Snips – a private, offline voice assistant

Snips is the first Voice Platform where you can build an Voice Assistant that is Private by Design.

Source: Snips — Using Voice to Make Technology Disappear

Which means, unlike Alexa or Google Home, your voice data doesn’t get listened to by the cloud, doesn’t get saved by strangers targetting advertising at you and works when the Cloud ™ goes down.

The homepage

If you don’t want to put together all the bits and bobs (Raspberry Pi, mic, speaker, etc) you can get the Seeed Voice Interaction Development Kit for $115 and satellites (which relay commands to your base kit) for $85,-

The Snips makers page is the starting point to join and see projects

They have an app store with loads of intents pre programmed for you to install

This is a pretty good github page of awesome snips

An example including how to install from base on how to do a multiplication table game

Another example on how to integrate Sonos

The forum

And a telegram page

the Facebook page

It also integrates with home assistant

From Edgar BV Wiki

NSA to release a free reverse engineering tool GHIDRA

The US National Security Agency will release a free reverse engineering tool at the upcoming RSA security conference that will be held at the start of March, in San Francisco.

The software’s name is GHIDRA and in technical terms, is a disassembler, a piece of software that breaks down executable files into assembly code that can then be analyzed by humans.

The NSA developed GHIDRA at the start of the 2000s, and for the past few years, it’s been sharing it with other US government agencies that have cyber teams who need to look at the inner workings of malware strains or suspicious software.

GHIDRA’s existence was never a state secret, but the rest of the world learned about it in March 2017 when WikiLeaks published Vault7, a collection of internal documentation files that were allegedly stolen from the CIA’s internal network. Those documents showed that the CIA was one of the agencies that had access to the tool.

According to these documents, GHIDRA is coded in Java, has a graphical user interface (GUI), and works on Windows, Mac, and Linux.

GHIDRA can also analyze binaries for all major operating systems, such as Windows, Mac, Linux, Android, and iOS, and a modular architecture allows users to add packages in case they need extra features.

According to GHIDRA’s description in the RSA conference session intro, the tool “includes all the features expected in high-end commercial tools, with new and expanded functionality NSA uniquely developed.”

US government workers to whom ZDNet has spoken today said the tool is well-known and liked, and generally used by operators in defensive roles, who normally analyze malware found on government networks.

Some people who know and used the tool and have shared opinions on social media, such as HackerNews, Reddit, and Twitter, have compared GHIDRA with IDA, a well-known reverse engineering tool -but also very expensive, with licenses priced in the range of thousands of dollars.

Most users say that GHIDRA is slower and buggier than IDA, but by open-sourcing it, the NSA will benefit from free maintenance from the open source community, allowing GHIDRA to quickly catch up and maybe surpass IDA.

The news of the NSA open-sourcing one of its internal tools should not surprise you. The NSA has open-sourced all sorts of tools over the past few years, with the most successful of them being Apache NiFi, a project for automating large data transfers between web apps, and which has become a favorite on the cloud computing scene.

In total, the NSA has open-sourced 32 projects as part of its Technology Transfer Program (TTP) so far and has most recently even opened an official GitHub account.

GHIDRA will be demoed at the RSA conference on March 5 and is expected to be released soon after on the agency’s Code page and GitHub account.

Source: NSA to release a free reverse engineering tool | ZDNet

A mathematical approach for understanding intra-plant communication

A team of researchers at the Gran Sasso Science Institute (GSSI) and Istituto Italiano di Technologia (IIT) have devised a mathematical approach for understanding intra-plant communication. In their paper, pre-published on bioRxiv, they propose a fully coupled system of non-linear, non-autonomous discontinuous and ordinary differential equations that can accurately describe the adapting behavior and growth of a single plant, by analyzing the main stimuli affecting plant behavior.

Recent studies have found that rather than being passive organisms, can actually exhibit complex behaviors in response to environmental stimuli, for instance, adapting their resource allocation, foraging strategies, and growth rates according to their surrounding environment. How plants process and manage this network of stimuli, however, is a complex biological question that remains unanswered.

Researchers have proposed several mathematical models to achieve a better understanding of plant behavior. Nonetheless, none of these models can effectively and clearly portray the complexity of the stimulus-signal-behavior chain in the context of a plant’s internal communication network.

Read more at: https://phys.org/news/2019-01-mathematical-approach-intra-plant.html#jCp

Source: A mathematical approach for understanding intra-plant communication

Can’t unlock an Android phone? No problem, just take a Skype call: App allows passcode bypass

A newly disclosed vulnerability in Skype for Android could be exploited by miscreants to bypass an Android phone’s passcode screen to view photos, contacts, and even launch browser windows.

Bug-hunter Florian Kunushevci today told The Register the security flaw, which has been reported to Microsoft, allows the person in possession of someone’s phone to receive a Skype call, answer it without unlocking the handset, and then view photos, look up contacts, send a message, and open the browser by tapping links in a sent message, all without ever unlocking the phone. This is handy for thieves, pranksters, prying partners, and so on. Here’s a video demonstrating the bypass…

Kunushevci, a 19-year-old bug researcher from Kosovo, said he was an everyday user of the Skype for Android app when he noticed that something appeared to be amiss with the way the VoIP app accessed files on the handset. Curious, he decided to put his white hat on, and take a closer look.

Source: Can’t unlock an Android phone? No problem, just take a Skype call: App allows passcode bypass • The Register

Researcher Distributes Tool That Enables Mass-Hijacking of Google Chromecast Devices

Uploaded to Github on Thursday, a tool called Crashcast enables the almost instantaneous takeover all of Chromecast streaming devices left accessible online by mistake. This same misconfiguration issue was taken advantage of by the hacker duo Hacker Giraffe and j3ws3r earlier this week to broadcast a message in support of the YouTube star Felix Kjellberg, more widely known as PewDiePie, to thousands of Chromecast owners.

The prank was intended to draw attention, the hacker said, to the fact that thousands of Chromecast devices globally have been left exposed unnecessarily.

Hacker Giraffe, who not too long ago pulled a similar prank using internet-connected printers, said on Thursday that the backlash caused by the Chromecast high jinks led them to give up hacking. The fear of getting caught and prosecuted, the hacker wrote on Pastebin, was causing “all kinds of fears and panic attacks.”

“I just wanted to inform people of their vulnerable devices while supporting a YouTuber I liked. I never meant any harm, nor did I ever have any ill intentions,” they added.

But now a tool which accomplishes the same feat is accessible to virtually anyone, thanks to Amir Khashayar Mohammadi, a security and freelance researcher. Mohammadi tells Gizmodo, however, that the tool he’s released is merely a proof-of-concept uploaded to further research into the problem, and is not intended for people to use maliciously.

Crashcast shown preparing to broadcast a YouTube video to 176,642 Chromecast devices.

Luckily, the problem is a fairly benign one. The tool doesn’t allow for remote code execution, so forcing the device to play random YouTube videos is about all that can be accomplished. “You’re not necessarily hacking anything here,” says Mohammadi, who blogs and publishes papers on the website Spuz.me. “All you’re doing is issuing a cURL command which in this case tells the Chromecast to view a video.”

“There is no authentication or bypass, you’re actually doing what the Chromecast is intended to do, except the reason this works is because they’re all being exposed to the internet,” he continued, adding: “I mean honestly, why would anyone leave their Chromecast on the internet? It makes no sense. You’re literally asking for it.”

Source: Researcher Distributes Tool That Enables Mass-Hijacking of Google Chromecast Devices

Scientists Have ‘Hacked Photosynthesis’ In Search Of More Productive Crops: 40% bigger, growing faster

There’s a big molecule, a protein, inside the leaves of most plants. It’s called Rubisco, which is short for an actual chemical name that’s very long and hard to remember.

Amanda Cavanagh, a biologist and post-doctoral researcher at the University of Illinois, calls herself a big fan of Rubisco. “It’s probably the most abundant protein in the world,” she says. It’s also super-important.

Scientist Amanda Cavanagh snap freezes plant samples with liquid nitrogen to study how the metabolism differs between unmodified plants and plants engineered with alternate pathways for photorespiration.

Claire Benjamin/RIPE Project

Rubisco has one job. It picks up carbon dioxide from the air, and it uses the carbon to make sugar molecules. It gets the energy to do this from the sun. This is photosynthesis, the process by which plants use sunlight to make food, a foundation of life on Earth. Yay for Rubisco!

“But it has what we like to call one fatal flaw,” Cavanagh continues. Unfortunately, Rubisco isn’t picky enough about what it grabs from the air. It also picks up oxygen. “When it does that, it makes a toxic compound, so the plant has to detoxify it.”

Plants have a whole complicated chemical assembly line to carry out this detoxification, and the process uses up a lot of energy. This means the plant has less energy for making leaves, or food for us. (There is a family of plants, including corn and sugar cane, that developed another type of workaround for Rubisco, and those plants are much more productive.)

Cavanagh and her colleagues in a research program called Realizing Increased Photosynthetic Efficiency (RIPE), which is based at the University of Illinois, have spent the last five years trying to fix Rubisco’s problem. “We’re sort of hacking photosynthesis,” she says.

They experimented with tobacco plants, just because tobacco is easy to work with. They inserted some new genes into these plants, which shut down the existing detoxification assembly line and set up a new one that’s way more efficient. And they created super tobacco plants. “They grew faster, and they grew up to 40 percent bigger” than normal tobacco plants, Cavanagh says. These measurements were done both in greenhouses and open-air field plots.

Source: Scientists Have ‘Hacked Photosynthesis’ In Search Of More Productive Crops : The Salt : NPR

Once considered outlandish, the idea that plants help their relatives is taking root

For people, and many other animals, family matters. Consider how many jobs go to relatives. Or how an ant will ruthlessly attack intruder ants but rescue injured, closely related nestmates. There are good evolutionary reasons to aid relatives, after all. Now, it seems, family feelings may stir in plants as well.

A Canadian biologist planted the seed of the idea more than a decade ago, but many plant biologists regarded it as heretical—plants lack the nervous systems that enable animals to recognize kin, so how can they know their relatives? But with a series of recent findings, the notion that plants really do care for their most genetically close peers—in a quiet, plant-y way—is taking root. Some species constrain how far their roots spread, others change how many flowers they produce, and a few tilt or shift their leaves to minimize shading of neighboring plants, favoring related individuals.

“We need to recognize that plants not only sense whether it’s light or dark or if they’ve been touched, but also whom they are interacting with,” says Susan Dudley, a plant evolutionary ecologist at McMaster University in Hamilton, Canada, whose early plant kin recognition studies sparked the interest of many scientists.

Beyond broadening views of plant behavior, the new work may have a practical side. In September 2018, a team in China reported that rice planted with kin grows better, a finding that suggested family ties can be exploited to improve crop yields. “It seems anytime anyone looks for it, they find a kin effect,” says André Kessler, a chemical ecologist at Cornell University.

Source: Once considered outlandish, the idea that plants help their relatives is taking root | Science | AAAS

German Politicians Hit With Unprecedented Leak of Private Information

On Thursday, authorities in Germany were made aware of an enormous leak of personal information belonging to artists, media figures, and politicians—including Chancellor Angela Merkel. The hack is being called the “biggest data dump” in German history and appears to contain a treasure trove of information that could be used for identity theft.

Early reports and tweets identified the source of the leak as a now-suspended Twitter account with the handle “@_0rbit” and username “G0d.” According to multiple reports, the account began posting the data in December, Advent-calender-style. The astounding collection of stolen information reportedly includes email addresses, documents, private correspondence, credit card information, passwords, family information, and even photocopies of personal ID cards. The victims included the members of virtually every political party in German Parliament, TV journalists, musicians, and YouTube stars.

While the Twitter account and an associated Blogspot have been removed, the information was still relatively easy to track down. One security researcher on Twitter noted that this dump was incredibly labor intensive with hundreds of mirror links ensuring the information would be difficult to take down. At least one link that Gizmodo viewed on Imgur disappeared a few minutes later.

[…]

One good thing that could come out of this mess is, politicians have begun to call for stronger data protection and security measures in Germany. Britta Haßelmann, the parliamentary executive director of the Greens, released a statement asking for proactive measures that include “a renunciation of state-run security with vulnerabilities, end-to-end encryption and the strengthening of independent supervisory structures.”

Source: German Politicians Hit With Unprecedented Leak of Private Information

And suddenly they sit up and notice when it affects them personally

Ethereum Plans To Cut Its Absurd Energy Consumption By 99 Percent

Ethereum mining consumes a quarter to half of what Bitcoin mining does, but that still means that for most of 2018 it was using roughly as much electricity as Iceland. Indeed, the typical Ethereum transaction gobbles more power than an average U.S. household uses in a day. “That’s just a huge waste of resources, even if you don’t believe that pollution and carbon dioxide are an issue. There are real consumers — real people — whose need for electricity is being displaced by this stuff,” says Vitalik Buterin, the 24-year-old Russian-Canadian computer scientist who invented Ethereum when he was just 18.

Buterin plans to finally start undoing his brainchild’s energy waste in 2019. This year Buterin, the Ethereum Foundation he cofounded, and the broader open-source movement advancing the cryptocurrency all plan to field-test a long-promised overhaul of Ethereum’s code. If these developers are right, by the end of 2019 Ethereum’s new code could complete transactions using just 1 percent of the energy consumed today.

Source: Ethereum Plans To Cut Its Absurd Energy Consumption By 99 Percent – Slashdot

Lawsuit Accuses Weather Channel App of Misleading Users and Profiting From Their Location Data – anyone surprised much?

More than a couple weather apps have recently come under fire for their handling of user data, either by collecting too much or allegedly tracking users without their permission. Now, the maker of yet another popular weather app is being accused by the city attorney of Los Angeles of deceiving millions of users and profiting from their location data.

The lawsuit was filed Thursday, according to the New York Times, which has been reporting on the app’s alleged misdeeds. As part of a larger investigation last month into the practice of companies tracking user location data for profit, the Times reported that the Weather Channel app—part of the Weather Company, which was acquired by IBM in 2015—didn’t “explicitly disclose that the company had also analyzed the data for hedge funds.” While the app did disclose how some user data would be used in its privacy policy and privacy settings, it did not alert users in a prompt used to gain access to their location data.

“For years, TWC has deceptively used its Weather Channel App to amass its users’ private, personal geolocation data—tracking minute details about its users’ locations throughout the day and night, all the while leading users to believe that their data will only be used to provide them with ‘personalized local weather data, alerts and forecasts,’” the lawsuit states. “TWC has then profited from that data, using it and monetizing it for purposes entirely unrelated to weather or the Weather Channel App.”

Source: Lawsuit Accuses Weather Channel App of Misleading Users and Profiting From Their Location Data

Your Cash Is No Good Here. Literally. – So how to pay if you don’t like plastic: which helps the banks but not your spending patterns

As more retailers—including Drybar and Sweetgreen—ban paper money, it’s making things awkward for customers without plastic. [paywalled]

Source: Your Cash Is No Good Here. Literally. – WSJ

 

Oh dear, not accepting money – when the pain signals in your brain are not set off by clicking a bank pass, but are when you have to pay cash. Don’t be fooled people: cash is central to what money is – for the whole economy, but also for you as a person. See what happens when people with trillions start chucking it about (because what does that amount really mean, anyway!?) or the personal debt people spending on credit build up.

AI learns to Navigate the Web, fill in forms – without a human built training set

Learning in environments with large state and action spaces, and sparse rewards, can hinder a Reinforcement Learning (RL) agent’s learning through trial-and-error. For instance, following natural language instructions on the Web (such as booking a flight ticket) leads to RL settings where input vocabulary and number of actionable elements on a page can grow very large. Even though recent approaches improve the success rate on relatively simple environments with the help of human demonstrations to guide the exploration, they still fail in environments where the set of possible instructions can reach millions. We approach the aforementioned problems from a different perspective and propose guided RL approaches that can generate unbounded amount of experience for an agent to learn from. Instead of learning from a complicated instruction with a large vocabulary, we decompose it into multiple sub-instructions and schedule a curriculum in which an agent is tasked with a gradually increasing subset of these relatively easier sub-instructions. In addition, when the expert demonstrations are not available, we propose a novel meta-learning framework that generates new instruction following tasks and trains the agent more effectively. We train DQN, deep reinforcement learning agent, with Q-value function approximated with a novel QWeb neural network architecture on these smaller, synthetic instructions. We evaluate the ability of our agent to generalize to new instructions on World of Bits benchmark, on forms with up to 100 elements, supporting 14 million possible instructions. The QWeb agent outperforms the baseline without using any human demonstration achieving 100% success rate on several difficult environments.

Source: [1812.09195] Learning to Navigate the Web

AI Automatically Sorts Cancer Cells to determine most effective treatment

A team of researchers in Japan have devised an artificial intelligence (AI) system that can identify different types of cancer cells using microscopy images. Their method can also be used to determine whether the cancer cells are sensitive to radiotherapy. The researchers reported their findings in the journal Cancer Research. In cancer patients, there can be tremendous variation in the types of cancer cells in a single tumor. Identifying the specific cell types present in tumors can be very useful when choosing the most effective treatment. However, making accurate assessments of cell types is time consuming and often hampered by human error and the limits of human sight. To overcome these challenges, scientists led by Professor Hideshi Ishii of Osaka University, Japan, have developed an AI system that can identify different types of cancer cells from microscopy images, achieving higher accuracy than human judgement. The system is based on a convolutional neural network, a form of AI modeled on the human visual system. “We first trained our system on 8,000 images of cells obtained from a phase-contrast microscope,” said corresponding author Ishii. “We then tested [the AI system’s] accuracy on another 2,000 images and showed that it had learned the features that distinguish mouse cancer cells from human ones, and radioresistant cancer cells from radiosensitive ones.” The researchers noted that the automation and high accuracy of their system could be very useful for determining exactly which cells are present in a tumor or circulating in the body. Knowing whether or not radioresistant cells are present is vital when deciding whether radiotherapy would be effective. Furthermore, the same procedure can be applied post-treatment to assess patient outcomes. In the future, the team hopes to train the system on more cancer cell types, with the eventual goal of establishing a universal system that can automatically identify and distinguish all variants of cancer cells. The article can be found at: Toratani et al. (2018) A Convolutional Neural Network Uses Microscopic Images to Differentiate between Mouse and Human Cell Lines and Their Radioresistant Clones. Read more from Asian Scientist Magazine at: https://www.asianscientist.com/2018/12/in-the-lab/artificial-intelligence-microscopy-cancer-cell-radiotherapy/

Source: AI Automatically Sorts Cancer Cells | Asian Scientist Magazine | Science, technology and medical news updates from Asia

This Roomba can create its own Doom levels

Game developer and designer Rich Whitehouse gave the world an unusual present this Christmas Eve. It’s called Doomba, and it uses the popular Roomba vacuuming robots to create levels for Doom, the classic first-person shooter.

Whitehouse is a 20-year veteran of the game industry, with credits on titles such as the original Prey and Star Wars Jedi Knight 2: Jedi Outcast. Along the way, he also built a tool called Neosis, which helps game developers and designers move digital assets between different platforms. The Doomba module works on similar principles; it just takes the digital maps created by the Roomba’s own internal software and converts them into Doom levels.

So what’s your Roomba doing creating maps of the inside of your house? Many of iRobot’s modern robotic vacuums rely on VSLAM, also known as visual simultaneous localization and mapping. Rather than wandering around like slow-moving ping-pong balls, modern Roomba devices methodically sweep back and forth in long passes like they’re mowing your lawn. That makes them much more efficient than previous models.

To do the work, some Roombas use a creepy little electronic eyeball to create detailed maps of your home. Doomba takes that map and makes it into a level of Hell.

As Whitehouse explains, it was fairly short work to turn his creation toward evil.

“I soon realized that there was a clear opportunity to serve the Dark Lord by conceiving a plethora of unholy algorithms in service to one of the finest works ever created in his name,” Whitehouse writes on his personal blog. “Simultaneously, I would be able to unleash a truly terrible pun to plague humankind. Now, the fruit of my labor is born. I bring forth DOOMBA, a half-goat, half-script creature, with native binary backing for the expensive parts, to be offered in place of my firstborn on this fine Christmas Eve.”

Source: This Roomba can create its own Doom levels – Polygon

In Blow to Amazon and Walmart, India Bans a Key Part of Their Business Strategy

The Indian government sent a strong screw you to Amazon and the Walmart-owned Flipkart on Wednesday, banning e-commerce companies from selling products from companies that they have an equity interest in or “entering into exclusive agreements with sellers,” CNBC reported.

India already bans e-commerce sites from selling products directly, per the New York Times, which has led to them acquiring stakes in affiliate companies that serve much the same purpose at arm’s length. At issue is the power of e-commerce companies to make bulk purchases of goods that they then sell to “select sellers, such as their affiliates or other companies with which they have agreements,” CNBC wrote. The strategy allows giants like Amazon to offer products at low prices that smaller competitors often find hard to match.

In a statement to CNBC, India’s commerce ministry said the new rules would go into effect on Feb. 1, 2019, adding the new rules specify that: “An entity having equity participation by e-commerce marketplace entity or its group companies, or having control on its inventory by e-commerce marketplace entity or its group companies, will not be permitted to sell its products on the platform run by such marketplace entity.”

The move could mean Amazon would be forced “to stop competing with independent sellers and end its offerings of proprietary products like its Echo smart speakers in India, its top emerging market,” the Times wrote. It’s also a blow to Walmart, which bought a 77 percent stake in Flipkart for $16 billion this year, and may be forced to stop selling products produced by companies it owns. As the paper noted, both companies’ competitive strategies rely on highly efficient supply chains and pressuring retailers to comply with their requirements, so this is not a good sign for their Indian ambitions.

The Times wrote that the decision appears to have been motivated by concerns from India’s prime minister, right-wing populist culture warrior Narendra Modi, that his party is losing ground ahead of upcoming elections:

Prime Minister Narendra Modi of India initially courted foreign companies to invest more in the country after his 2014 election victory, but his administration has turned protectionist as his party’s re-election prospects have dimmed in recent months. Mr. Modi has increasingly sought to bolster Indian firms and curb foreign ones through new policies, including one that requires foreign companies like Visa, Mastercard and American Express to store all data about Indians on computers inside the country. The government has also declared its intention to impose tough new rules on the technology industry.

According to CNBC, beneficiaries of the move will likely include owners of small businesses like farms and corner stores, the latter of which “dominate Indian retailing,” who believe that U.S.-based tech giants are trying to undermine their economic position. The site added that the Confederation of All India Traders issued a statement saying that tech giants will no longer to be able to commit “malpractices, predatory pricing policies and deep discounting.”

However, the law was vaguely written and contains some sections that appear to contradict each other, lawyer Salman Waris of New Delhi’s TechLegis told the Times, which means that its ultimate impact remains unclear. The paper also noted that Amazon is well-known for navigating Indian law to remain in compliance without losing its ability to steer markets, though Walmart’s decision to acquire Flipkart has already been questioned by analysts as a potentially unwise financial move.

Source: In Blow to Amazon and Walmart, India Bans a Key Part of Their Business Strategy

It is way beyond time to start breaking up the monopolies and 0.00000001%ers. Way to go, India!

Mapping All of the Trees with Machine Learning

Much fuss has been made over city trees in recent years. Urban trees reduce crime and help stormwater management (yay!). Cities and towns across the U.S. are losing 36 million trees a year (boo!). But, hold up—climate change is accelerating the growth of urban trees in metropolises worldwide (boo/yay?). Urban trees are under such scrutiny right now that the U.N. even had a World Forum on Urban Forests a few weeks ago to discuss the planning, design and management of urban forests and green infrastructure.

The Descartes Labs tree canopy layer around the Baltimore Beltway. Treeless main roads radiate from the dense pavement of the city to leafy suburbs.

All this fuss is not without good reason. Trees are great! They make oxygen for breathing, suck up CO₂, provide shade, reduce noise pollution, and just look at them — they’re beautiful!

[…]

So Descartes Labs built a machine learning model to identify tree canopy using a combination of lidar, aerial imagery and satellite imagery. Here’s the area surrounding the Boston Common, for example. We clearly see that the Public Garden, Common and Commonwealth Avenue all have lots of trees. But we also see some other fun artifacts. The trees in front of the CVS in Downtown Crossing, for instance, might seem inconsequential to a passer-by, but they’re one of the biggest concentrations of trees in the neighborhood.

[…]

The classifier can be run over any location in the world where we have approximately 1-meter resolution imagery. When using NAIP imagery, for instance, the resolution of the tree canopy map is as high as 60cm. Drone imagery would obviously yield an even higher resolution.

Washington, D.C. tree canopy created with NAIP source imagery shown at different scales—all the way down to individual “TREES!” on The Ellipse.

The ability to map tree canopy at a such a high resolution in areas that can’t be easily reached on foot would be helpful for utility companies to pinpoint encroachment issues—or for municipalities to find possible trouble spots beyond their official tree census (if they even have one). But by zooming out to a city level, patterns in the tree canopy show off urban greenspace quirks. For example, unexpected tree deserts can be identified and neighborhoods that would most benefit from a surge of saplings revealed.

Source: Mapping All of the Trees with Machine Learning – Tim Wallace – Medium

The Amazon Alexa Eavesdropping Nightmare Came True: Creepy Recordings sent to random stranger

An Amazon user in Germany recently requested data about his personal activities and inadvertently gained access to 1,700 audio recordings of someone he didn’t know.

Germany’s c’t magazine reports that in August the Amazon user—exercising his rights under the EU’s General Data Protection Regulation—requested his own data that Amazon has stored. Two months later, Amazon sent him a downloadable 100Mb zip file.

Some of the files reportedly related to his Amazon searches. But according to the report there were also hundreds of Wav files and a PDF cataloging transcripts of Alexa’s interpretations of voice commands. According to c’t magazine, this was peculiar to this user because he doesn’t own any Alexa devices and had never used the service. He also didn’t recognize the voices in the files.

The user reported the matter to Amazon and asked for information. He reportedly didn’t receive a response, but soon found that the link to the data was dead. However, he had already saved the files, and he shared his experience with c’t magazine out of concern that the person whose privacy had been compromised was not told about the mistake.

C’t magazine listened to many of the files and was able “to piece together a detailed picture of the customer concerned and his personal habits.” It found that he used Alexa in various places, has an Echo at home, and has a Fire device on his TV. They noticed that a woman was around at times. They listened to him in the shower.

We were able to navigate around a complete stranger’s private life without his knowledge, and the immoral, almost voyeuristic nature of what we were doing got our hair standing on end. The alarms, Spotify commands, and public transport inquiries included in the data revealed a lot about the victims’ personal habits, their jobs, and their taste in music. Using these files, it was fairly easy to identify the person involved and his female companion. Weather queries, first names, and even someone’s last name enabled us to quickly zero in on his circle of friends. Public data from Facebook and Twitter rounded out the picture.

Using the information they gathered from the recordings, the magazine contacted the victim of the data leak. He “was audibly shocked,” and confirmed it was him in the recordings and that the outlet had figured out the identity of his girlfriend. He said Amazon did not contact him.

Days later, both the victim and the receiver of the files were called by Amazon to discuss the incident. Both were reportedly called three days after c’t magazine contacted Amazon about the matter. An Amazon representative reportedly told them that one of their staff members had made a one-time error.

When asked for comment on the matter, Amazon sent Gizmodo the same statement it had shared with Reuters. “This was an unfortunate case of human error and an isolated incident. We have resolved the issue with the two customers involved and have taken steps to further improve our processes. We were also in touch on a precautionary basis with the relevant regulatory authorities.”

Amazon did not answer Gizmodo’s questions about how a human error led to this privacy infringement, or whether the company had initially contacted the victim to inform them their sensitive information was shared with a stranger.

Source: The Amazon Alexa Eavesdropping Nightmare Came True

Breakthrough ultrasound treatment to reverse dementia moves to human trials

An extraordinarily promising new technique using ultrasound to clear the toxic protein clumps thought to cause dementia and Alzheimer’s disease is moving to the first phase of human trials next year. The innovative treatment has proven successful across several animal tests and presents an exciting, drug-free way to potentially battle dementia.

The ultrasound treatment was first developed back in 2015 at the University of Queensland. The initial research was working to find a way to use ultrasound to temporarily open the blood-brain barrier with the goal of helping dementia-battling antibodies better reach their target in the brain. However, early experiments with mice surprisingly revealed the targeted ultrasound waves worked to clear toxic amyloid protein plaques from the brain without any additional therapeutic drugs.

“The ultrasound waves oscillate tremendously quickly, activating microglial cells that digest and remove the amyloid plaques that destroy brain synapses,” explained Jürgen Götz, one of the researchers on the project back in 2015. “The word ‘breakthrough’ is often mis-used, but in this case I think this really does fundamentally change our understanding of how to treat this disease, and I foresee a great future for this approach.”

Source: Breakthrough ultrasound treatment to reverse dementia moves to human trials

At Blind – a whistleblower site -, a security lapse revealed private complaints from Silicon Valley employees. Turns out it’s not very safe to blow your whistle there after all.

Thousands of people trusted Blind, an app-based “anonymous social network,” as a safe way to reveal malfeasance, wrongdoing and improper conduct at their companies.But Blind left one of its database servers exposed without a password, making it possible (for anyone who knew where to look) to access each user’s account information and identify would-be whistleblowers.

[…]

The exposed server was found by a security researcher, who goes by the name Mossab H, who informed the company of the security lapse. The security researcher found one of the company’s Kibana dashboards for its backend ElasticSearch database, which contained several tables, including private messaging data and web-based content, for both of its U.S. and Korean sites. Blind said the exposure only affects users who signed up or logged in between November 1 and December 19, and that the exposure relates to “a single server, one among many servers on our platform,” according to Blind executive Kyum Kim in an email.

Blind only pulled the database after TechCrunch followed up by email a week later. The company began emailing its users on Thursday after we asked for comment.

“While developing an internal tool to improve our service for our users, we became aware of an error that exposed user data,” the email to affected users said.

Kim said there is “no evidence” that the database was misappropriated or misused, but did not say how it came to that conclusion. When asked, the company would not say if it will notify U.S. state regulators of the breach.

[…]

At its core, the app and anonymous social network allows users to sign up using their corporate email address, which is said to be linked only to Blind’s member ID. Email addresses are “only used for verification” to allow users to talk to other anonymous people in their company, and the company claims that email addresses aren’t stored on its servers.

But after reviewing a portion of the exposed data, some of the company’s claims do not stand up.

We found that the database provided a real-time stream of user logins, user posts, comments and other interactions, allowing anyone to read private comments and posts. The database also revealed the unencrypted private messages between members but not their associated email addresses. (Given the high sensitivity of the data and the privacy of the affected users, we’re not posting data, screenshots or specifics of user content.)

Blind claims on its website that its email verification “is safe, as our patented infrastructure is set up so that all user account and activity information is completely disconnected from the email verification process.” It adds: “This effectively means there is no way to trace back your activity on Blind to an email address, because even we can’t do it.” Blind claims that the database “does not show any mapping of email addresses to nicknames,” but we found streams of email addresses associated with members who had not yet posted. In our brief review, we didn’t find any content, such as comments or messages, linked to email addresses, just a unique member ID, which could identify a user who posts in the future.

Many records did, however, contain plain text email addresses. When other records didn’t store an email address, the record contained the user’s email as an unrecognized encrypted hash — which may be decipherable to Blind employees, but not to anyone else.

The database also contained passwords, which were stored as an MD5 hash, a long-outdated algorithm that is nowadays easy to crack. Many of the passwords were quickly unscrambled using readily available tools when we tried. Kim denied this. “We don’t use MD5 for our passwords to store them,” he said. “The MD5 keys were a log and it does not represent how we are managing data. We use more advanced methods like salted hash and SHA2 on securing users’ data in our database.” (Logging in with an email address and unscrambled password would be unlawful, therefore we cannot verify this claim.) That may pose a risk to employees who use the same password on the app as they do to log in to their corporate accounts.

Despite the company’s apparent efforts to disassociate email addresses from its platform, login records in the database also stored user account access tokens — the same kind of tokens that recently put Microsoft and Facebook accounts at risk. If a malicious actor took and used a token, they could log in as that user — effectively removing any anonymity they might have had from the database in the first place.

As well-intentioned as the app may be, the database exposure puts users — who trusted the app to keep their information safe and their identities anonymous — at risk.

These aren’t just users, but also employees of some of the largest companies in Silicon Valley, who post about sexual harassment in the workplace and discussing job offers and workplace culture. Many of those who signed up in the past month include senior executives at major tech companies but don’t realize that their email address — which identifies them — could be sitting plain text in an exposed database. Some users sent anonymous, private messages, in some cases made serious allegations against their colleagues or their managers, while others expressed concern that their employers were monitoring their emails for Blind sign-up emails.

Yet, it likely escaped many that the app they were using — often for relief, for empathy or as a way to disclose wrongdoing — was almost entirely unencrypted and could be accessed, not only by the app’s employees but also for a time anyone on the internet.

Source: At Blind, a security lapse revealed private complaints from Silicon Valley employees | TechCrunch

New Photo Wake-Up System Turns Still Images Into 3D animations

The system, called Photo Wake-Up, creates a 3D animation from a single photo. In the paper, the researchers compare it to the moving portraits at Hogwarts, a fictitious part of the Harry Potter world that a number of tech companies have tried to recreate. Previous attempts have been mildly successful, but this system is impressive in its ability to isolate and create a pretty realistic 3D animation from a single image.

The researchers tested the system on 70 different photos they downloaded online, which included pictures of Stephen Curry, the anime character Goku, a Banksy artwork, and a Picasso painting. The team used a program called SMPL and deep learning, starting with a 2D cutout of the subject and then superimposing a 3D skeleton onto it. “Our key technical contribution, then, is a method for constructing an animatable 3D model that matches the silhouette in a single photo,” the team told MIT Technology Review.

The team reportedly used a warping algorithm to ensure the cutout and the skeleton were aligned. The team’s algorithm is also reportedly able to detect the direction a subject is looking and the way their head is angled. What’s more, in order to make sure the final animation is realistic and precise, the team used a proprietary user interface to correct for any errors and help with the animation’s texturing. An algorithm then isolates the subject from the 2D image, fills in the remaining space, and animates the subject.

Source: New Photo Wake-Up System Turns Still Images Into 3D animations

An Amoeba-Based Computer Calculated Approximate Solutions to an 8 city Travelling Salesman Problem

A team of Japanese researchers from Keio University in Tokyo have demonstrated that an amoeba is capable of generating approximate solutions to a remarkably difficult math problem known as the “traveling salesman problem.”

The traveling salesman problem goes like this: Given an arbitrary number of cities and the distances between them, what is the shortest route a salesman can take that visits each city and returns to the salesman’s city of origin. It is a classic problem in computer science and is used as a benchmark test for optimization algorithms.

The traveling salesman problem is considered “NP hard,” which means that the complexity of calculating a correct solution increases exponentially the more cities are added to the problem. For example, there are only three possible solutions if there are four cities, but there are 360 possible solutions if there are six cities. It continues to increase exponentially from there.

Despite the exponential increase in computational difficulty with each city added to the salesman’s itinerary, computer scientists have been able to calculate the optimal solution to this problem for thousands of cities since the early 90s and recent efforts have been able to calculate nearly optimal solutions for millions of cities.

Amoebas are single-celled organisms without anything remotely resembling a central nervous system, which makes them seem like less than suitable candidates for solving such a complex puzzle. Yet as these Japanese researchers demonstrated, a certain type of amoeba can be used to calculate nearly optimal solutions to the traveling salesman problem for up to eight cities. Even more remarkably, the amount of time it takes the amoeba to reach these nearly optimal solutions grows linearly, even though the number of possible solutions increases exponentially.

As detailed in a paper published this week in Royal Society Open Science, the amoeba used by the researchers is called Physarum polycephalum, which has been used as a biological computer in several other experiments. The reason this amoeba is considered especially useful in biological computing is because it can extend various regions of its body to find the most efficient way to a food source and hates light.

To turn this natural feeding mechanism into a computer, the Japanese researcher placed the amoeba on a special plate that had 64 channels that it could extend its body into. This plate is then placed on top of a nutrient rich medium. The amoeba tries to extend its body to cover as much of the plate as possible and soak up the nutrients. Yet each channel in the plate can be illuminated, which causes the light-averse amoeba to retract from that channel.

To model the traveling salesman problem, each of the 64 channels on the plate was assigned a city code between A and H, in addition to a number from 1 to 8 that indicates the order of the cities. So, for example, if the amoeba extended its body into the channels A3, B2, C4, and D1, the correct solution to the traveling salesman problem would be D, B, A, C, D. The reason for this is that D1 indicates that D should be the first city in the salesman’s itinerary, B2 indicates B should be the second city, A3 that A should be the third city and so on.

To guide the amoeba toward a solution to the traveling salesman problem, the researchers used a neural network that would incorporate data about the amoeba’s current position and distance between the cities to light up certain channels. The neural network was designed such that cities with greater distances between them are more likely to be illuminated than channels that are not.

When the algorithm manipulates the chip that the amoeba is on it is basically coaxing it into taking forms that represent approximate solutions to the traveling salesman problem. As the researchers told Phys.org, they expect that it would be possible to manufacture chips that contain tens of thousands of channels so that the amoeba is able to solve traveling salesman problems that involve hundreds of cities.

For now, however, the Japanese researchers’ experiment remains in the lab, but it provides the foundation for low-energy biological computers that harness the natural mechanisms of amoebas and other microorganisms to compute.

Source: An Amoeba-Based Computer Calculated Approximate Solutions to a Very Hard Math Problem – Motherboard

FCC fines Swarm $900,000 for unauthorized satellite launch

Swarm Technologies Inc will pay a $900,000 fine for launching and operating four small experimental communications satellites that risked “satellite collisions” and threatened “critical commercial and government satellite operations,” the Federal Communications Commission said on Thursday.

The Federal Communications Commission (FCC) logo is seen before the FCC Net Neutrality hearing in Washington February 26, 2015. REUTERS/Yuri Gripas

The California-based start-up founded by former Google and Apple engineers in 2016 also agreed to enhanced FCC oversight and a requirement of pre-launch notices to the FCC for three years.

Swarm launched the satellites in India last January after the FCC rejected its application to deploy and operate them, citing concerns about the company’s tracking ability.

It said Swarm had unlawfully transmitted signals between earth stations in the state of Georgia and the satellites for over a week. The investigation also found that Swarm performed unauthorized weather balloon-to-ground station tests and other unauthorized equipment tests prior to the satellites’ launch.

Swarm aims to provide low-cost space-based internet service and plans eventually to use a constellation of 100 satellites.

Swarm won permission in August from the FCC to reactivate the satellites and said then it is “fully committed to complying with all regulations and has been working closely with the FCC,” noting that its satellites are “100 percent trackable.”

Source: FCC fines Swarm $900,000 for unauthorized satellite launch | Reuters

EU Diplomatic Comms Network, Which the NSA Reportedly Warned Could Be Easily Hacked, Was Hacked. But contents were boring.

The European Union’s network used for diplomatic communications, COREU, was infiltrated “for years” by hackers, the New York Times reported on Tuesday, with the unknown rogues behind the attack reportedly reposting the stolen communiqués to an “open internet site.”

The network in question connects EU leadership with other EU organizations, as well as the foreign ministries of member states. According to the Times, the attack was first discovered by security firm Area 1, which provided a bit more than 1,100 of the cables to the paper for examination. Some of the documents show unease over Donald Trump’s presidency and his relationship with the Russian government, while others contain tidbits such as Chinese President Xi Jinping’s feelings about the U.S.’s brimming trade war with his country and rumors about nuclear weapons deployment on the Crimean peninsula:

In one cable, European diplomats described a meeting between President Trump and President Vladimir V. Putin of Russia in Helsinki, Finland, as “successful (at least for Putin).”

Another cable, written after a July 16 meeting, relayed a detailed report and analysis of a discussion between European officials and President Xi Jinping of China, who was quoted comparing Mr. Trump’s “bullying” of Beijing to a “no-rules freestyle boxing match” … The cables include extensive reports by European diplomats of Russia’s moves to undermine Ukraine, including a warning on Feb. 8 that Crimea, which Moscow annexed four years ago, had been turned into a “hot zone where nuclear warheads might have already been deployed.”

Hackers were able to breach COREU after a phishing campaign aimed at officials in Cyprus gave them access to passwords that compromised the whole network, Area 1 chief executive Oren Falkowitz told the Times. An anonymous official at the U.S.’s National Security Agency added that the agency had warned the EU had received numerous warnings that the aging system could easily be infiltrated by malicious parties.

[…]

Fortunately for the EU, the Times wrote, the stolen information is primarily “low-level classified documents that were labeled limited and restricted,” while more sensitive communiqués were sent via a separate system (EC3IS) that European officials said is being upgraded and replaced. Additionally, although the documents were uploaded to an “open internet site,” the hackers apparently made no effort to publicize them, the paper added.

Source: EU Diplomatic Comms Network, Which the NSA Reportedly Warned Could Be Easily Hacked, Was Hacked

This AI Just Mapped Every Solar Panel in the United States

n some states, solar energy accounts for upwards of 10 percent of total electricity generation. It’s definitely a source of power that’s on the rise, whether it be to lessen our dependence on fossil fuels, nuclear power, or the energy grid, or simply to take advantage of the low costs. This form of energy, however, is highly decentralized, so it’s tough to know how much solar energy is being extracted, where, and by whom.

[…]

The system developed by Rajagopal, along with his colleagues Jiafan Yu and Zhecheng Wang, is called DeepSolar, and it’s an automated process whereby hi-res satellite photos are analyzed by an algorithm driven by machine learning. DeepSolar can identify solar panels, register their locations, and calculate their size. The system identified 1.47 million individual solar installations across the United States, whether they be small rooftop configurations, solar farms, or utility-scale systems. This exceeds the previous estimate of 1.02 million installations. The researchers have made this data available at an open-source website.

By using this new approach, the researchers were able to accurately scan billions of tiles of high-resolution satellite imagery covering the continental U.S., allowing them to classify and measure the size of solar systems in a few weeks rather than years, as per previous methods. Importantly, DeepSolar requires minimal human supervision.

DeepSolar map of solar panel usage across the United States.
Image: Deep Solar/Stanford University

“The algorithm breaks satellite images into tiles. Each tile is processed by a deep neural net to produce a classification for each pixel in a tile. These classifications are combined together to detect if a system—or part of—is present in the tile,” Rajagopal told Gizmodo.

The neural net can then determine which tile is a solar panel, and which is not. The network architecture is such that after training, the layers of the network produce an activation map, also known as a heat map, that outlines the panels. This can be used to obtain the size of each solar panel system.

Source: This AI Just Mapped Every Solar Panel in the United States