The Linkielist

Linking ideas with the world

Microbe computers – Biological computers in living cells

This biological microcomputer sprang from the mind of Drew Endy, PhD, an assistant professor of bioengineering at Stanford. In three scientific papers released over a 13-month span in 2012 and 2013, Endy and a team of researchers from his lab showed how they used ordinary genetic engineering techniques to turn the bacterium E. coli — Read more about Microbe computers – Biological computers in living cells[…]

Hacker uses bots to top music charts, earn royalties without being able to make music

A Melbourne security professional has sent ear-piercing ‘garbage’ tunes to the top of online music charts by spoofing track plays. Despite that Peter Filimore (@typhoonfilsy) has never played an instrument, in a month he accrued hundreds of thousands of plays for his tunes hosted in online music charts, trumping artists like P!nk, Nicki Minaj, Flume Read more about Hacker uses bots to top music charts, earn royalties without being able to make music[…]

I Bought an Apartment Just to Rent It Out on Airbnb

In 2012 I bought an apartment specifically to rent out on airbnb. I’ve been managing it remotely for the past year. This post includes everything I learned as well as some revenue numbers http://gizmodo.com/i-bought-an-apartment-just-to-rent-it-out-on-airbnb-1458666661/@whitsongordon?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+lifehacker%2Ffull+%28Lifehacker%29

APK Downloader [Latest] Download Directly | Chrome Extension v2 (Evozi Official)

Have you ever wanted to get your hands on the latest game, only to find that the Google Play thought it wasn’t compatible with your phone?Maybe you don’t have a snapdragon device, but youre’re pretty sure an old device could handle it still. Have a Kindle Fire and want access to more than just the Amazon Read more about APK Downloader [Latest] Download Directly | Chrome Extension v2 (Evozi Official)[…]

Off-the-Record Messaging

Off-the-Record (OTR) Messaging allows you to have private conversations over instant messaging by providing: Encryption No one else can read your instant messages. Authentication You are assured the correspondent is who you think it is. Deniability The messages you send do not have digital signatures that are checkable by a third party. Anyone can forge messages after Read more about Off-the-Record Messaging[…]

Flexibile, high definition CAAC-OS displays from SEL curve around bezels

As one way to utilize this flexibility, SEL have produced side-roll and top-roll OLED displays, with the display curving over the edge where a bezel would usually be.The prototypes on show were a 3.4-inch 960×540 pixel display with a resolution of 326 ppi, and a 5.4-inch 960×1280 pixel display with a 302 ppi resolution. They Read more about Flexibile, high definition CAAC-OS displays from SEL curve around bezels[…]

Patent strike on Google by evil empire

Nortel went bankrupt in 2009. In 2011, it held an auction for its massive patent portfolio. The winners of the auction were Apple, Microsoft, Sony, RIM, and others, who bought the patents for $4.5 billion as a consortium named Rockstar Bidco.  http://m.slashdot.org/story/193739 Great. They want to stop Google from being a search engine. Patents are really good for Read more about Patent strike on Google by evil empire[…]

Off-the-Record Messaging

Off-the-Record (OTR) Messaging allows you to have private conversations over instant messaging by providing: Encryption No one else can read your instant messages. Authentication You are assured the correspondent is who you think it is. Deniability The messages you send do not have digital signatures that are checkable by a third party. Anyone can forge messages after Read more about Off-the-Record Messaging[…]

Call yourself a ‘hacker’, lose your 4th Amendment right against seizures

The court has struggled over the issue of allowing the copying of the hard drive. This is a serious invasion of privacy and is certainly not a standard remedy… The tipping point for the court comes from evidence that the defendants – in their own words – are hackers. By labeling themselves this way, they Read more about Call yourself a ‘hacker’, lose your 4th Amendment right against seizures[…]

Netherlands and Belgium to share aerial protection

Specifically the qra (quick reactiin alert) and renegade tasks http://www.defensie.nl/actueel/nieuws/2013/10/23/46208943/Nederland_en_Belgie_gaan_samen_luchtruim_bewaken Not only does this make economic sense, but also taking a wider view at European military cooperation, this is hopefully a first step towards many more far reaching integrated forces within the EU. Doing so will ease economic defense spending burdens, but also create a Read more about Netherlands and Belgium to share aerial protection[…]

Experian Sold Consumer Data to ID Theft Service

An identity theft service that sold Social Security and drivers license numbers — as well as bank account and credit card data on millions of Americans — purchased much of its data from Experian, one of the three major credit bureaus, according to a lengthy investigation by KrebsOnSecurity. http://krebsonsecurity.com/2013/10/experian-sold-consumer-data-to-id-theft-service/

Nftables to replace iptables?

Looks like it. It’s protocol independent, reduces complexity and duplication and will sigificantly reduce the packet filtering footprint in the kernel. It should also make it more easily extensible in the future, as it runs in user space in a virtual machine. http://lwn.net/Articles/324989/

MIT team shows system that tracks people through walls better than wifi triangulation

A team of researchers at MIT have been working this year on a system that can track people through walls with impressive accuracy using radio waves. The team showed the system earlier this month. IDG News Service made a video of the demo, which took place at MIT’s Computer Science and Artificial Laboratory (CSAIL) in Read more about MIT team shows system that tracks people through walls better than wifi triangulation[…]

What the Government Does with Americans’ Data

For the first time in one report, the Brennan Center takes a comprehensive look at the multiple ways U.S. intelligence agencies collect, share, and store data on average Americans. The report, which surveys across five intelligence agencies, finds that non-terrorism related data can be kept for up to 75 years or more, clogging national security Read more about What the Government Does with Americans’ Data[…]

When does a physical system compute?

Computing is a high-level process of a physical system. Recent interest in non-standard computing systems, including quantum and biological computers, has brought this physical basis of computing to the forefront. There has been, however, no consensus on how to tell if a given physical system is acting as a computer or not; leading to confusion Read more about When does a physical system compute?[…]