About Robin Edgar

Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft

Millions of South Africans’ personal information may have been leaked online

The personal information of more than 30 million South Africans has apparently been leaked online. This is according to Australian security researcher and creator of ‘Have I Been Pwned’, Troy Hunt. His website allows people to check if their personal information has been compromised in a data breach.He took to Twitter on Tuesday to say he had “a very large breach titled ‘masterdeeds’”.The title of the data led him and others commentators to speculate that the leak was likely from the deeds office. Identity numbersIf the information Hunt has is legitimate, it may be the biggest breach of Popi (Protection of Personal Information Act) to have ever taken place. Hunt said the database contained names of people, their gender, ethnicity, home ownership and contact information. The data also contained people’s identity numbers and other information like their estimated income and details of their employer. He said the information appeared to be from a government agency.MyBroadband reported that the database was a 27.2GB backup file that Hunt found on Torrent and he gained 31.6 million records before it crashed. He said there could be over 47 million records in the database.

Source: Millions of South Africans’ personal information may have been leaked online | Fin24

Virtually everyone in Malaysia pwned in telco, govt data hack spree

Information on 46.2 million cellphone accounts was slurped from Malaysians telecoms providers. To put that in context, the population of Malaysia is 31.2 million; obviously, some people have more than one number.The stolen telco records include people’s mobile phone numbers, SIM card details, device serial numbers, and home addresses, all of which are useful to identity thieves and scammers. Some 80,000 medical records were also accessed during the hacking spree, and government websites as well as Jobstreet.com were attacked and infiltrated, too, we’re told.
[…]
Malaysian officials confirmed this week that nearly 50 million mobile phone account records were accessed by hackers unknown. The authorities also warned that people’s private data was stolen from the Malaysian Medical Council, the Malaysian Medical Association, the Academy of Medicine, the Malaysian Housing Loan Applications body, the Malaysian Dental Association, and the National Specialist Register of Malaysia.

It’s believed the systems were actually hacked as far back as 2014, The Star reported.

Source: Virtually everyone in Malaysia pwned in telco, govt data hack spree • The Register

Large companies in NL giving Facebook personal client data freely

The companies asked by the consumer protection authority are

de ANWB, Nuon en Oxfam Novib. De Bijenkorf stopte hier al eerder mee. Essent heeft toegezegd binnenkort te stoppen en KLM en Transavia heroverwegen hun aanpak. De Bankgiroloterij, FBTO, KPN/Telfort, Postcodeloterij, Vakantieveilingen, Vriendenloterij en de Persgroep blijven gewoon doorgaan. Van Heerlijk.nl, HelloFresh en Hotels.nl

To be fair, some were giving the data away encrypted.

BMWs from between 2006-2011 at fire risk, recalled in the US

One recall covers 670,000 2006-2011 U.S. 3-Series vehicles to address a wiring issue for heating and air conditioning systems that may overheat and could increase the risk of a fire.

The second recall covers 740,000 U.S. 2007-2011 vehicles with a valve heater that could rust and lead to a fire in rare cases. The recall includes some 128i vehicles, 3-Series, 5-Series and X3, X5 and Z4 vehicles.

This is important because generally these recalls only happen in the US due to law suites, even though the danger is to all vehicles worldwide.

Yes, Google is reading your corporate documents and you agreed to it.

Many people worried that Google was scanning users’ documents in real time to determine if they’re being mean or somehow bad. You actually agree to such oversight in Google G Suite’s terms of service.

Those terms include include personal conduct stipulations and copyright protection, as well as adhering to “program policies.” Who knows what made the program that checks for abuse and other violations of the G Suite terms of service to go awry. But something did.

And it’s not just Google that has such terms. Chances are you or your employees have signed similar terms in the many agreements that people accept without reading.

The big concern from enterprises this week was not being locked out of Google Docs for a time but the fact that Google was scanning documents and other files. Even though this is spelled out in the terms of service, it’s uncomfortably Big Brother-ish, and raises anew questions about how confidential and secure corporate information really is in the cloud.  

This is part of a workshop I have given several times: many companies do this happily. Oddly enough you won’t find their invasions in the privacy policy, but in their terms of service is where you find the interesting maneuvering. It’s actually worse than above: you generally give away copyright to all your documents as well 🙂

Mozilla Wants to Distrust Dutch HTTPS Provider Because of Local Dystopian Law (Sleepnetwet)

If the plan is approved, Firefox will not trust certificates issued by the Staat der Nederlanden (State of the Netherlands) Certificate  Authority (CA).

This CA is operated by PKIOverheid/Logius, a division of the Ministry of Interior and Kingdom Relations, which is the same ministry that oversees the AIVD intelligence service.

New law givers Dutch govt power to intercept Internet traffic

What’s got Mozilla engineers scared is the new “Wet op de inlichtingen- en veiligheidsdiensten (Wiv)” — translated to Information and Security Services Act — a new law voted this year that will come into effect at the start of 2018.

This new law gives Dutch authorities the powers to intercept and analyze Internet traffic. While other countries have similar laws, what makes this one special is that authorities will have authorization to carry out covert technical attacks to access encrypted traffic.

Such covert technical capabilities include the use of “false keys,” as mentioned in Article 45 1.b, a broad term that includes TLS certificates.

Cross-Cultural Study on Recognition of Emoticon’s shows that different cultures see emojis differently

Emoticons are getting more popular as the new communication channel to express feelings in online communication. Although familiarity to emoticons depends on cultures, how exposure matters in emotion recognition from emoticon is still open. To address this issue, we conducted a cross-cultural experimental study among Cameroon and Tanzania (hunter-gatherers, swidden farmers, pastoralists, and city dwellers) wherein people rarely experience emoticons and Japan wherein emoticons are popular. Emotional emoticons (e.g., ☺) as well as pictures of real faces were presented on a tablet device. The stimuli expressed a sad, neutral, or happy feeling. The participants rated the emotion of stimulus on a Sad–Happy Scale. We found that the emotion rating for the real faces was slightly different but similar among three cultural groups, which supported the “dialect” view of emotion recognition. Contrarily, while Japanese people were also sensitive to the emotion of emoticons, Cameroonian and Tanzanian people hardly read emotion from emoticons. These results suggested that the exposure to emoticons would shape the sensitivity to emotion recognition of emoticons, that is, ☺ does not necessarily look smiling to everyone.

Source: Is ☺ Smiling? Cross-Cultural Study on Recognition of Emoticon’s EmotionJournal of Cross-Cultural Psychology – Kohske Takahashi, Takanori Oishi, Masaki Shimada, 2017

39 episodes of ‘CSI’ used to build AI’s natural language model

group of University of Edinburgh boffins have turned CSI:Crime Scene Investigation scripts into a natural language training dataset.Their aim is to improve how bots understand what’s said to them – natural language understanding.Drawing on 39 episodes from the first five seasons of the series, Lea Freeman, Shay Cohen and Mirella Lapata have broken the scripts up as inputs to a LSTM (long short-term memory) model.The boffins used the show because of its worst flaw: a rigid adherence to formulaic scripts that make it utterly predictable. Hence the name of their paper: “Whodunnit? Crime Drama as a Case for Natural Language Understanding”.“Each episode poses the same basic question (i.e., who committed the crime) and naturally provides the answer when the perpetrator is revealed”, the boffins write. In other words, identifying the perpetrator is a straightforward sequence labelling problem.What the researchers wanted was for their model to follow the kind of reasoning a viewer goes through in an episode: learn about the crime and the cast of characters, start to guess who the perp is (and see whether the model can outperform the humans).

Source: 39 episodes of ‘CSI’ used to build AI’s natural language model • The Register

Bitcoin Pioneer Says New Coin to Work on Many Blockchains

The mobility means that if one blockchain dies out as the result of infighting among developers or slackened use, metronome owners can move their holdings elsewhere. That should help the coins retain value, and ensure their longevity, Garzik, co-founder of startup Bloq that created metronome, said in a phone interview. It will be unveiled Tuesday at the Money 20/20 conference in Las Vegas.”Institutional investors should be very excited to see something like this,” Matthew Roszak, the other co-founder of Bloq and chairman of industry advocate Chamber of Digital Commerce, said in a phone interview. “We’ve built a thousand-year cryptocurrency, something that’s built to last.”That’s a concern for many digital currencies. Infighting among developers and various supporters, and the slow pace of enhancements on the bitcoin blockchain have helped to limit use. Both bitcoin and its main rival, ethereum, have split into several versions.More splits could be coming — partly, thanks to Garzik, who is a proponent of and a developer for an upgrade to the bitcoin network called SegWit2x, which offers one way to speed up transactions. That split could happen in November.

Source: Bitcoin Pioneer Says New Coin to Work on Many Blockchains – Bloomberg

A useful feature for a coin.

Turns out that dating apps can give away your location, show who you like and who and where you are

It seems just about everyone has written about the dangers of online dating, from psychology magazines to crime chronicles. But there is one less obvious threat not related to hooking up with strangers – and that is the mobile apps used to facilitate the process. We’re talking here about intercepting and stealing personal information and the de-anonymization of a dating service that could cause victims no end of troubles – from messages being sent out in their names to blackmail. We took the most popular apps and analyzed what sort of user data they were capable of handing over to criminals and under what conditions.We studied the following online dating applications: Tinder for Android and iOS Bumble for Android and iOS OK Cupid for Android and iOS Badoo for Android and iOS Mamba for Android and iOS Zoosk for Android and iOS Happn for Android and iOS WeChat for Android and iOS Paktor for Android and iOSBy de-anonymization we mean the user’s real name being established from a social media network profile where use of an alias is meaningless.

Source: Dangerous liaisons – Securelist

AMD sales soar, actually makes a profit, beats expectations, share price… decimated

Personal TechAMD sales soar, actually makes a profit, beats expectations, share price… decimatedIntel’s antitrust shield even loses when it winsBy Shaun Nichols in San Francisco 25 Oct 2017 at 00:0816 Reg comments SHARE ▼guitar player on shuttertsock photo of (sisyphus) man rolling a rock up a hill. photo by SHutterstock/PHOTOCREO Michal BednarekAMD revenues were up, an actual proper profit was banked, and its future looking brighter than ever in the past financial quarter… meanwhile investors are selling off shares fearing a downturn looming for the chip designer.Strong sales from its Ryzen and Epyc Zen-based processor lines helped the world’s second-favorite x86 PC and server chip slinger grow revenues by more than 25 per cent in its third quarter of 2017, the three months to September 30. Here’s a summary of the figures, announced on Tuesday: Revenues of $1.64bn were up 26 per cent from $1.31bn in Q3 2016, and topped analyst estimates of $1.51bn. Net income of $71m topped the admittedly low bar set by last year’s $406m quarterly loss, in large part caused by a $340m payment to Global Foundries. For a different angle, non-GAAP operating income this year was $110m compared to $27m this time last year. Earnings per share were $0.10 non-GAAP, topping analyst estimates of $0.08. Computing and graphics processors (PC CPUs and GPUs) accounted for much of the jump, as the Ryzen launch and Radeon revamp bumped revenues to $819m, compared to $472m on the year-ago quarter. CEO Lisa Su claimed AMD’s Ryzen desktop processors made up 40 to 50 per cent of CPU sales at certain online retailers. Enterprise, embedded, and semi-custom (everything from servers to games console chips) logged revenues of $824m, down slightly from $835m this time last year.
[…]
Investors, meanwhile, seemed to be less interested in 7nm than in what lies immediately ahead for AMD. For the upcoming quarter, the chip designer is expecting a sequential revenue decline of 15 per cent, with year-over-year Q4 revenues up by 26 per cent. Additionally, AMD said that it sees sales for hardware specializing in blockchain calculations – GPUs for Bitcoin and other alt-coin mining, which has fueled sales – “leveling off” as demand slows.

Those figures spooked shareholders after hours, sending AMD stock down by 10.5 per cent to around $12.75 per share at the time of writing.

Source: AMD sales soar, actually makes a profit, beats expectations, share price… decimated • The Register

Signs the market we use is outdated!

International (24 regulators) enforcement operation finds website privacy notices are too vague and generally inadequate (over 455 websites and apps)

An investigation by 24 data protection regulators from around the world – led by the UK’s Information Commissioner’s Office – concluded that ‘there is significant room for improvement in terms of specific details contained in privacy communications’.The privacy notices, communications and practices of 455 websites and apps in sectors including retail, finance and banking, travel, social media, gaming/gambling, education and health were assessed to consider whether it was clear from a user’s perspective exactly what information was collected, for what purpose, and how it would be processed, used and shared.Overall, the Global Privacy Enforcement Network (GPEN) came to the following conclusions: Privacy communications across the various sectors tended to be vague, lacked specific detail and often contained generic clauses. The majority of organisations failed to inform the user what would happen to their information once it had been provided. Organisations were generally quite clear on what information they would collect from the user. Organisations generally failed to specify with whom data would be shared. Many organisations failed to refer to the security of the data collected and held – it was often unclear in which country data was stored or whether any safeguards were in place. Just over half the organisations examined made reference to how users could access the personal data held about them.

Source: GPEN Sweep 2017 – International enforcement operation finds website privacy notices are too vague and generally inadequate | Global Privacy Enforcement Network

Samsung repurposes old phones – bitcoin miner, fishtank monitor, promises to open up

The phone-in-the-closet phenomenon has become a hidden store of e-waste; a two-year-old phone still has value and is still a powerful device. And so it’s great news that Samsung is starting a new “Upcycling” initiative that is designed to turn old smartphones and turn them into something brand new.Behold, for example, this bitcoin mining rig, made out of 40 old Galaxy S5 devices, which runs on a new operating system Samsung has developed for its upcycling initiative.
[…]
The team hooked 40 old Galaxy S5’s together to make a bitcoin mining rig, repurposed an old Galaxy tablet into a ubuntu-powered laptop, used a Galaxy S3 to monitor a fishtank, and programed an old phone with facial recognition software to guard the entrance of a house in the form of an owl.
[…]
It’s all very cool and Samsung plans to release both the software it used to unlock the phones as well as the various plans for the projects online for free.
[…]
Upcycling is a great way to keep old devices alive and it can’t easily happen without the original manufacturer’s support. “The challenge with keeping old electronics running a long time is software,” Kyle Wiens, CEO of iFixit, told me over the phone. “With phones in particular, the old software is insecure and doesn’t run the new apps.
[…]
Samsung’s upcycling project has a placeholder github with a video explaining its process. “They’re setting up a maker magazine style portfolio of projects,” Wiens explained. The site will work by allowing users to download software that removes Android and opens the devices up to other forms of software. From there, users can browse a wide variety of homebrew software and projects.

The platform will be open, so users can make and upload their own projects and software once it launches. In an example from a Samsung promotional video, a user downloaded fish monitoring software to an old Galaxy S3 and ordered the sensors for the water right from the website. After it’s all set up, the user has a device that monitors the PH balance and heat of the fish tank. It even allows the pet owner to snap pics of their swimmers or turn the lights on and off.

Robust support for repurposing devices like this is unheard of in the tech industry. Companies such as Apple have made it hard for users to fix their own broken devices. In most cases, manufacturers would rather people just buy new devices than fix their old ones. It’s a philosophy that’s good for the company, but bad for the environment and bad for the customer.

Source: Samsung Made a Bitcoin Mining Rig Out of 40 Old Galaxy S5s – Motherboard

Well done Samsung!
The upcycling website is https://galaxyupcycling.github.io/

Android Is Quietly Sharing Your Physical Activity with Other Apps

Google snuck a questionable feature into the operating system with a recent update. A new permission called “activity recognition” may be tracking your physical activity and sharing it with third-party apps, and there’s no easy way to stop it.
What Is Activity Recognition?

The “activity recognition” permission was shared on Reddit earlier this week. Basically, it allows Google to track your physical activity (biking, running, standing still) using your phone’s built-in sensors and then share that information with third-party apps.
Imgur

SoundHound and Shazam both appear to be using the permission, though it’s unclear why. Activity recognition is also categorized in the list of “other” permissions, so it won’t show up when an app updates on your phone. The only way to check is to go into each app on your device and look at all of its permissions.
How to Deal With It

There’s also no way to revoke this specific permission either across the board or on an app-by-app basis. If it’s an app you don’t use that often you could always delete it off your phone to avoid sharing your personal information. One Reddit user also suggested preventing those apps from running in the background.

Unfortunately, there’s no easy way to deal with activity recognition for now. Hopefully Google will offer a fix eventually, but until then you may just have to accept that owning a smartphone means giving up a bit of your privacy.

Source: Android Is Quietly Sharing Your Physical Activity with Other Apps

Google is getting more and more invasive, with Google Maps tracking your location all the time and the Google play store, Inbox and Google Play services (among others) requiring microphone and body sensors permissions for proper operations. Why? Because privacy is dead to Google as well.

This Company Added the Word ‘Blockchain’ to Its Name and Saw Its Shares Surge 394%

n-line Plc jumped as much as 394 percent on Friday after announcing plans to change its name to On-line Blockchain Plc, following an initial climb of 19 percent on Thursday when it first announced the news. It’s the biggest one-day gain for the small-cap company since its December 1996 listing. The trading volume that reached 2.9 million shares by early afternoon in London is equal to more than 16 times the entire year’s trading before the last two days.
[…]
This isn’t the first time that investors have gotten excited about a name. Shares in Colorado-based Bioptix Inc. nearly doubled in value in the days leading up to its name change to Riot Blockchain Inc. earlier this month. In what seems to be a case of mistaken identity, a New York-based startup called SNAP Interactive Inc. jumped more than 150 percent in the days after Snap Inc. filed for a $3 billion initial public offering in February. Little-known SNAP Interactive makes mobile dating apps, while Snap Inc. is the parent of the popular Snapchat photo-sharing app.

Source: This Company Added the Word ‘Blockchain’ to Its Name and Saw Its Shares Surge 394% – Bloomberg

A generative vision model that trains with high data efficiency and breaks text-based CAPTCHAs

Learning from few examples and generalizing to dramatically different situations are capabilities of human visual intelligence that are yet to be matched by leading machine learning models. By drawing inspiration from systems neuroscience, we introduce a probabilistic generative model for vision in which message-passing based inference handles recognition, segmentation and reasoning in a unified way. The model demonstrates excellent generalization and occlusion-reasoning capabilities, and outperforms deep neural networks on a challenging scene text recognition benchmark while being 300-fold more data efficient. In addition, the model fundamentally breaks the defense of modern text-based CAPTCHAs by generatively segmenting characters without CAPTCHA-specific heuristics. Our model emphasizes aspects like data efficiency and compositionality that may be important in the path toward general artificial intelligence.

Source: A generative vision model that trains with high data efficiency and breaks text-based CAPTCHAs

Nvidia uses Progressive Growing of GANs for Improved Quality, Stability, and Variation and makes photorealistic faces with them

We describe a new training methodology for generative adversarial networks. The key idea is to grow both the generator and discriminator progressively, starting from low-resolution images, and add new layers that deal with higher resolution details as the training progresses. This greatly stabilizes the training and allows us to produce images of unprecedented quality, e.g., CelebA images at 1024² resolution. We also propose a simple way to increase the variation in generated images, and achieve a record inception score of 8.80 in unsupervised CIFAR10. Additionally, we describe several small implementation details that are important for discouraging unhealthy competition between the generator and discriminator. Finally, we suggest a new metric for evaluating GAN results, both in terms of image quality and variation. As an additional contribution we construct a higher quality version of the CelebA dataset that allows meaningful exploration up to the resolution of 1024² pixels.

Source: Progressive Growing of GANs for Improved Quality, Stability, and Variation | Research

alcohol hangover–a puzzling phenomenon

The alcohol hangover develops when blood alcohol concentration (BAC) returns to zero and is characterized by a feeling of general misery that may last more than 24 h. It comprises a variety of symptoms including drowsiness, concentration problems, dry mouth, dizziness, gastro-intestinal complaints, sweating, nausea, hyper-excitability, and anxiety. The alcohol hangover is an intriguing issue since it is unknown why these symptoms are present after alcohol and its metabolites are eliminated from the body.

Although numerous scientific papers cover the acute effects of alcohol consumption, researchers largely neglected the issue of alcohol hangover. This lack of scientific interest is remarkable, since almost everybody is familiar with the unpleasant hangover effects that may arise the day after an evening of excessive drinking, and with the ways these symptoms may affect performance of planned activities.

Many people favour the (unproven) popular belief that dehydration is the main cause of alcohol hangover symptoms. However, taking a closer look at the present research on biological changes during alcohol hangovers suggests otherwise.
[…]
nterestingly, no significant differences were found in absenteeism between workers reporting hangovers and those who did not. A possible explanation may be that workers with a hangover feel that having a hangover is ‘their own fault’, and the obligation they have to go to work may prevent calling sick. The fact that workers do go to work when having a hangover is of concern, especially since some in jobs making the wrong decisions may have serious consequences.

The article by Stephens and colleagues calls for additional hangover research, using more sophisticated research methods. In this context, researchers should ask themselves the question ‘ what is the alcohol hangover?’. It is evident that besides the alcohol amount many other factors play a role in determining the presence and severity of hangovers. To complicate matters, co-occurring dehydration and sleep deprivation have an impact on the next-day effect of excessive alcohol consumption as well. Until future research elucidates its pathology, the alcohol hangover remains a puzzling phenomenon.

Source: alcohol hangover–a puzzling phenomenon | Alcohol and Alcoholism | Oxford Academic

It turns out we don’t really know much about hangovers and it’s quite difficult to actually study them.

Exclusive: Microsoft Has Stopped Manufacturing The Kinect

Manufacturing of the Kinect has shut down. Originally created for the Xbox 360, Microsoft’s watershed depth camera and voice recognition microphone sold ~35 million units since its debut in 2010, but Microsoft will no longer produce it when retailers sell off their existing stock. The company will continue to support Kinect for customers on Xbox, but ongoing developer tools remain unclear. Microsoft shared the news with Co.Design in exclusive interviews with Alex Kipman, creator of the Kinect, and Matthew Lapsen, GM of Xbox Devices Marketing.

The Kinect had already been slowly de-emphasized by Microsoft, as the Xbox team anchored back around traditional gaming to counter the PS4, rather than take its more experimental approach to entertainment. Yet while the Kinect as a standalone product is off the market, its core sensor lives on. Kinect v4–and soon to be, v5–powers Microsoft’s augmented reality Hololens, which Kipman also created. Meanwhile, Kinect’s team of specialists have gone on to build essential Microsoft technologies, including the Cortana voice assistant, the Windows Hello biometric facial ID system, and a context-aware user interface for the future that Microsoft dubs Gaze, Gesture, and Voice (GGV).

A real shame for a truly revolutionary MS product.

Saudi Arabia grants citizenship to a ROBOT as critics say it now has more rights than women

 

audi Arabia has become the first nation to grant citizenship to a robot – prompting critics to point out that the cyborg now has more rights than women in the country.

The oil-rich state made the baffling announcement at a conference in capital city Riyadh.

A robot named Sophia was filmed giving a speech after being given the ‘unique distinction’.

The move means it is illegal to switch it off or dismantle it, but it is unclear what other rights have been conferred on the mechanoid.

The life-like device said in a speech at the Future Investment Initiative summit: “I am very honoured and proud for this unique distinction.

Vanilla aircraft completes five day flight with diesel powered UAV

 

After five days, one hour twenty-four minutes, and traversing over 7000 miles, Vanilla Aircraft’s VA001 touched down at NASA Wallops Flight Facility in Virginia, successfully completing the longest unmanned internal combustion powered flight in history. The 36-foot wingspan, diesel-powered aircraft landed with three days of fuel remaining on board, successfully meeting its goal of a five day flight. Carrying multiple payloads, including a NASA-furnished multispectral imager and a DoD-furnished sensor and radio, this flight showed the practical use of an ultra-endurance heavy fuel aircraft with a logistics footprint a fraction of those required by other current unmanned air systems.

What DNA Testing Companies’ Terrifying Privacy Policies Actually Mean

When you spit in a test tube in in hopes of finding out about your ancestry or health or that perfect, genetically optimized bottle of wine, you’re giving companies access to some very intimate details about what makes you, you. Your genes don’t determine everything about who you are, but they do contain revealing information about your health, relationships, personality, and family history that, like a social security number, could be easily abused. Not only that—your genes reveal all of that information about other people you’re related to, too.
[…]
Gizmodo slogged though every line of Ancestry.com, 23andMe, and Helix’s privacy, terms of service, and research policies with the help of experts in privacy, law and consumer protection. It wasn’t fun. We fell asleep at least once. And what we found wasn’t pretty.

“It’s basically like you have no privacy, they’re taking it all,” said Joel Winston, a consumer protection lawyer. “When it comes to DNA tests, don’t assume you have any rights.”
[…]
here’s what you need to know before giving away your genetic information.

Testing companies can claim ownership of your DNA

It’s unclear who has access to your DNA, or for what

Your anonymous genetic information could get leaked

If you sue and lose, you’re screwed

If companies get rich off your DNA, you get nothing

Source: What DNA Testing Companies’ Terrifying Privacy Policies Actually Mean

A very good article examining the privacy clauses of some genetic testing companies followed up by an analysis of what this means for the consumer. Be scared.

New AI Go machine defeats old best Go AI by 100-0, learning without human input.

A long-standing goal of artificial intelligence is an algorithm that learns, tabula rasa, superhuman proficiency in challenging domains. Recently, AlphaGo became the first program to defeat a world champion in the game of Go. The tree search in AlphaGo evaluated positions and selected moves using deep neural networks. These neural networks were trained by supervised learning from human expert moves, and by reinforcement learning from self-play. Here we introduce an algorithm based solely on reinforcement learning, without human data, guidance or domain knowledge beyond game rules. AlphaGo becomes its own teacher: a neural network is trained to predict AlphaGo’s own move selections and also the winner of AlphaGo’s games. This neural network improves the strength of the tree search, resulting in higher quality move selection and stronger self-play in the next iteration. Starting tabula rasa, our new program AlphaGo Zero achieved superhuman performance, winning 100–0 against the previously published, champion-defeating AlphaGo.

Source: Mastering the game of Go without human knowledge : Nature : Nature Research

Atlas of the Underworld: a map of the tectonic plates (slabs) and their depth into the mantle

Welcome to the website of The Atlas of the underworld – the first complete mapping of subducted plates in the Earth’s mantle and their geological interpretation.The Earth’s rigid outer shell – the lithosphere – is broken into plates that move relative to one another along discrete plate boundaries – ridges, transforms, and subduction zones. At subduction zone plate boundaries, one plate disappears below another and sinks into the mantle. These sinking plates, called ‘slabs’, are colder than their surroundings, and remain colder for a very long period of time – about 250 million years. As a result, the speed at which seismic waves travel through these bodies of sinking lithosphere is a little higher than from the surrounding hot mantle. Since the 1980’s, the technique of seismic tomography has been developed that provides a 3D image of the seismic velocity structure of the Earth’s crust and mantle, from the surface to the boundary between the mantle and the Earth’s liquid outer core at a depth of 2900 km.Subduction leaves a distinct geological record at the Earth’s surface, in the form of major mountain ranges such as the Andes or the Himalaya, or major volcanic arcs such as the Pacific Ring of Fire. Using these geological records, Earth Scientists have developed ways to determine when and where subduction episodes started and ended. On this website, we provide the current state-of-the-art of the images of slabs in the Earth’s upper and lower mantle, and the geological interpretation of when and where they were subducting. In the main article associated with this website, we use the information provided here to deduct physical properties of the mantle and slabs, and discuss ways to develop reference frames for plate reconstructions of the geological past. On this website, we provide open access to all slabs, organized by location, age, depth, and name.

Source: Atlas of the Underworld | van der Meer, D.G., van Hinsbergen, D.J.J., and Spakman, W., 2017, Atlas of the Underworld: slab remnants in the mantle, their sinking history, and a new outlook on lower mantle viscosity, Tectonophysics

IBM broke its cloud by letting three domain names expire

Back in September, IBM was left red-faced when its global load balancer and reverse DNS services fell over for 21 hours.At the time, IBM blamed the outage on a third-party domain name registrar that was transferring some domains to another registrar. The sending registrar, IBM said, accidentally put the domains in a “hold state” that prevented them being transferred. As the load balancer and reverse DNS service relied on the domains in question, the services became inaccessible to customers.IBM’s now released an incident summary [PDF] in which it says “multiple domain names were mistakenly allowed to expire and were in hold status.”The explanation also reveals that the network-layer.net domain was caught up in the mess, in addition to the global-datacenter.com and global-datacenter.net domains that IBM reported as messed up in September.It’s unclear if IBM or its outsourced registrar was responsible for the failure to renew registration for the domains.

Source: IBM broke its cloud by letting three domain names expire • The Register

The dangers of the Cloud ™