Gamers Want DMCA Exemption for ‘Abandoned’ Online Games

Several organizations and gaming fans are asking the Copyright Office to make a DMCA circumvention exemption for abandoned online games, to preserve them for future generations. The exemption would allow museums and libraries to offer copies of abandoned online servers, so these games won’t turn to dust.

The U.S. Copyright Office is considering whether or not to update the DMCA’s anti-circumvention provisions, which prevent the public from tinkering with DRM-protected content and devices.

These provisions are renewed every three years. To allow individuals and organizations to chime in, the Office traditionally launches a public consultation, before it makes any decisions.

This week a series of new responses were received and many of these focused on abandoned games. As is true for most software, games have a limited lifespan, so after a few years they are no longer supported by manufacturers.

To preserve these games for future generations and nostalgic gamers, the Copyright Office previously included game preservation exemptions. This means that libraries, archives and museums can use emulators and other circumvention tools to make old classics playable.

However, these exemptions are limited and do not apply to games that require a connection to an online server, which includes most recent games. When the online servers are taken down, the game simply disappears forever.

Source: Gamers Want DMCA Exemption for ‘Abandoned’ Online Games – TorrentFreak

Edward Snowden’s New App Uses Your Smartphone to Physically Guard Your Laptop

My disk is encrypted, but all it takes to bypass this protection is for an attacker — a malicious hotel housekeeper, or “evil maid,” for example — to spend a few minutes physically tampering with it without my knowledge. If I come back and continue to use my compromised computer, the attacker could gain access to everything.Edward Snowden and his friends have a solution. The NSA whistleblower and a team of collaborators have been working on a new open source Android app called Haven that you install on a spare smartphone, turning the device into a sort of sentry to watch over your laptop. Haven uses the smartphone’s many sensors — microphone, motion detector, light detector, and cameras — to monitor the room for changes, and it logs everything it notices. The first public beta version of Haven has officially been released; it’s available in the Play Store and on F-Droid, an open source app store for Android.

Source: Edward Snowden’s New App Uses Your Smartphone to Physically Guard Your Laptop

Another view: bitcoin isn’t likely to consume all the world’s electricity in 2020 (anyone reminded of climate change discussions?)

The computer process that generates each coin is said to be on pace to require more electricity than the United States consumes in a year. This bitcoin “mining” allegedly consumes more power than most countries use each year, and its electricity usage is roughly equivalent to Bulgaria’s consumption.

But here’s another thing you might want to know: All of that analysis is based on a single estimate of bitcoin’s power consumption that is highly questionable, according to some long-time energy and IT researchers. Despite their skepticism, this power-consumption estimate from the website Digiconomist has quickly been accepted as gospel by many journalists, research analysts and even billionaire investors.
[…]
Several energy experts caution that there is currently no reliable, verifiable way to measure just how much electric power is consumed in the process of minting the cryptocurrency. They say the first step is gathering hard data from the data centers, and no one has done that work yet.

“Many of those calculations that you see today I think are based on very weak assumptions,” said Christian Catalini, an assistant professor at the MIT Sloan School of Management who studies blockchain technology and cryptocurrencies.

Source: No, bitcoin isn’t likely to consume all the world’s electricity in 2020

Acoustic Attacks on HDDs cause them to shut down

The basic principle behind this attack is that sound waves introduce mechanical vibrations into an HDD’s data-storage platters. If the sound is played at a specific frequency, it creates a resonance effect that amplifies the vibration effect.Because hard drives store vasts amounts of information inside small areas of each platter, they are programmed to stop all read/write operations during the time a platter vibrates so to avoid scratching storage disks and permanently damaging an HDD.

Source: Acoustic Attacks on HDDs Can Sabotage PCs, CCTV Systems, ATMs, More

These experts figured out why so many bogus US patents get approved

If you’ve read our coverage of the Electronic Frontier Foundation’s “Stupid Patent of the Month” series, you know America has a patent quality problem. People apply for patents on ideas that are obvious, vague, or were invented years earlier. Too often, applications get approved and low-quality patents fall into the hands of patent trolls, creating headaches for real innovators.

Why don’t more low-quality patents get rejected? A recent paper published by the Brookings Institution offers fascinating insights into this question. Written by legal scholars Michael Frakes and Melissa Wasserman, the paper identifies three ways the patent process encourages approval of low-quality patents:

The United States Patent and Trademark Office (USPTO) is funded by fees—and the agency gets more fees if it approves an application.

Unlimited opportunities to refile rejected applications means sometimes granting a patent is the only way to get rid of a persistent applicant.

Patent examiners are given less time to review patent applications as they gain seniority, leading to less thorough reviews.

None of these observations is entirely new. For example, we have covered the problems created by unlimited re-applications in the past. But what sets Frakes and Wasserman’s work apart is that they have convincing empirical evidence for all three theories.

They have data showing that these features of the patent system systematically bias it in the direction of granting more patents. Which means that if we reformed the patent process in the ways they advocate, we’d likely wind up with fewer bogus patents floating around.

Source: These experts figured out why so many bogus patents get approved | Ars Technica

Chrome Extension with 100,000 Users Caught Pushing Cryptocurrency Miner

A Chrome extension with over 105,000 users has been deploying an in-browser cryptocurrency miner to unsuspecting users for the past few weeks.The extension does not ask for user permission before hijacking their CPUs to mine Monero all the time the Chrome browser is open.Named “Archive Poster,” the extension is advertised as a mod for Tumblr that allows users an easier way to “reblog, queue, draft, and like posts right from another blog’s archive.”According to users reviews, around the start of December the extension has incorporated the infamous Coinhive in-browser miner in its source code.

Source: Chrome Extension with 100,000 Users Caught Pushing Cryptocurrency Miner

How to Stop Apps From Listening in on Your TV Habits (it turns out thousands are)

That innocent-looking mobile game you just downloaded might just have an ulterior motive. Behind the scenes, hundreds of different apps could be using your smartphone’s microphone to figure out what you watch on TV, a new report from The New York Times reveals.
[…]
All of these apps need to get your permission before they can record in the background. So the easiest way is just to deny that permission. However, it’s possible that you might approved the request without realizing it, or your kid might do it while playing with your phone. In that case, switching it off is pretty easy.

Just head into Settings on your device and check the permissions for the app in question. If the app has microphone access when it doesn’t need to (why would a bowling game need to use your microphone?), just toggle that permission off.

Source: How to Stop Apps From Listening in on Your TV Habits

To drive faster we all need to keep the same distance to the car behind us as the car in front

a new study in IEEE Transactions on Intelligent Transportation Systems mathematically models the implications of the larger problem: You’re not keeping the right distance from the car behind you.

That may seem counterintuitive, since you don’t have much control over how far you are from the car behind you—especially when that person is a tailgater. But the math says that if everyone kept an equal distance between the cars ahead and behind, all spaced out in a more orderly fashion, traffic would move almost twice as quickly. Now sure, you’re probably not going to convince everyone on the road to do that. Still, the finding could be a simple yet powerful way to optimize semi-autonomous cars long before the fully self-driving car of tomorrow arrives.
[…]
Problem is, we’re talking about an emergent property here. “To get the full benefits of this, a significant fraction of the cars would have to have this,” says Horn. “In terms of societal implementation that’s a big factor, because even if it’s relatively cheap, people who implement it will question whether the first car that gets it is worth that investment, because until other cars get it, it doesn’t do a whole lot of good.”
[…]
“It sounds pretty drastic, but the benefits are huge,” says Horn. “We’re talking about a potential doubling of throughput, huge decreases in CO2 emissions, a lot of aggravation reduced and fuel used.”

Source: Math Says You’re Driving Wrong and It’s Slowing Us All Down | WIRED

Forever 21: Yes, hackers breached our payment system for half of 2017

A breach at Forever 21 left customer payment card information exposed to hackers, the retailer confirmed Thursday. The company didn’t specify how many customers had information stolen, but said various point of sales terminals were affected between April 3 and November 18, 2017. Hackers collected credit card numbers, expiration dates, verification codes and sometimes cardholder names.

Source: Forever 21: Yes, hackers breached our payment system – CNET

Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet

Perhaps you’ve been hearing strange sounds in your home—ghostly creaks and moans, random Rick Astley tunes, Alexa commands issued in someone else’s voice. If so, you haven’t necessarily lost your mind. Instead, if you own one of a few models of internet-connected speaker and you’ve been careless with your network settings, you might be one of thousands of people whose Sonos or Bose devices have been left wide open to audio hijacking by hackers around the world.Researchers at Trend Micro have found that some models of Sonos and Bose speakers—including the Sonos Play:1, the newer Sonos One, and Bose SoundTouch systems—can be pinpointed online with simple internet scans, accessed remotely, and then commandeered with straightforward tricks to play any audio file that a hacker chooses. Only a small fraction of the total number of Bose and Sonos speakers were found to be accessible in their scans. But the researchers warn that anyone with a compromised device on their home network, or who has opened up their network to provide direct access to a server they’re running to the external internet—say, to host a game server or share files—has potentially left their fancy speakers vulnerable to an epic aural prank.

Source: Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet | WIRED

The evidence-based medicine problem: US doctors cling to procedures that don’t work. Just under half of expensive operations.

The recent news that stents inserted in patients with heart disease to keep arteries open work no better than a placebo ought to be shocking. Each year, hundreds of thousands of American patients receive stents for the relief of chest pain, and the cost of the procedure ranges from $11,000 to $41,000 in US hospitals.

But in fact, American doctors routinely prescribe medical treatments that are not based on sound science.The stent controversy serves as a reminder that the United States struggles when it comes to winnowing evidence-based treatments from the ineffective chaff. As surgeon and health care researcher Atul Gawande observes, “Millions of people are receiving drugs that aren’t helping them, operations that aren’t going to make them better, and scans and tests that do nothing beneficial for them, and often cause harm.

”Of course, many Americans receive too little medicine, not too much. But the delivery of useless or low-value services should concern anyone who cares about improving the quality, safety and cost-effectiveness of medical care. Estimates vary about what fraction of the treatments provided to patients is supported by adequate evidence, but some reviews place the figure at under half.

Naturally that carries a heavy cost: One study found that overtreatment — one type of wasteful spending — added between $158 billion and $226 billion to US health care spending in 2011.

Source: The evidence-based medicine problem: US doctors cling to procedures that don’t work – Vox

Web trackers exploit browser login managers

First, a user fills out a login form on the page and asks the browser to save the login. The tracking script is not present on the login page [1]. Then, the user visits another page on the same website which includes the third-party tracking script. The tracking script inserts an invisible login form, which is automatically filled in by the browser’s login manager. The third-party script retrieves the user’s email address by reading the populated form and sends the email hashes to third-party servers.

We found two scripts using this technique to extract email addresses from login managers on the websites which embed them. These addresses are then hashed and sent to one or more third-party servers. These scripts were present on 1110 of the Alexa top 1 million sites. The process of detecting these scripts is described in our measurement methodology in the Appendix 1. We provide a brief analysis of each script in the sections below.

Source: No boundaries for user identities: Web trackers exploit browser login managers

Canada to use AI to Study ‘Suicide-Related Behavior’ on Social Media

his month the Canadian government is launching a pilot program to research and predict suicide rates in the country using artificial intelligence. The pilot will mine Canadians’ social media posts “in order to identify patterns associated with users who discuss suicide-related behavior,” according to a recently published contract document.

Source: Canada Is Using AI to Study ‘Suicide-Related Behavior’ on Social Media

‘Kernel memory leaking’ Intel / ARM processor design flaw forces Linux, Windows, OSX redesign, massive slowdowns to be expected

t is understood the bug is present in modern Intel processors produced in the past decade. It allows normal user programs – from database applications to JavaScript in web browsers – to discern to some extent the layout or contents of protected kernel memory areas.The fix is to separate the kernel’s memory completely from user processes using what’s called Kernel Page Table Isolation, or KPTI. At one point, Forcefully Unmap Complete Kernel With Interrupt Trampolines, aka FUCKWIT, was mulled by the Linux kernel team, giving you an idea of how annoying this has been for the developers.
[…]
At best, the vulnerability could be leveraged by malware and hackers to more easily exploit other security bugs.

At worst, the hole could be abused by programs and logged-in users to read the contents of the kernel’s memory. Suffice to say, this is not great. The kernel’s memory space is hidden from user processes and programs because it may contain all sorts of secrets, such as passwords, login keys, files cached from disk, and so on. Imagine a piece of JavaScript running in a browser, or malicious software running on a shared public cloud server, able to sniff sensitive kernel-protected data.

Specifically, in terms of the best-case scenario, it is possible the bug could be abused to defeat KASLR: kernel address space layout randomization. This is a defense mechanism used by various operating systems to place components of the kernel in randomized locations in virtual memory. This mechanism can thwart attempts to abuse other bugs within the kernel: typically, exploit code – particularly return-oriented programming exploits – relies on reusing computer instructions in known locations in memory.

Source: ‘Kernel memory leaking’ Intel processor design flaw forces Linux, Windows redesign • The Register

This very specifically could mean that you can’t seperate Virtual Machines properly any more.

AMD is quite chuffed to not be affected.

Using stickers in the field of view to fool image recognition AIs

In a research paper presented in December through a workshop at the 31st Conference on Neural Information Processing Systems (NIPS 2017) and made available last week through ArXiv, a team of researchers from Google discuss a technique for creating an adversarial patch.

This patch, sticker, or cutout consists of a psychedelic graphic which, when placed next to an object like a banana, makes image recognition software see something entirely different, such as a toaster.
[…]
“We construct an attack that does not attempt to subtly transform an existing item into another,” the researchers explain. “Instead, this attack generates an image-independent patch that is extremely salient to a neural network. This patch can then be placed anywhere within the field of view of the classifier, and causes the classifier to output a targeted class.”

The boffins observe that because the patch is separate from the scene, it allows attacks on image recognition systems without concern for lighting conditions, camera angles, the type of classifier being attacked, or other objects present in the scene.

While the ruse recalls schemes to trick face scanning systems with geometric makeup patterns, it doesn’t involve altering the salient object in the scene. The addition of the adversarial patch to the scene is enough to confuse the image classification code.

Source: Now that’s sticker shock: Sticky labels make image-recog AI go bananas for toasters • The Register

Nvidia: bans using cheap GeForce, Titan GPUs in servers through EULA. Is that legal?!

The chip-design giant updated its GeForce and Titan software licensing in the past few days, adding a new clause that reads: “No Datacenter Deployment. The SOFTWARE is not licensed for datacenter deployment, except that blockchain processing in a datacenter is permitted.”

In other words, if you wanted to bung a bunch of GeForce GPUs into a server box and use them to accelerate math-heavy software – such as machine learning, simulations and analytics – then, well, you can’t without breaking your licensing agreement with Nvidia. Unless you’re doing trendy blockchain stuff.

A copy of the license in the Google cache, dated December 31, 2017, shows no mention of the data center ban. Open the page today, and, oh look, data center use is verboten.

Source: Nvidia: Using cheap GeForce, Titan GPUs in servers? Haha, nope! • The Register

I don’t really understand how a company hopes to defend being able to tell you where and for what purpose you are allowed to used hardware you bought from them. You bought it, you paid for it, it’s your hardware to do with whatever you want. Unless the government says you can’t. Such as for eg. weaponry. Which I am pretty sure they don’t specify for Nvidia graphics cards.

The Founder of Litecoin Says He No Longer Owns Any Litecoin

“[W]henever I tweet about Litecoin price or even just good or bads news, I get accused of doing it for personal benefit. Some people even think I short LTC! So in a sense, it is conflict of interest for me to hold LTC and tweet about it because I have so much influence,” Lee, who was also an early engineering hire for crypto trading platform Coinbase, wrote on r/litecoin. “For this reason, in the past days, I have sold and donated all my LTC.”
[…]
While an unencumbered founder may generate trust and goodwill in the short term, the question remains if Lee knows something Litecoin speculators don’t. Even the person (or people) who operated under the alias of Satoshi Nakamoto did not sell, donate, or delete their stake in Bitcoin before disappearing. Nor would it be an easy task to find a startup founder (an imperfect analogy to be sure) that did not have some level of investment in their own product. Lee notes in the same Reddit post that, “when Litecoin succeeds, I will still be rewarded in lots of different ways, just not directly via ownership of coins.”

Source: The Founder of Litecoin Says He No Longer Owns Any Litecoin

Coinbase Freezes Bitcoin Cash Trades, Launches Insider Trading Probe

Coinbase, one of the world’s most popular cryptocurrency apps, surprised its users by adding Bitcoin Cash to its offerings on Tuesday. But it appears that not everyone trading in the altcoin was blindsided by the move. Before the announcement, prices for Bitcoin Cash began climbing in other markets, and now a self-investigation of possible insider trading has been initiated.

Source: Coinbase Freezes Bitcoin Cash Trades, Launches Insider Trading Probe

The wild west of unregulated currencies! It’s nice to see these guys jumping through hoops to show that they have responsible policies in the hopes that they won’t get heavily regulated by local governments in an international setting, giving them a huge disadvantage to other companies in the same – but unregulated – space.

Lightwear: Introducing Magic Leap’s $1.9 Billion Dollar Invstement Mixed Reality Goggles

Magic Leap today revealed a mixed reality headset that it believes reinvents the way people will interact with computers and reality. Unlike the opaque diver’s masks of virtual reality – which replace the real world with a virtual one – Magic Leap’s device, called Lightwear, resembles goggles, which you can see through as if you’re wearing a special pair of glasses. The goggles are tethered to a powerful pocket-sized computer, called the Lightpack, and can inject life-like moving and reactive people, robots, spaceships – anything – into a person’s view of the real world.
[…]
Where the 1830s technology uses two flat images, virtual reality essentially uses two screens. Abovitz thought there had to be a better way. He was uninterested in improving virtual reality; instead, he sought a better way to create images that can be placed into a person’s view of the real world. In short, he was interested in mixed reality.
[…]
The first was something called the analog light field signal. The light field is essentially all of the light bouncing off all of the objects in a world. When you take a picture, you’re capturing a very thin slice of that light field. The eye, however, sees much more of that light field, allowing a person to perceive depth, movement and a lot of other visual subtleties. The other thing that Abovitz wanted to figure out was how that light field signal makes its way into your brain through the eye and into the visual cortex.“The world you perceive is actually built in your visual cortex,” he says. “The idea is that your visual cortex and a good part of the brain is like a rendering engine and that the world you see outside is being rendered by roughly a 100 trillion neural-connections.”
[…]
technology didn’t need to capture the entirety of the light field and recreate it; it just needed to grab the right bits of that light field and feed it to the visual cortex through the eye. Abovitz calls it a system engineering view of the brain. “Our thought was, if we could figure out this signal and or approximate it, maybe it would be really cool to encode that into a wafer,” he says. “That we could make a small wafer that could emit the digital light field signal back through the front again. That was the key idea.”

Suddenly, Abovitz went from trying to solve the problem to needing to engineer the solution. He was sure if they could create a chip that would deliver the right parts of a light field to the brain, he could trick it into thinking it was seeing real things that weren’t there. The realization meant that they were trying to get rid of the display and just use what humans already have. “There were two core zen ideas: The no-display-is-the-best-display and what’s-outside-is-actually-inside. And they turned out to be, at least from what we’ve seen so far, completely true. Everything you think is outside of you is completely rendered internally by you, co-created by you plus the analog light field signal.
[…]
The light field photonics, which can line up a fake reality in your natural light real one, may be the most obvious of the innovations on display, but there’s much more. The visual perception system is actively tracking the world you’re moving through, noting things like flat surfaces, walls, objects. The result is a headset that sees what you do, and that can then have its creations behave appropriately, whether that means hanging a mixed reality monitor next to your real one, or making sure the floating fish in your living room don’t drift through a couch. That room mapping is also used to keep track of the things you place in your world so they’re there waiting for you when you come back. Line up six monitors above your desk and go to sleep, the next day they’ll be exactly where you left them.

Source: Lightwear: Introducing Magic Leap’s Mixed Reality Goggles – Rolling Stone



Well I don’t like the design language much, but it does look a lot better (and lighter!) than the VR stuff out there

Bitcoin exchange Youbit shuts after second hack attack – BBC News

A crypto-currency exchange in South Korea is shutting down after it was hacked for the second time in less than eight months.

Youbit, which lets people buy and sell bitcoins and other virtual currencies, has filed for bankruptcy after losing 17% of its assets in the cyber-attack.

It did not disclose how much the assets were worth at the time of the attack.

In April, Youbit, formerly called Yapizon, lost 4,000 bitcoins now worth $73m (£55m) to cyberthieves.

Source: Bitcoin exchange Youbit shuts after second hack attack – BBC News

Yup, it’s the wild west out there with those Bitcoins!

Dozens of Companies Are Using Facebook to Exclude Older Workers

Verizon is among dozens of the nation’s leading employers — including Amazon, Goldman Sachs, Target and Facebook itself — that placed recruitment ads limited to particular age groups, an investigation by ProPublica and The New York Times has found.

The ability of advertisers to deliver their message to the precise audience most likely to respond is the cornerstone of Facebook’s business model. But using the system to expose job opportunities only to certain age groups has raised concerns about fairness to older workers.

Several experts questioned whether the practice is in keeping with the federal Age Discrimination in Employment Act of 1967, which prohibits bias against people 40 or older in hiring or employment. Many jurisdictions make it a crime to “aid” or “abet” age discrimination, a provision that could apply to companies like Facebook that distribute job ads.

“It’s blatantly unlawful,” said Debra Katz, a Washington employment lawyer who represents victims of discrimination.

Facebook defended the practice. “Used responsibly, age-based targeting for employment purposes is an accepted industry practice and for good reason: it helps employers recruit and people of all ages find work,” said Rob Goldman, a Facebook vice president.

Source: Dozens of Companies Are Using Facebook to Exclude Older… — ProPublica

The statement by Rob Goldman defies belief! Being ageist is good for people of all ages? No, Rob, being ageist is only good for those people who’s age you are targetting.

Windows 10 Facial Recognition Feature Can Be Bypassed with a low res Photo

You can bypass Windows Hello with a low-res printed photoIn a report published yesterday, German pen-testing company SySS GmbH says it discovered that Windows Hello is vulnerable to the simplest and most common attack against facial recognition biometrics software — the doomsday scenario of using a printed photo of the device’s owner.Researchers say that by using a laser color printout of a low-resolution (340×340 pixels) photo of the device owner’s face, modified to the near IR spectrum, they were able to unlock several Windows devices where Windows Hello had been previously activated.The attack worked even if the “enhanced anti-spoofing” feature had been enabled in the Windows Hello settings panel, albeit for these attacks SySS researchers said they needed a photo of a higher resolution of 480×480 pixels (which in reality is still a low-resolution photo).

Source: Windows 10 Facial Recognition Feature Can Be Bypassed with a Photo

Hackers Used DC Police Surveillance System to Distribute Ransomware

A Romanian man and woman are accused of hacking into the outdoor surveillance system deployed by Washington DC police, which they used to distribute ransomware.The two suspects are named Mihai Alexandru Isvanca and Eveline Cismaru, Romanian nationals, both arrested last week by Romanian authorities part of Operation Bakovia that culminated with the arrest of five suspects on charges of distributing email spam laced with the CTB-Locker and Cerber ransomware strains.Hackers breached 123 of 187 of Washington police CCTV camerasAccording to an affidavit filed by the US Secret Service, the two are accused of hacking into 123 of the 187 security cameras deployed part of the Metropolitan Police Department of the District of Columbia (MPDC) closed-circuit TV system that Washington police uses to keep an eye on public spaces across the city.
[…]
The two supposedly hacked MPDC cameras and computers on January 9. Washington police discovered the intrusion on January 12 and shut down the system for four days until January 15 to clean and secure their network.

The shutdown of Washington, DC’s entire CCTV system took place two weeks ahead of President Trump’s inauguration ceremony and caused a stir in US media, as many initially pinned it on foreign nation-state hackers.

Source: Hackers Used DC Police Surveillance System to Distribute Cerber Ransomware

Nissan Canada Finance hacked, up to 1.1m Canucks exposed

Nissan Canada’s vehicle-financing wing has been hacked, putting personal information on as many as 1.13 million customers in the hands of miscreants.
[…]
According to Nissan Canada, the exposed data includes at least customer names, addresses, vehicle makes and models, vehicle identification numbers (VINs), credit scores, loan amounts and monthly payment figures.

“We are still investigating precisely what personal information has been impacted,” the biz said, adding that it was working with the cops and infosec experts to work out what the heck happened. “At this time, there is no indication that customers who financed vehicles outside of Canada are affected.”

Nissan Canada admitted it discovered on Monday, December 11, that it had been hacked, and alerted the world, er, 10 days later.

Source: Braking news: Nissan Canada hacked, up to 1.1m Canucks exposed • The Register

 Gemini • Psion come alive again running linux and android

Gemini brings the Psion Series 5 design into the 21st century. Psion’s designer, Martin Riddiford of Therefore, has devised a new keyboard and hinge, which allows the machine to spring open and snap shut, just like Psions used to, and stand firmly on a flat surface without keeling over. Inside is a full phone board, MediaTek’s 10-core chip.It dual boots between Android – yes, with full Google Play Services – and Linux.

Source: How’s this for a stocking filler next year? El Reg catches up with Gemini • The Register