Bank data of 20 million customers leaked in South Korea

In the latest case, an employee from personal credit ratings firm Korea Credit Bureau KCB has been arrested and accused of stealing the data from customers of three credit card firms while working for them as a temporary consultant.Seoul’s financial regulators on Sunday confirmed the number of affected users as at least 20 million, in a country of 50 million.The stolen data includes the customers’ names, social security numbers, phone numbers, and credit card numbers and expiration dates, the Financial Supervisory Service FSS said in a statement.

via Bank data of 20 million customers leaked in South Korea | ZDNet.

That’s just less than 1/2 the population! And goes to show, humans are usually the weakest link in these kind of things.

NSA Phone Spying Is Useless In Preventing Terrorist Attacks, Study Says

In the study, the New America Foundation reviewed 225 terrorism cases and found that traditional investigation and law enforcement methods actually did the most to prevent attacks. About a third of the leads in terrorism cases came from tips or an informant, while old school surveillance warrants were used in 48 cases. All things told, bulk telephony metadata collection provided evidence in only one case, a case that didn’t even present the threat of an attack against the United States.

via NSA Phone Spying Is Useless In Preventing Terrorist Attacks, Study Says.

Review of the EU copyright rules – Put your word in at the EU now!

All stakeholders are welcome to contribute to this consultation. Contributions are particularly sought from consumers, users, authors, performers, publishers, producers, broadcasters, intermediaries, distributors and other service providers, Collective Management Organisations, public authorities and Member States.

The objective of this consultation is to gather input from all stakeholders on the review of the EU copyright rules.

Review of the EU copyright rules – Consultations – The EU Single Market – European Commission.

The link above has a few documents for you to download. Choose one and fill in the questionaire in the consultation document and send it back. Easy!

On Hacking MicroSD Cards

Turns out that to correct errors, each SD card comes with a 100mhz microcontroller which reports on the size of the device and runs algorithms to block out certain errors. On at least one brand, the firmware loader is not secured. This opens up a host of possibilities, from a very cheap source of Arduino alternatives, to a smtp server that sends copies of your files to an external source, or more complexity, as sd cards tend to be trusted once inserted.

http://www.bunniestudios.com/blog/?p=3554

Algae to crude oil: Million-year natural process takes minutes in the lab

In the PNNL process, a slurry of wet algae is pumped into the front end of a chemical reactor. Once the system is up and running, out comes crude oil in less than an hour, along with water and a byproduct stream of material containing phosphorus that can be recycled to grow more algae.

http://phys.org/news/2013-12-algae-crude-oil-million-year-natural.html

netfabb STL checking and fixing

netfabb Basic is a freeware for handling of files on stl-format. The freeware includes Advanced Model Browsing, STL Fixing and Part Analysis, Measurement and Quality Management. The freeware also include a Basic Slicing module and give you first steps into the 3D Printing and data preperation

via netfabb Download Center » netfabb Basic.

It also comes as a cloud service, a “cloud” (read: server) version and various different professional versions.

Our Government Has Weaponized the Internet. Here’s How They Did It | Wired Opinion | Wired.com

According to revelations about the QUANTUM program, the NSA can “shoot” (their words) an exploit at any target it desires as his or her traffic passes across the backbone. It appears that the NSA and GCHQ were the first to turn the internet backbone into a weapon; absent Snowdens of their own, other countries may do the same and then say, “It wasn’t us. And even if it was, you started it.”

via Our Government Has Weaponized the Internet. Here's How They Did It | Wired Opinion | Wired.com.

This includes a fairly detailed list of the methodologies employed.

McLaren developing wiper-free windscreens using fighter jet tech

The Woking-based firm’s chief designer Frank Stephenson told The Sunday Times that the system was already being used by the military.

‘It took a lot of effort to get this out of a source in the military. I asked why you don’t see wipers on some aircraft on when they are coming in at very low levels for landing.

‘I was told that it’s not a coating on the surface but a high frequency electronic system that never fails and is constantly active. Nothing will attach to the windscreen.’

The system is expected to be introduced to McLaren’s range of sportscars which cost between £170,000 and £870,000, but once perfected could be produced for the mass market for as little as £10.

Paul Wilcox, professor of ultrasonics at Bristol University’s faculty of engineering, told The Sunday Times: ‘The obvious way of doing it is to have an ultrasonic transducer in the corner of the windscreen that would excite waves at around 30kHz to bounce across the windscreen.’

McLaren confirms it's developing new wiper-free windscreens | Mail Online.

Simulations back up theory that Universe is a hologram – and it seems that wormholes can be created using entanglement

A team of physicists has provided some of the clearest evidence yet that our Universe could be just one big projection.

In 1997, theoretical physicist Juan Maldacena proposed1 that an audacious model of the Universe in which gravity arises from infinitesimally thin, vibrating strings could be reinterpreted in terms of well-established physics. The mathematically intricate world of strings, which exist in nine dimensions of space plus one of time, would be merely a hologram: the real action would play out in a simpler, flatter cosmos where there is no gravity.

via Simulations back up theory that Universe is a hologram : Nature News & Comment.

ie models that work in lower dimensional universes, can be proven to work in higher dimensional universes. This means that we are projected ‘up’ from lower dimensions.

Now the following article becomes properly relevant because of the above article: A Link Between Wormholes and Quantum Entanglement.

wo independent teams of scientists say that it should also be possible to create a wormhole connection between two ordinary quantum particles, such as quarks that make up protons and neutrons.

This article was detracted as being a fun mathematical excercise but impractical because it only worked in a lower dimensional universe. Now, however we know that our universe is a projection of that universe, and so the laws that hold there, definitely hold here and are practical.