign against the pair including cyberstalking and harassment. Among other things, prosecutors noted, “several of the defendants ordered anonymous and disturbing deliveries to the victims’ home, including a preserved fetal pig, a bloody pig Halloween mask and a book on surviving the loss of a spouse.”

[…]

But it was when the couple noticed they were under surveillance in their own home they finally went to the cops in Natick, where they lived, and officers opened an investigation.

It was Cooke’s behavior at that point that led to the subsequent charge of conspiracy to tamper with a witness: he formulated a plan to give the Natick police a false lead in an effort to prevent them from discovering proof that his team had sent the pig’s head and other items. The eBay employees also deleted digital evidence that showed their involvement, prosecutors said, obstructing an investigation and breaking another law.

[…]

Source: Another eBay exec pleads guilty after couple stalked, harassed for daring to criticize the internet tat bazaar • The Register

NASA Discovers a Rare Metal Asteroid Worth $10,000 Quadrillion

NASA’s Hubble Space Telescope has discovered a rare, heavy and immensely valuable asteroid called “16 Psyche” in the Solar System’s main asteroid belt between Mars and Jupiter.

Asteroid Psyche is located at roughly 230 million miles (370 million kilometers) from Earth and measures 140 miles (226 kilometers) across, about the size of West Virginia. What makes it special is that, unlike most asteroids that are either rocky or icy, Psyche is made almost entirely of metals, just like the core of Earth, according to a study published in the Planetary Science Journal on Monday.

[…]

Given the asteroid’s size, its metal content could be worth $10,000 quadrillion ($10,000,000,000,000,000,000), or about 10,000 times the global economy as of 2019.

[…]

Psyche is the target of the NASA Discovery Mission Psyche, expected to launch in 2022 atop a SpaceX Falcon Heavy rocket. Further facts about the asteroid, including its exact metal content, will hopefully be uncovered when an orbiting probe arrives in early 2026.

[…]

The asteroid is believed to be the dead core left by a planet that failed during its formation early in the Solar System’s life or the result of many violent collisions in its distant past.

“Short of it being the Death Star… one other possibility is that it’s material that formed very near the Sun early in the Solar System,” Elkins-Tanton told Forbes in an interview in May, 2017 interview. “I figure we’re either going to go see something that’s really improbable and unique, or something that is completely astonishing.”

Source: NASA Discovers a Rare Metal Asteroid Worth $10,000 Quadrillion | Observer

I’d invest in the NASA mission, but it’s being launched on a SpaceX vehicle, which means that Musk will either send it the wrong direction (like his car) or more likely, it will blow up.

NSA: foreign spies used one of our crypto backdoors – we learnt some lessons but we lost them

It’s said the NSA drew up a report on what it learned after a foreign government exploited a weak encryption scheme, championed by the US spying agency, in Juniper firewall software.

However, curiously enough, the NSA has been unable to find a copy of that report.

On Wednesday, Reuters reporter Joseph Menn published an account of US Senator Ron Wyden’s efforts to determine whether the NSA is still in the business of placing backdoors in US technology products.

Wyden (D-OR) opposes such efforts because, as the Juniper incident demonstrates, they can backfire, thereby harming national security, and because they diminish the appeal of American-made tech products.

But Wyden’s inquiries, as a member of the Senate Intelligence Committee, have been stymied by lack of cooperation from the spy agency and the private sector. In June, Wyden and various colleagues sent a letter to Juniper CEO Rami Rahim asking about “several likely backdoors in its NetScreen line of firewalls.”

Juniper acknowledged in 2015 that “unauthorized code” had been found in ScreenOS, which powers its NetScreen firewalls. It’s been suggested that the code was in place since around 2008.

The Reuters report, citing a previously undisclosed statement to Congress from Juniper, claims that the networking biz acknowledged that “an unnamed national government had converted the mechanism first created by the NSA.”

Wyden staffers in 2018 were told by the NSA that a “lessons learned” report about the incident had been written. But Wyden spokesperson Keith Chu told Reuters that the NSA now claims it can’t find the file. Wyden’s office did not immediately respond to a request for comment.

The reason this malicious code was able to decrypt ScreenOS VPN connections has been attributed to Juniper’s “decision to use the NSA-designed Dual EC Pseudorandom Number Generator.”

[…]

After Snowden’s disclosures about the extent of US surveillance operations in 2013, the NSA is said to have revised its policies for compromising commercial products. Wyden and other lawmakers have tried to learn more about these policies but they’ve been stonewalled, according to Reuters.

[…]

Source: NSA: We’ve learned our lesson after foreign spies used one of our crypto backdoors – but we can’t say how exactly • The Register

And this is why you don’t put out insecure security products, which is exactly what products with a backdoor are. Here’s looking at you, UK and Australia and all the other countries trying to force insecure products on us.

Researchers develop new atomic layer deposition process

A new way to deposit thin layers of atoms as a coating onto a substrate material at near room temperatures has been invented at The University of Alabama in Huntsville (UAH), a part of the University of Alabama System.

UAH postdoctoral research associate Dr. Moonhyung Jang got the idea to use an ultrasonic atomization technology to evaporate chemicals used in (ALD) while shopping for a home humidifier.

Dr. Jang works in the laboratory of Dr. Yu Lei, an associate professor in the Department of Chemical Engineering. The pair have published a paper on their invention that has been selected as an editor’s pick in the Journal of Vacuum Science & Technology A.

“ALD is a three-dimensional thin film deposition technique that plays an important role in microelectronics manufacturing, in producing items such as central processing units, memory and hard drives,” says Dr. Lei.

Each ALD cycle deposits a layer a few atoms deep. An ALD process repeats the deposition cycle hundreds or thousands of times. The uniformity of the thin films relies on a surface self-limiting reaction between the chemical vapor and the substrates.

“ALD offers exceptional control of nanometer features while depositing materials uniformly on large silicon wafers for high volume manufacturing,” Dr. Lei says. “It is a key technique to produce powerful and small smart devices.”

[…]

“In the past, many reactive chemicals were considered not suitable for ALD because of their low vapor pressure and because they are thermally unstable,” says Dr. Lei. “Our research found that the ultrasonic atomizer technique enabled evaporating the reactive chemicals at as low as room temperature.”

The UAH scientists’ ultrasound invention makes it possible to use a wide range of reactive chemicals that are thermally unstable and not suitable for direct heating.

“Ultrasonic atomization, as developed by our research group, supplies low vapor pressure precursors because the evaporation of precursors was made through ultrasonic vibrating of the module,” Dr. Lei says.

“Like the household humidifier, ultrasonic atomization generates a mist consisting of saturated vapor and micro-sized droplets,” he says. “The micro-sized droplets continuously evaporate when the mist is delivered to the substrates by a carrier gas.”

The process uses a piezo-electric ultrasonic transducer placed in a liquid chemical precursor. Once started, the transducer starts to vibrate a few hundred thousand times per second and generates a mist of the chemical precursor. The small liquid droplets in the mist are quickly evaporated in the gas manifold under vacuum and mild heat treatment, leaving behind an even coat of the deposition material.

Source: Researchers develop new atomic layer deposition process

Water on the Moon: Research unveils its type and abundance – boosting exploration plans

“Water” has since been detected inside the minerals in lunar rocks. Water ice has also been discovered to be mixed in with lunar dust grains in cold, permanently shadowed regions near the lunar poles.

But scientists haven’t been sure how much of this water is present as “molecular water”—made up of two parts hydrogen and one part oxygen (H2O). Now two new studies published in Nature Astronomy provide an answer, while also giving an idea of how and where to extract it.

Source: Water on the Moon: Research unveils its type and abundance – boosting exploration plans

Palo Alto Networks threatens to sue security startup for comparison review, says it breaks software EULA. 1 EULA? 2 WTF?

Palo Alto Networks has threatened a startup with legal action after the smaller biz published a comparison review of one of its products.

Israel-based Orca Security received a cease-and-desist letter from a lawyer representing Palo Alto after Orca uploaded a series of online videos reviewing of one of Palo Alto’s products and compared it to its own. Orca sees itself as a competitor of Palo Alto Networks (PAN).

“What we expected is that others will also create such materials … but instead we received a letter from Palo Alto’s lawyers claiming we were not allowed to do that,” Orca chief exec Avi Shua told The Register this week. “We believe these are empty legal threats.”

In a note on its website, Orca lamented at length the “outrageous” behavior of PAN, as well as posting a copy of the lawyer’s letter for world-plus-dog to read. That letter claimed Orca infringed PAN’s trademarks by using its name and logo in the review as well as breaching non-review clauses in the End-User License Agreement (EULA) of PAN’s product.

As such, the lawyer demanded the removal of the comparison material, and that the startup stop using PAN’s logo and name. We note the videos are still online, hosted by YouTube.

“It’s outrageous that the world’s largest cybersecurity vendor, its products being used by over 65,000 organizations according to its website, believes that its users aren’t entitled to share any benchmark or performance comparison of its products,” said Orca.

The lawyer’s letter [PDF] claimed Orca violated PAN’s EULA fine-print, something deputy general counsel Melinda Thompson described in her missive as “a clear breach” of terms “prohibiting an end user from disclosing, publishing or otherwise making publicly available any benchmark, performance or comparison tests… run on Palo Alto Networks products, in whole or in part.”

Shua told The Register Orca tried to give its rival a fair crack of the whip: “Even if we tried to be objective, we would have some biases. But we did try to do it as objectively as possible, by showing it to users: creating labs, screenshots, and showing how it looks like.” The fairness of the review, we note, is not what is at issue here: PAN forbids any kind of benchmarking and comparison of its gear.

Palo Alto networks declined to comment when contacted by The Register.

Source: Palo Alto Networks threatens to sue security startup for comparison review, says it breaks software EULA • The Register

1 Who reads EULAs anyway? Are they in any way, shape or form defensible apart from maybe some ant fucker friendless lawyers?

2 Is PAN so very worried about the poor quality of their product that they feel they want to kill any and all benchmarks / comparisons?