The Linkielist

Linking ideas with the world

Violating a Website’s Terms of Service Is Not a Crime, Federal Court Rules

the federal court of appeals heeded EFF’s advice and rejected an attempt by Oracle to hold a company criminally liable for accessing Oracle’s website in a manner it didn’t like. The court ruled back in 2012 that merely violating a website’s terms of use is not a crime under the federal computer crime statute, the Read more about Violating a Website’s Terms of Service Is Not a Crime, Federal Court Rules[…]

Boffins tweak audio by 0.1% to fool speech recognition engines

a paper by Nicholas Carlini and David Wagner of the University of California Berkeley has explained off a technique to trick speech recognition by changing the source waveform by 0.1 per cent. The pair wrote at arXiv that their attack achieved a first: not merely an attack that made a speech recognition SR engine fail, Read more about Boffins tweak audio by 0.1% to fool speech recognition engines[…]

Nissan’s Car of the Future Will Read Your Brain Waves

The Japanese company will unveil and test its “brain-to-vehicle” technology at next week’s Consumer Electronics Show in Las Vegas. The “B2V” system requires a driver to wear a skullcap that measures brain-wave activity and transmits its readings to steering, acceleration and braking systems that can start responding before the driver initiates the action.The driver still Read more about Nissan’s Car of the Future Will Read Your Brain Waves[…]

Unitek USB 3.0 to SATA Adapter Cable for 2.5″ SSD or HDD – Hard Drive Adapter: turns your hard disk into portable storage

Supports 2.5″ SATA I/II/III hard drive/solid state drive. USB 3.0 supports data transfer speeds up to 5Gbps. Backwards compatible with USB2.0/USB1.0 Efficient UASP Transfer Protocol. An Equipped Cover provides better dust protecting SATA connector from dust. Portable and lightweight design make it is easy to carry. LED light shows Power and Activity status. Support hot Read more about Unitek USB 3.0 to SATA Adapter Cable for 2.5″ SSD or HDD – Hard Drive Adapter: turns your hard disk into portable storage[…]

Man’s YouTube Video of White Noise Hit With Five Copyright Claims

On Thursday, Tomczak tweeted a screenshot of the complaints that have been lodged against his video, “10 Hours of Low Level White Noise.” The clip is exactly what its title advertises, and the absurdity of someone claiming ownership of a bunch of frequencies with equal intensity playing simultaneously—that’s all white noise is—clearly illustrates just how Read more about Man’s YouTube Video of White Noise Hit With Five Copyright Claims[…]

Yahooooo! says! its! email! is! scrahoooo-ed!

Yahoo! Mail – yes, amazingly it is still a thing – is today taking a break from business as usual norms with the service down for almost the past seven hours.Since circa 9am, the email service has received hundreds of complaints an hour on downdetector.co.uk, with users moaning about persistant “error 15” messages, and others Read more about Yahooooo! says! its! email! is! scrahoooo-ed![…]

How a Reddit Email Vulnerability Led to Thousands in Stolen Bitcoin Cash

The exploit allowed hackers to request a password reset for a target account and then click the generated link without opening the email it had been sent in. How was this possible? Theories circulated, buoyed by posts on Hacker Noon and The Next Web. It was the r/bitcoin users out to cause trouble; Or was Read more about How a Reddit Email Vulnerability Led to Thousands in Stolen Bitcoin Cash[…]

This Ex-NSA Hacker Is Building an AI to Find Hate Symbols on Twitter

NEMESIS, according to Crose, can help spot symbols that have been co-opted by hate groups to signal to each other in plain sight. At a glance, the way NEMESIS works is relatively simple. There’s an “inference graph,” which is a mathematical representation of trained images, classified as Nazi or white supremacist symbols. This inference graph Read more about This Ex-NSA Hacker Is Building an AI to Find Hate Symbols on Twitter[…]

Western Digital ‘My Cloud’ devices have a hardcoded backdoor — stop using these NAS drives NOW!

Today, yet another security blunder becomes publicized, and it is really bad. You see, many Western Digital My Cloud NAS drives have a hardcoded backdoor, meaning anyone can access them — your files could be at risk. It isn’t even hard to take advantage of it — the username is “mydlinkBRionyg” and the password is Read more about Western Digital ‘My Cloud’ devices have a hardcoded backdoor — stop using these NAS drives NOW![…]

Rs 500, 10 minutes, and you have access to billion Aadhaar (Indian social security) details

It took just Rs 500, paid through Paytm, and 10 minutes in which an “agent” of the group running the racket created a “gateway” for this correspondent and gave a login ID and password. Lo and behold, you could enter any Aadhaar number in the portal, and instantly get all particulars that an individual may Read more about Rs 500, 10 minutes, and you have access to billion Aadhaar (Indian social security) details[…]

Major Cryptocurrency Index Excludes Korean Prices Without Warning, creates apparent drop in prices

CoinMarketCap, arguably the most prominent global index of cryptocurrency prices, triggered a wave of anxiety and anger this morning when it removed a group of Korean cryptocurency exchanges from its price calculations.Though the change was apparently made at midnight Sunday U.S. EST, CoinMarketCap did not publicize it until midday on Monday, saying that the Korean Read more about Major Cryptocurrency Index Excludes Korean Prices Without Warning, creates apparent drop in prices[…]

Our Solar System is an exception: most planets have more regular spacing and sizing

They found that planets in the same planetary system have correlated sizes. “Each planet is more likely to be the size of its neighbor than a size drawn at random from the distribution of observed planet sizes,” the paper said. If the system contains three or more planets, the planets are also more likely to Read more about Our Solar System is an exception: most planets have more regular spacing and sizing[…]

SteelSeries’ Dual-Sensor Mouse Could Be the King of Precision

The Rival 600 even has its own CPU and storage tucked inside, so that once you get everything configured just the way you like, you can save those settings directly in the mouse, so you won’t need to re-download the SteelSeries app if you play with it on a different machine. Source: SteelSeries’ Dual-Sensor Mouse Read more about SteelSeries’ Dual-Sensor Mouse Could Be the King of Precision[…]

AI System Sorts News Articles By Whether or Not They Contain Actual Information

In a recent paper published in the Journal of Artificial Intelligence Research, computer scientists Ani Nenkova and Yinfei Yang, of Google and the University of Pennsylvania, respectively, describe a new machine learning approach to classifying written journalism according to a formalized idea of “content density.” With an average accuracy of around 80 percent, their system Read more about AI System Sorts News Articles By Whether or Not They Contain Actual Information[…]

When a North Korean Missile Accidentally Hit a North Korean City

What happens when a North Korean ballistic missile test fails in flight and explodes in a populated area? On April 28, 2017, North Korea launched a single Hwasong-12/KN17 intermediate-range ballistic missile (IRBM) from Pukchang Airfield in South Pyongan Province (the Korean People’s Army’s Air and Anti-Air Force Unit 447 in Ryongak-dong, Sunchon City, to be Read more about When a North Korean Missile Accidentally Hit a North Korean City[…]

Rare Malware Targeting Uber’s Android App Uncovered

Malware discovered by Symantec researchers sneakily spoofs Uber’s Android app and harvests users’ passwords, allowing attackers to take over the effected users’ accounts. The malware isn’t widespread, though, and most Uber users are not effected. […] In order to steal a user’s login information, the malware pops up on-screen regularly and prompts the user to Read more about Rare Malware Targeting Uber’s Android App Uncovered[…]

Asus is turning its old routers into mesh Wi-Fi networks

Mesh routers like Eero, Netgear’s Orbi, and Google Wifi are getting all the hype these days, but replacing your whole network with a bunch of new devices can be kind of expensive. Asus has a good solution with its new AiMesh system, which lets you repurpose your existing Asus routers as part of a mesh Read more about Asus is turning its old routers into mesh Wi-Fi networks[…]

Google’s voice-generating AI is now indistinguishable from humans

A research paper published by Google this month—which has not been peer reviewed—details a text-to-speech system called Tacotron 2, which claims near-human accuracy at imitating audio of a person speaking from text. The system is Google’s second official generation of the technology, which consists of two deep neural networks. The first network translates the text Read more about Google’s voice-generating AI is now indistinguishable from humans[…]

Project Maven brings AI to the fight against ISIS

For years, the Defense Department’s most senior leadership has lamented the fact that US military and spy agencies, where artificial intelligence (AI) technology is concerned, lag far behind state-of-the-art commercial technology. Though US companies and universities lead the world in advanced AI research and commercialization, the US military still performs many activities in a style Read more about Project Maven brings AI to the fight against ISIS[…]

Gamers Want DMCA Exemption for ‘Abandoned’ Online Games

Several organizations and gaming fans are asking the Copyright Office to make a DMCA circumvention exemption for abandoned online games, to preserve them for future generations. The exemption would allow museums and libraries to offer copies of abandoned online servers, so these games won’t turn to dust. The U.S. Copyright Office is considering whether or Read more about Gamers Want DMCA Exemption for ‘Abandoned’ Online Games[…]

Edward Snowden’s New App Uses Your Smartphone to Physically Guard Your Laptop

My disk is encrypted, but all it takes to bypass this protection is for an attacker — a malicious hotel housekeeper, or “evil maid,” for example — to spend a few minutes physically tampering with it without my knowledge. If I come back and continue to use my compromised computer, the attacker could gain access Read more about Edward Snowden’s New App Uses Your Smartphone to Physically Guard Your Laptop[…]