2019-01-01 00:00:00 ..
2019-08-18 13:49:50 UTC
2019-08-22 10:16:34 UTC
We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.
According to authorities, the incident took place in July at the South Ukraine Nuclear Power Plant, located near the city of Yuzhnoukrainsk, in southern Ukraine.
It's unknown how the scheme was discovered, but on July 10 the SBU raided the nuclear power plant, from where it seized computers and equipment specifically built for mining cryptocurrency.
This equipment was found in the power plant's administration offices, and not on its industrial network.
Confiscated equipment included two metal cases containing basic computer parts, but with additional power supplies, coolers, and video cards. According to court documents [1, 2], one case held six Radeon RX 470 GPU video cards, and the second five.
Further, the SBU also found and seized additional equipment[1, 2] that looked like mining rigs in the building used as barracks by a military unit of the National Guard of Ukraine, tasked with guarding the power plant.
Several employees have been charged for their involvement in the scheme, but not yet arrested. It's unclear if any military staff was charged.
Officials believe the suspects attempted their scheme because of a recent spike in cryptocurrency trading prices, after a long period during which they fell.
Ukrainian news site UNIAN first reported the investigation.
"The measure of a man's real character is what he would do if he knew he would never be found out." Thomas Macaulay
A one kilometre "solar road" project paved with photovoltaic panels in France is "too noisy, falling apart, and doesn't even collect enough solar energy".
Le Monde describes the road as "pale with its ragged joints", with "solar panels that peel off the road and the many splinters [from] that enamel resin protecting photovoltaic cells".
It's a poor sign for a project the French government invested €5 million, or $5,546,750. The noise and poor upkeep aren't the only problems facing the Wattway. Through shoddy engineering, the Wattway isn't even generating the electricity it promised to deliver...
Normandy is not historically known as a sunny area. At the time, the region's capital city of Caen only got 44 days of strong sunshine a year, and not much has changed since.
Storms have wreaked havoc with the systems, blowing circuits. But even if the weather was OK it appears the panels weren't built to capture them efficiently... Solar panels are most efficient when pointed toward the sun. Because the project needed to be a road as well as a solar generator, however, all of its solar panels are flat. So even within the limited sun of the region, the Wattway was further limiting itself.
From New Atlas
Although it outnumbers regular matter by a ratio of five to one, dark matter is frustratingly elusive. Many experiments have been and are being run to try to hunt down different types of candidate particles, but so far no direct trace has been found of any of them. Now, researchers from Max Planck have proposed a new hypothetical particle that might be behind dark matter – the superheavy gravitino – and outlined just how we might find them.
As far back as the 1930s, astronomers began to notice that galaxies are moving much faster than they should be, based on the mass we could see. Calculations led to the conclusion that there must be far more mass out there that we couldn't see, and this hypothetical invisible stuff became known as dark matter.
[...] But what's particularly interesting is that if superheavy gravitinos are real, we could find traces of them using the Earth itself as a giant detector. After all, we're bound to have had plenty of them pass through the planet in the last 4.5 billion years. And if they did, they should have left fingerprints behind.
Because superheavy gravitinos would interact with regular matter through the electromagnetic and strong nuclear forces, they could leave ionization tracks in rocks. The problem is, they might be difficult to distinguish from the paths of other particles.
The data collected by self-driving cars used to be a closely guarded secret. But recently, many companies developing autonomous driving systems have begun to release their data to the research community in dribs and drabs. The latest to do so is Waymo, the self-driving unit of Alphabet, which today is making some of the high-resolution sensor data gathered by its fleet of autonomous vehicles available to researchers.
Waymo says its dataset contains 1,000 driving segments, with each segment capturing 20 seconds of continuous driving. Those 20-second clips correspond to 200,000 frames at 10 Hz per sensor, which will allow researchers to develop their own models to track and predict the behavior of everyone using the road, from drivers to pedestrians to cyclists.
Also at TechCrunch.
Chicago Police Department is rolling out a pilot of Samsung's DeX in Vehicle solution, providing officers the ability to dock their Galaxy smartphones and access policing applications on a dash-mounted display and keyboard.
The mobile-first initiative, announced at a press conference on August 21, aims to leverage the power of officer smartphones to streamline in-vehicle computing access. Officers participating in the pilot will be able to access computer-aided dispatch and other Chicago Police Department systems to conduct background checks and complete reports. Photo and video evidence captured on the smartphone will also be immediately accessible to attach to reports. The initial pilot will roll out for CPD's 11th district.
Also at Engadget.
When it is finished sometime next decade, Europe's Extremely Large Telescope will be the largest in the world, with a mirror nearly 40 meters across. But one astronomer has proposed an even more powerful space telescope—one with the equivalent of a 150-meter mirror—that would use Earth's atmosphere itself as a natural lens to gather and focus light. Astronomer David Kipping of Columbia University has worked out that a 1-meter space telescope, positioned beyond the moon, could use the focusing power of the ring of atmosphere seen around the edge of the planet to amplify the brightness of dim objects by tens of thousands of times.
The atmosphere is too variable for a Terrascope, as Kipping calls it, to produce beautiful images to rival those from the Hubble Space Telescope. But it could discover much fainter objects than is now possible, including small exoplanets or Earth-threatening asteroids. Kipping acknowledges that more work is needed to prove the idea, but the necessary technology already exists. "None of this is reinventing the wheel, it just needs to be pushed a bit harder," he says.
Astronomers who read the paper Kipping posted last week on arXiv were both delighted and cautious. Matt Kenworthy, of Leiden University in the Netherlands, says he was "blown away by how much work and thought he had put into it" but wants more evidence that it will work. "I'd want to sit down and do a more realistic model," he says. Bruce Macintosh of Stanford University in Palo Alto, California, adds: "It's an interesting thought experiment, but there are a lot of details to think through."
A telescope could be put on the surface of the Moon facing the Earth (thus making both sides of the Moon attractive places to put telescopes), or at another location such as the L1 Lagrange point.
Also at Scientific American.
On Wednesday, Sierra Nevada Corporation—the company that makes aerospace equipment, not beer—showed off its proposed in-space habitat for the first time. The inflatable habitat is, first and foremost, large. It measures more than 8 meters long, and with a diameter of 8 meters has an internal volume of 300 cubic meters, which is about one-third the size of the International Space Station.
Sierra Nevada developed this full-scale prototype under a NASA program that funded several companies to develop habitats that could be used for a space station in orbit around the Moon, as well as potentially serving as living quarters for a long-duration transit to and from Mars. As part of the program, NASA astronauts have, or will, spend three days living in and evaluating the prototypes built by Sierra Nevada, Boeing, Lockheed Martin, Northrop Grumman, and Bigelow Aerospace.
The selling point for Sierra Nevada's habitat is its size, which is possible because the multi-layered fabric material can be compressed for launch, then expanded and outfitted as a habitat once in space. It can fit within a standard payload fairing used for launch vehicles such as SpaceX's Falcon Heavy rocket, United Launch Alliance's Vulcan booster, or NASA's Space Launch System. It is light enough for any of those rockets to launch to the Moon.
[...] What this habitat does not presently have is an exact purpose. Lindsey said the inflatable habitat, which has some similarities in technology to Bigelow's expandable module attached to the International Space Station, could be sized for any number of missions, from a low-Earth orbit space station to a habitat on the surface of the Moon or Mars.
Where is Bigelow's B330?
The Chicago Tribune recently launched an investigation into the radiofrequency radiation levels output by popular smartphones, and found that some of Apple's iPhones are allegedly emitting radiofrequency radiation that exceeds safety limits.
According to the newspaper, it contracted an accredited lab to test several smartphones according to federal guidelines. iPhones were secured below clear liquid formulated to simulate human tissue while probes measured the radiofrequency radiation the liquid absorbed.
Several iPhones measured over the legal safety limits in the tests, but the worst performer was the iPhone 7. Its radiofrequency radiation exposure was over the legal limit and more than double what Apple reported to federal regulators.
The iPhone X was slightly over limits in some tests, as was the iPhone 8, while the 8 Plus stayed within the legal range. iPhones were tested twice after Apple provided feedback on the testing method. The modified test "added steps intended to activate sensors designed to reduce the phones' power."
[...] The FCC, meanwhile, said that it is going to be doing its own testing over the next couple of months.
"We take seriously any claims on non-compliance with the RF (radiofrequency) exposure standards and will be obtaining and testing the subject phones for compliance with FCC rules," agency spokesman Neil Grace said.
Submitted via IRC for SoyCow3196
The world's most-cited researchers, according to newly released data, are a curiously eclectic bunch. Nobel laureates and eminent polymaths rub shoulders with less familiar names, such as Sundarapandian Vaidyanathan from Chennai in India. What leaps out about Vaidyanathan and hundreds of other researchers is that many of the citations to their work come from their own papers, or from those of their co-authors.
Vaidyanathan, a computer scientist at the Vel Tech R&D Institute of Technology, a privately run institute, is an extreme example: he has received 94% of his citations from himself or his co-authors up to 2017, according to a study in PLoS Biology this month. He is not alone. The data set, which lists around 100,000 researchers, shows that at least 250 scientists have amassed more than 50% of their citations from themselves or their co-authors, while the median self-citation rate is 12.7%.
The study could help to flag potential extreme self-promoters, and possibly 'citation farms', in which clusters of scientists massively cite each other, say the researchers. "I think that self-citation farms are far more common than we believe," says John Ioannidis, a physician at Stanford University in California who specializes in meta-science — the study of how science is done — and who led the work. "Those with greater than 25% self-citation are not necessarily engaging in unethical behaviour, but closer scrutiny may be needed," he says.
Submitted via IRC for SoyCow3196
Almost two months after it was first announced, Yubico has launched the YubiKey 5Ci, a security key with dual support for iPhones, Macs and other USB-C compatible devices.
Yubico’s newest YubiKey is the latest iteration of its security key built to support a newer range of devices, including Apple’s iPhone, iPad and MacBooks, in a single device. Announced in June, the company said the security keys would cater to cross-platform users — particularly Apple device owners.
These security keys are small enough to sit on a keyring. When you want to log in to an online account, you plug in the key to your device and it authenticates you. Your Gmail, Twitter and Facebook account all support these plug-in devices as a second-factor of authentication after your username and password — a far stronger mechanism than the simple code sent to your phone.
I just finished updating the certs for SoylentNews.
We get our certs through Let's Encrypt. Yes, we could automate the whole process, but it has been discussed and decided that given our... unique configuration, it is best to have a human in the loop than to let a script somehow run amok and then try to restore things when who-all-knows-what got deployed and things have gone sideways.
I have checked our web sites for production, dev, and staff as well as sending and retrieving e-mail; all seemed to be okay.
More than anything else, this is a check on us to see if we (well, me, actually) overlooked anything. If you do detect any issues, please post a comment to this story.
(Hat tip to The Mighty Buzzard for standing by in case I bollixed up something.)
[Update: Unless, of course, you cannot post a comment to this story! Then pop onto the #Soylent channel on our Internet Relay Chat (IRC) server and let us know over there. --martyb]
Submitted via IRC for SoyCow2718
Software-based network isolation provided by routers is not as efficient as believed, as hackers can smuggle data between the networks for exfiltration.
Most modern routers offer the possibility to split the network into multiple segments that work separately. One example is a guest network that works in parallel with the host.
The boundary insulates sensitive or critical systems from others that enjoy less strict security policies. This practice is common and even a recommended security measure. It is a logical separation that occurs at software level, though, and it is not airtight.
Researchers at the Ben-Gurion University of the Negev discovered multiple methods to carry data across two segregated network segments on the same hardware.
They achieved this through direct or timing-based covert channels and tested the findings on seven routers in various price ranges from multiple vendors. The methods do not allow exfiltration of large aounts of data but shows that it is possble to break the logical barrier.
Clandestine direct communication is possible by encoding the data in packets that several protocols erroneously forward to both isolated networks. This method does not work on all tested routers and where it is valid, the transfer is not bidirectional in all cases.
Timing-based covert channels rely on shared hardware resources (CPU time, network and memory buffers) to send the information. This is done by influencing the use of those resources and reading the effect to interpret the bits of data.
"To exploit these [timing-based] channels, we need to construct sender and receiver gadgets which cause an increased demand on the router’s control plane or sample this demand, respectively."
[...] The flaws discovered by the researchers, though, received the following identification numbers and are tracked as:
Submitted via IRC for SoyCow3196
Beijing is bringing AI judges to court. The move, proclaimed by China as "the first of its kind in the world", comes from the Beijing Internet Court, which has launched an online litigation service center featuring an artificially intelligent female judge, with a body, facial expressions, voice, and actions all modeled off a living, breathing human (one of the court's actual female judges, to be exact).
[...] But conspiracy theorists can breathe a sigh of relief — the AI apocalypse is not nigh (yet). This virtual judge, whose abilities are based on intelligent speech and image synthesizing technologies, is to be used for the completion of “repetitive basic work” only, according to the Beijing Internet Court’s official statement on the move. That means she’ll mostly be dealing with litigation reception and online guidance. Other features of the online service center include a mobile micro-court and an official Weitao (Taobao's social-media service for brands) account.
Rather than replacing human-populated courts, Beijing's Internet Court’s stated mission is to use new technology to provide more effective, more widely-reaching public services. According to court president Zhang Wen, integrating AI and cloud computing with the litigation service system will allow the public to better reap the benefits of technological innovation in China.
For the first time in China, #AI assistive technology was used in a trial at Shanghai No 2 Intermediate People's Court on Wed, the Legal Daily reported. When the judge, public prosecutor or defender asked the AI system, it displayed all related evidence on a courtroom screen. pic.twitter.com/fEI7cR5U3T
— People's Daily, China (@PDChina) January 25, 2019
Submitted via IRC for SoyCow3196
A phishing campaign that spoofs a PDF attachment to deliver Adwind spyware has been taking aim at national grid utilities infrastructure.
Adwind, a.k.a. JRAT or SockRat, is being used in a malware-as-a-service model in this campaign, researchers said. It offers a full cadre of info-gathering features, including the ability to take screenshots, harvest credentials from Chrome, Internet Explorer and Microsoft Edge, record video and audio, take photos, steal files, perform keylogging, read emails and steal VPN certificates.
“Critical infrastructure facilities are high-risk targets, and the fact that Adwind is available as a paid service is very concerning,” Bob Noel, vice president of strategic relationships for Plixer, told Threatpost. “Anyone willing to pay can target utilities, and when successful, they have the ability to collect keystrokes, steal passwords, grab screenshots, take pictures from the web camera, record sound, etc. If infected end users have access to critical system information, it could be stolen and used in an attempt to attack the facility.”
[...] Adwind has made bypassing and disabling security tools a hallmark. Last year, a new variant emerged that used a fresh take on the Dynamic Data Exchange (DDE) code-injection technique for anti-virus evasion.
“Tricking end users into clicking on malicious links or attachments continues to be the most successful means for bad actors to gain access,” said Noel. “As is true in the case of the Adwind remote access trojan, once malware lands on a device, it often has the ability to disable antivirus and other types of endpoint detection agents loaded on the device.”
Microplastics are increasingly found in drinking water, but there is no evidence so far that this poses a risk to humans, according to a new assessment by the World Health Organization.
However, the United Nations body warned against complacency because more research is needed to fully understand how plastic spreads into the environment and works its way through human bodies.
There is no universally agreed definition of microplastics but they are generally considered to be smaller than half a millimetre across.
Plastic production has grown exponentially in recent decades and is predicted to double again by 2025, said the report, which means more beads and threads are breaking down into minute particles and winding up in water supplies, pipes, cups, throats and bellies. Studies suggest bottled drinking water even contains minuscule elements of the polymers used in the container and cap.
Also at CNN.