Join our Folding@Home team:
Main F@H site
Our team page
Support us: Subscribe Here
and buy SoylentNews Swag
We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.
THE NATIONAL SECURITY Agency knows Edward Snowden disclosed many of its innermost secrets when he revealed how aggressive its surveillance tactics are. What it doesn't know is just how much information the whistle-blower took with him when he left.
For all of its ability to track our telecommunications, the NSA seemingly has little clue exactly what documents, or even how many documents, Snowden gave to the media. Like most large organizations, the NSA had tools in place to track who accessed what data and when. But Snowden, a system administrator, apparently was able to cover his tracks by deleting or modifying the log files that tracked that access.
An Estonian company called Guardtime says it has a solution to that: using the same ideas that underpin the digital currency Bitcoin, the company says it can ensure no one can alter digital files, not even an organization's most senior executives or IT managers. The idea is to stop the next Snowden in his tracks by making it impossible to tamper with data, such as the NSA log files, in secret.
The Office of Personnel Management has confirmed that around 4 million current and past employees have been affected by a data breach, potentially exposing personal data. Unnamed U.S. officials say that the hackers were from China.
Here is the U.S. Office of Personnel Management's statement:
The U.S. Office of Personnel Management (OPM) recently became aware of a cybersecurity incident affecting its systems and data that may have compromised the personal information of current and former Federal employees.
Within the last year, OPM has undertaken an aggressive effort to update its cybersecurity posture, adding numerous tools and capabilities to its networks. As a result, in April 2015, OPM became aware of the incident affecting its information technology (IT) systems and data that predated the adoption of these security controls.
Since the incident was identified, OPM has partnered with the U.S. Department of Homeland Security's U.S. Computer Emergency Readiness Team (US-CERT), and the Federal Bureau of Investigation to determine the impact to Federal personnel. OPM immediately implemented additional security measures to protect the sensitive information it manages.
Beginning June 8 and continuing through June 19, OPM will be sending notifications to approximately 4 million individuals whose Personally Identifiable Information was potentially compromised in this incident. The email will come from opmcio@csid.com and it will contain information regarding credit monitoring and identity theft protection services being provided to those Federal employees impacted by the data breach. In the event OPM does not have an email address for the individual on file, a standard letter will be sent via the U.S. Postal Service.
In order to mitigate the risk of fraud and identity theft, OPM is offering affected individuals credit monitoring services and identity theft insurance with CSID, a company that specializes in identity theft protection and fraud resolution. This comprehensive, 18-month membership includes credit report access, credit monitoring, identity theft insurance, and recovery services and is available immediately at no cost to affected individuals identified by OPM.
Additional information is available beginning at 8 a.m. CST on June 8, 2015 on the company's website, www.csid.com/opm, and by calling toll-free 844-222-2743 (International callers: call collect 512-327-0700).
Home and small-office routers is a hot target for security audits. Vulnerabilities and poor security practices is becoming the rule, rather than the exception. Researchers from Universidad Europea de Madrid found 60 distinct flaws in 22 devices. Full details of their research can be read in the Full Disclosure mailing list. Affected brands include D-Link, Belkin, Linksys, Huawei, and others. Among the flaws are at least one backdoor with a hard-coded password. Several routers allow external attackers to delete files on USB storage devices, and others facilitate DDoS attacks. About half of the flaws involve Cross Site Scripting and Cross Site Request Forgery capabilities
Summary: COTS Embedded devices don't have security you can rely on, but why is that so? OpenWRT may be an alternative.
Patients with terminal cancer could "effectively be cured" by the discovery of a pair of drugs which can shrink tumours or bring them under control in nearly 60% of people with advanced melanoma.
In an international trial of 945 patients, treatment with the drugs ipilimumab and nivolumab stopped the cancer advancing for nearly a year in 58% of cases. This was compared with 19% of cases for ipilimumab alone, which resulted in tumours stabilising or shrinking for an average of two and a half months.
The treatment, known as immunotherapy, uses the body's immune system to attack cancerous cells. Researchers say it could replace chemotherapy as the standard treatment for cancer within five years.
[Paper]: http://www.nejm.org/doi/full/10.1056/NEJMoa1504030#t=article
Atlanta-based attorney Scott A. Horstemeyer has sued the Electronic Frontier Foundation (EFF) and "Staff Attorney and Mark Cuban Chair to Eliminate Stupid Patents" Daniel Nazer for libel over an April blog post that bashed patent litigant Eclipse IP LLC for US Patent No. 9,013,334, "Notification systems and methods that permit change of quantity for delivery and/or pickup of goods and/or services." The patent was filed by "prolific inventor" Scott Horstemeyer on March 5, 2014. EFF explains:
We think that all of Eclipse's patents deserve a stupid patent of the month award. But the '334 patent is especially deserving. This is because the Patent Office issued this patent after a federal court invalidated similar claims from other patents in the same family. On September 4, 2014, Judge Wu of the Central District of California issued an order invalidating claims from three of Eclipse's patents. The court explained that these patents claim abstract ideas like checking to see if a task has been completed. Judge Wu applied the Supreme Court's recent decision in Alice v CLS Bank and held the claims invalid under Section 101 of the Patent Act.
All of Eclipse's patents were both "invented" and prosecuted by a patent attorney named Scott Horstemeyer (who just so happens to have prosecuted Arrivalstar's patents too). Patent applicants and their attorneys have an ethical obligation to disclose any information material to patentability. Despite this, from what we can tell from the Patent Office's public access system PAIR, Horstemeyer did not disclose Judge Wu's decision to the examiner during the prosecution of the '334 patent, even though the decision invalidated claims in the patent family. While Horstemeyer has not made any genuine contribution to notification "technology," he has shown advanced skill at gaming the patent system.
EFF has managed to get "stupid" patents invalidated by the U.S. Patent and Trademark Office, such as the one that was used to threaten podcasters. You can follow Horstemeyer's litigation against EFF here.
The Scientist reports on a study of a villages in Argentina, where the people have been drinking poison—arsenic, to be specific—for thousands of years. The levels in the principal water source is up to 80 times the level considered to be safe by the World Health Organization (WHO). Even the best wells exhibit over 20 times the arsenic allowed in the WHO limit.
And it doesn't seem to bother them at all. There is every indication that these Andean communities may have evolved the ability to metabolize arsenic.
Swedish biologist Karin Broberg, of Stockholm’s Karolinska Institute, and colleagues at Uppsala and Lund Universities have been trying to figure out how generations of villagers in the Andean village of San Antonio de los Cobres (SAC), an area of nearly 6,000 residents, have been able to survive this chronic exposure to toxic levels of arsenic.
The researchers knew that a particular allele, AS3MT, located on chromosome 10, was suspected as the main gene involved in arsenic metabolism in humans. But the metabolism rate in these Andean villagers was sky high compared to people elsewhere.
Broberg and her colleagues hypothesized that the remarkable arsenic tolerance of SAC residents might be due to particular variants of AS3MT that confer better arsenic metabolism. They wondered, further, if thousands of years of arsenic exposure had given a survival advantage to individuals with these metabolism-driving alleles and had increased the frequencies of these genetic variants.
By comparing genetic samples and urine from a wide selection of South American populations in Peru, Argentina, and Columbia, they hoped to determine if the arsenic tolerance was simply due to genetic accident, (population drift) or if it was a byproduct of natural selection. Natural selection tends to exhibit itself via higher levels of homozygosity, where particular alleles come from one lineage. (See here for a primer on Drift vs Selection.
In the area around AS3MT, the SAC population differed dramatically from the comparison populations. Not only did the SAC women have higher levels of protective AS3MT alleles, but these alleles also had longer stretches of homozygosity—a telltale sign of selection.
The extremely strong difference in allele frequency is considered a clear result of selective pressure on a population.
SSH, or secure shell, is the mainstay of remote access and administration in the Linux world, and the lack of any straightforward equivalent has always been an awkward feature of the Windows world. While there are various third-party options, Windows lacks both a native SSH client, for connecting to Linux machines, and it lacks an SSH server, to support inbound connections from Linux machines.
The PowerShell team announced that this is going to change: Microsoft is going to work with and contribute to OpenSSH, the de facto standard SSH implementation in the Unix world, to bring its SSH client and server to Windows.
Possible plot twist: Is this newfound support for the SSH protocol and the OpenSSH project actually a new "in" for the NSA to sneak a new backdoor into the protocol?
The brain is truly a marvel. A seemingly endless library, whose shelves house our most precious memories as well as our lifetime’s knowledge. But is there a point where it reaches capacity? In other words, can the brain be “full”?
The answer is a resounding no, because, well, brains are more sophisticated than that. A study published in Nature Neuroscience earlier this year shows that instead of just crowding in, old information is sometimes pushed out of the brain for new memories to form.
Previous behavioural studies [PDF] have shown that learning new information can lead to forgetting. But in this study, researchers used new neuroimaging techniques to demonstrate for the first time how this effect occurs in the brain.
http://theconversation.com/health-check-can-your-brain-be-full-40844
Moving on from frontend stuff, I'm getting to the point that I want to dig in deep and rewrite most of the database layer of SoylentNews/rehash. For those who are unfamiliar with our codebase, its primarily written in perl, with fairly strict adherence to the MVC model, going as far as installing system modules for code shared between the frontend and backend daemons. Slash was written with database portability in mind, and at least historically, a port to postgreSQL existed in the late 90s/early 2000s, and there was some legacy Oracle code authored by VA Linux as well. This code has bitrotted to the point of unusability, leaving the MySQL backend the only functional mode; I deleted the legacy code about a year ago from our git repo.
However, migrating from MySQL has remaining on my personal TODO list for a long time, due to unreliability, data corruption, and configuration pain. The obvious choice from where I'm sitting is postgreSQL. For those who aren't super familiar with the pro/cons with MySQL, this article by Elnur Abdurrakhimov has a pretty good summary and a list of links explaining in-depth why MySQL is not a good solution for any large site. We've hit a lot of pain in the nearly 1.5 years SN has been up due to limitations in the database layer as well, forcing us to use a clustering solution to provide any sort of real redundancy for our backend. Although I'm familiar with database programming, I'm not a DBA by trade, so I'm hoping to tap into the collective knowledge of the SoylentNews community and work out a reasonable migration plan and design.
[More after the break...]
Beside my personal dislike of MySQL, there's a more important reason to migrate from MySQL. MySQL's support for stored procedures is incredibly poor, which means raw SQL has to be written in the application layer. rehash reduces the danger of injection by providing a set of wrapper functions such as select/insert/update which take four arguments: table, from clause, where clause, and anything extra if necessary; these parameters are assembled into a full query which is in turn properly escaped to prevent most obvious attacks from working. Extensive whitelists are used for sanitizing parameters, but by design, rehash uses a single namespace, with a single user account which has full SELECT/INSERT/UPDATE/DELETE permissions across the board. If any single point is compromised, the entire database is toast. Furthermore, because of poor support for views in MySQL, massive JOINs litter the codebase, making some queries reaching across 5-6 tables (with the most horrific example I can think of being the modbomb SELECT which reaches across almost every user and comment table in the database). This makes debugging and optimizing anything a slow and *painful experience.
What I want to do is remove as much code out of the application layer, and move it down the stack into the database. Each function in Slash/DB/MySQL/MySQL.pm should be replicated with a stored procedure which at a minimum executes the query, and if possible, relocate as much of query processing logic into pg/Perl modules. This should be relatively straightforward to implement, and allow high code reusability due to the fact that almost all of rehash's methods exist in perl modules, and not in individual .pl scripts. The upshot of this is that the only permission the DB account requires is EXECUTE to run the stored procedures; if possible, I'd also like to localize which perl function can call which pgSQL procedure; i.e., the getStories() function can only call procedures relating to that, vs. having access to all stored procedures in the database.
This would greatly reduce the reach of any SQL injection attacks, as well as hardening the site against possible compromise; unrestricted access to the database would require breaching one of the DB servers directly instead of getting lucky via a bug in rehash. As I've stated before, no security can be perfect, but I would love to get this site to the point that only a dedicated, targeted attack would even stand a chance of succeeding. That being said, while it sounds good on paper, I'm not 100% sure this type of design is reasonable. Very few FOSS projects seem to take advantage of stored procedures, triggers, views and other such functionality and I'm wondering if others have tried and failed to implement this level of functionality.
So, knowing what you want to do is good, but knowing how to do it is just as important. What I think the first step needs to be is a basic straight-port of the site from MySQL to postgreSQL, and implement a better schema upgrade system. As of right now, our upgrade "system" is writing queries in a text file, and just executing them when a site upgrade has to be done. Very low-tech, and error prone for a large number of queries. I don't have a lot of experience in managing very large schemas, so one thing on which I'd like advice is if there's a good, pre-existing framework that could be used to simplify our database upgrades. By far, the ideal scenario would be if we could run a single script which can intelligently upgrade the database from release to release.
Once both these pieces are in play, a slow but steady migration of code from the application layer to the database layer would allow us to handle the transition in a sane manner. Database auditing can be used to keep track of the most frequently used queries and function calls, and keep an eye on our total progress towards reaching an EXECUTE-only world.
That's everything in a nutshell. I want to know what you guys think, and as always, I'll be reading and replying to comments down below!
~ NCommander
Contact me, or paulej72 on IRC, or post a comment below if you're interested in helping.
The San Jose Mercury News reports
A South Bay [Milpitas, California] recycling firm is looking for a woman who, in early April, dropped off boxes of electronics that she had cleaned out from her house after her husband died. About two weeks later, the firm, Clean Bay Area, discovered inside one of the boxes a rare find: a vintage Apple I, one of only about 200 first-generation desktop computers put together by Steve Jobs, Steve Wozniak, and Ron Wayne in 1976.
The recycling firm sold the Apple I this month for $200,000 to a private collection, Vice President Victor Gichun said. And now, because company policy is to split proceeds 50-50 with the donor, he's looking for the mystery woman who refused to get a receipt or leave her name.
Claire Nee writes in the NYT that for psychologists it’s best to observe actual behavior. Yet for obvious ethical and safety reasons, it’s almost never possible to observe a crime as it happens. To establish “proof of concept,” researchers had to show that experienced ex-burglars would burgle a simulated house the same way they burgled a real house. So they had them actually burgle a house provided by a local police department in a quiet residential area. At the real house, participants wore head-mounted cameras and were asked to start at the front gate, enter the house and burgle it in their own time by touching the items they would take in a real burglary. Then the psychologists observed the ex-burglars commit a mock burglary in a simulated environment that could be navigated using a mouse or a game controller. Items (of value and otherwise) were placed in identical spots in the real house and in the simulated house, and in the latter could be “stolen” by clicking on them.
From previous interviews and experimental studies, burglars had alluded to what is called “dysfunctional expertise” in the way they approach the environment, select their targets and navigate around the property, and it was fascinating to see this unfold in real time. Can security measures help keep a house safe? Not really, according to Nee. "Good security is a deterrent but householders are notoriously bad at actually using the devices they install, so this is rarely a problem for the burglar," she says. "Most burglars will return to a vulnerable neighborhood or street later when they are ready to do the burglary. So they have a lot of competence at choosing properties to burgle and are rarely caught at the scene. Most burglaries are neither impulsive nor heavily planned."
Experienced burglars spent significantly more time in areas of the house with high-value items and navigated it much more systematically than the control subjects did. They also showed greater discernment, by stealing fewer but more valuable items. Most important, all participants burgled the real and the simulated houses almost identically (PDF). The researchers concluded that using simulations can be a robust way to study crime, and in studying it this way, we will not be limited to just burglary. "A better understanding of criminal behavior will help us reduce opportunities for crime in our neighborhoods," concludes Nee. "By knowing what the burglar is looking for — what signals wealth, occupancy, ease of access and security in properties — we can make adjustments in awareness and protection."
Angie Schmitt writes in Streetsblog USA that city streets with the widest lanes — 12 feet or wider — are associated with greater crash rates and higher impact speeds and that there is hard evidence that wider lanes increase risk on city streets. Dewan Masud Karim conducted a wide-ranging review of existing research as well as an examination of crash databases in two cities, taking into consideration 190 randomly selected intersections in Tokyo and 70 in Toronto. Looking at the crash databases, Karim found that collision rates escalate as lane widths exceed about 10.5 feet. According to Karim "human behavior is impacted by the street environment, and narrower lanes in urban areas result in less aggressive driving and more ability to slow or stop a vehicle over a short distance to avoid collision. Designers of streets can utilize the “unused space” to provide an enhanced public realm, including cycling facilities and wider sidewalks, or to save money on the asphalt not used by motorists." Karim concluded that there is a sweet spot for lane widths on city streets, between about 10 and 10.5 feet.
According to Jeff Speck the fundamental error that underlies the practice of traffic engineering is an outright refusal to acknowledge that human behavior is impacted by its environment and it applies to safety planning, as traffic engineers, designing for the drunk who's texting at midnight, widen our city streets so that the things that drivers might hit are further away. "When lanes are built too wide, many bad things happen. In a sentence: pedestrians are forced to walk further across streets on which cars are moving too fast and bikes don't fit," writes Speck adding that a pedestrian hit by a car traveling 30 mph at the time of impact is between seven and nine times as likely to be killed as one hit by a car traveling 20 mph This tremendously sharp upward fatality curve means that, at urban motoring speeds, every single mile per hour counts. "Every urban 12-foot lane that is not narrowed to 10 feet represents a form of criminal negligence; every injury and death, perhaps avoidable, not avoided—by choice."
Nantero, the company that invented carbon nanotube-based non-volatile memory in 2001 and has been developing it since, has announced that seven chip fabrication plants are now manufacturing its Nano-RAM (NRAM) wafers and test chips in preparation for mass production, which requires the product designs to be completed. The company has announced that aerospace giant Lockheed Martin and Schlumberger Ltd., the world's largest gas and oil exploration and drilling company, will be customers seeking to use its chip technology. The memory, which can withstand 300 °C temperatures for years without losing data, is natively thousands of times faster than NAND flash and has virtually infinite read/write resilience. Nantero plans on licensing its intellectual property to allow others to create gum stick SSDs using DDR4 interfaces. NRAM has the potential to create memory that is vastly more dense that NAND flash, as its transistors can shrink to below 5 nanometers in size, three times more dense than today's densest NAND flash. At the same time, NRAM is up against a robust field of new memory technologies that are expected to challenge NAND flash in speed, endurance and capacity, such as Phase-Change Memory and Ferroelectric RAM (FRAM).
You may want to take a look at Memristors too.
The FBI is operating a small air force with scores of low-flying planes across the country carrying video and, at times, using cellphone surveillance technology — all hidden behind fictitious companies that are fronts for the government, per the Associated Press. The planes' surveillance equipment is generally used without a judge's approval.
From the article:
U.S. law enforcement officials confirmed for the first time the wide-scale use of the aircraft, which the AP traced to at least 13 fake companies, such as FVX Research, KQM Aviation, NBR Aviation and PXW Services. Even basic aspects of the program are withheld from the public in censored versions of official reports from the Justice Department's inspector general.
At least one Senator, Charles Grassley, chairman of the Senate Judiciary Committee, is concerned:
It's important that federal law enforcement personnel have the tools they need to find and catch criminals. But whenever an operation may also monitor the activities of Americans who are not the intended target, we must make darn sure that safeguards are in place to protect the civil liberties of innocent Americans.
These planes have the capability of mimicking cell towers and monitoring cell phones in the area, even if not in use. The FBI isn't the only agency doing this either, apparently. The DEA and Marshall's service also are operating their own fleets.