Join our Folding@Home team:
Main F@H site
Our team page
Support us: Subscribe Here
and buy SoylentNews Swag
We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.
San Francisco is considering a ban on delivery robots, those cute little boxes on wheels that are being tried out in Washington by Starship Industries and now in San Francisco by Marble. A supervisor used the same words I have used on TreeHugger in Sidewalks are for people. Should we let the robots steal them? April Glaser writes in Recode:
"Our streets and our sidewalks are made for people, not robots," said Supervisor Yee in an interview with Recode. "This is consistent with how we operate in the city, where we don't allow bikes or skateboards on sidewalks."... Yee worries that the robots aren't safe, saying that seniors, people with disabilities and children won't be able move out of the way quickly enough as these machines roll down city sidewalks at walking speed.
Representatives for the robots had no comment.
TechDirt reports
In the wake of the Wannacry ransomware, University of Pennsylvania researcher Sandy Clark has proposed something along these lines: firmware expiration dates. Clark argues that we've already figured out how to standardize our relationships with automobiles, with mandated regular inspection, maintenance and repairs governed by manufacturer recalls, DOT highway maintenance, and annual owner-obligated inspections. As such, she suggests similar requirements be imposed on internet-connected devices:
A requirement that all IoT software be upgradeable throughout the expected lifetime of the product. Many IoT devices on the market right now contain software (firmware) that cannot be patched even against known vulnerabilities.
A minimum time limit by which manufacturers must issue patches or software upgrades to fix known vulnerabilities.
A minimum time limit for users to install patches or upgrades, perhaps this could be facilitated by insurance providers (perhaps discounts for automated patching, and different price points for different levels of risk)."
Of course, none of this would be easy, especially when you consider this is a global problem that needs coordinated, cross-government solutions in an era where agreement on much of anything is cumbersome. And like previous suggestions, there's no guarantee that whoever crafted these requirements would do a particularly good job; that overseas companies would be consistently willing to comply; or that these mandated software upgrades would actually improve device security. And imagine being responsible for determining all of this for the 50 billion looming internet connected devices worldwide?
That's why many networking engineers aren't looking so much at the devices as they are at the networks they run on. Network operators say they can design more intelligent networks that can quickly spot, de-prioritize, or quarantine infected devices before they contribute to the next Wannacry or historically-massive DDoS attack. But again, none of this is going to be easy, and it's going to require multi-pronged, multi-country, ultra-flexible solutions. And while we take the time to hash out whatever solution we ultimately adopt, keep in mind that the 50 million IoT device count projected by 2020--is expected to balloon to 82 billion by 2025.
http://www.tomshardware.com/news/chrome-deprecates-pnacl-embraces-webassembly,34583.html
Google announced that its Portable Native Client (PNaCl) solution for making native code run inside the browser will be replaced by the new cross-browser web standard called WebAssembly.
Around the same time Google introduced Chrome OS in 2011, it also announced Native Client (NaCl), a sandboxing technology that runs native code inside the browser. This was initially supposed to make Chrome OS a little more useful offline compared to only running web apps that required an internet connection. Two years later, Google also announced PNaCl, which was a more portable version of NaCl that could work on ARM, MIPS, and x86 devices. NaCl, on the other hand, only worked on x86 chips.
Even though Google open sourced PNaCl, as part of the Chromium project, Mozilla ended up creating its own alternative called "asm.js," an optimized subset of JavaScript that could also compile to the assembly language. Mozilla thought that asm.js was far simpler to implement and required no API compatibility, as PNaCl did. As these projects seemed to go nowhere, with everyone promoting their own standard, the major browser vendors seem to have eventually decided on creating WebAssembly.
Black holes are perhaps the strangest objects predicted by Einstein's theory of General Relativity, objects so dense that gravity reigns supreme, and not even light can escape beyond a certain distance, known as the event horizon. The actual existence of black hole event horizons has not been proved, but some clever observations made by astronomers at the University of Texas at Austin and Harvard University have tested the alternative hypothesis: instead of an event horizon, there might instead be a solid surface to a black hole that objects colliding against it will hit. They found results that show that this alternative can't be true, and that an event horizon as predicted by GR is more likely. ScienceDaily has an article:
Astronomers at The University of Texas at Austin and Harvard University have put a basic principle of black holes to the test, showing that matter completely vanishes when pulled in. Their results constitute another successful test for Albert Einstein's General Theory of Relativity.
Most scientists agree that black holes, cosmic entities of such great gravity that nothing can escape their grip, are surrounded by a so-called event horizon. Once matter or energy gets close enough to the black hole, it cannot escape — it will be pulled in. Though widely believed, the existence of event horizons has not been proved.
"Our whole point here is to turn this idea of an event horizon into an experimental science, and find out if event horizons really do exist or not," said Pawan Kumar, a professor of astrophysics at The University of Texas at Austin.
Supermassive black holes are thought to lie at the heart of almost all galaxies. But some theorists suggest that there's something else there instead — not a black hole, but an even stranger supermassive object that has somehow managed to avoid gravitational collapse to a singularity surrounded by an event horizon. The idea is based on modified theories of General Relativity, Einstein's theory of gravity.
While a singularity has no surface area, the noncollapsed object would have a hard surface. So material being pulled closer — a star, for instance — would not actually fall into a black hole, but hit this hard surface and be destroyed.
The team figured out what a telescope would see when a star hit the hard surface of a supermassive object at the center of a nearby galaxy: The star's gas would envelope the object, shining for months, perhaps even years.
Once they knew what to look for, the team figured out how often this should be seen in the nearby universe, if the hard-surface theory is true.
[...] "Given the rate of stars falling onto black holes and the number density of black holes in the nearby universe, we calculated how many such transients Pan-STARRS should have detected over a period of operation of 3.5 years. It turns out it should have detected more than 10 of them, if the hard-surface theory is true," Lu said.
They did not find any.
"Our work implies that some, and perhaps all, black holes have event horizons and that material really does disappear from the observable universe when pulled into these exotic objects, as we've expected for decades," Narayan said. "General Relativity has passed another critical test."
The full text of the original paper "Stellar disruption events support the existence of the black hole event horizon" (DOI: 10.1093/mnras/stx542) is available open access from the Monthly Notices of the Royal Astronomical Society.
Further evidence for or against the existence of black hole event horizons will have to wait for the Event Horizon Telescope, which is due to release its first results later this year.
Submitted via IRC for TheMightyBuzzard
When we consider how much time young people spend on social media, negative news content may have a bad impact. And those already psychologically vulnerable may be particularly susceptible to the ill effects of a constant stream of negative news. This is because stress responses are often accentuated in those already suffering from symptoms of anxiety, depression and other mental illnesses.
So, it is encouraging to see some technology companies proactively showing concern about their users' mental health. For example, Twitter is teaming up with the youth mental health organisation ReachOut to provide resources to help young people learn about the possible negative impacts of social media, so they won't be overly consumed by it and know how to cope if they are.
This is a good start – Twitter is making more information available. But it can do more, and Twitter shouldn't be the only one doing it.
Yes, I'm certain this is exactly what is needed. Much better idea than shutting your Twitter app.
Source: The Conversation
Submitted via IRC for TheMightyBuzzard
Check Point Threat Intelligence and research teams recently discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware, Fireball, takes over target browsers and turns them into zombies. Fireball has two main functionalities: the ability of running any code on victim computers–downloading any file or malware, and hijacking and manipulating infected users' web-traffic to generate ad-revenue. Currently, Fireball installs plug-ins and additional configurations to boost its advertisements, but just as easily it can turn into a prominent distributor for any additional malware.
This operation is run by Rafotech, a large digital marketing agency based in Beijing. Rafotech uses Fireball to manipulate the victims' browsers and turn their default search engines and home-pages into fake search engines. This redirects the queries to either yahoo.com or Google.com. The fake search engines include tracking pixels used to collect the users' private information. Fireball has the ability to spy on victims, perform efficient malware dropping, and execute any malicious code in the infected machines, this creates a massive security flaw in targeted machines and networks.
[...] According to our analysis, over 250 million computers worldwide have been infected: specifically, 25.3 million infections in India (10.1%), 24.1 million in Brazil (9.6%), 16.1 million in Mexico (6.4%), and 13.1 million in Indonesia (5.2%). The United States has witnessed 5.5 million infections (2.2%).
Based on Check Point's global sensors, 20% of all corporate networks are affected. Hit rates in the US (10.7%) and China (4.7%) are alarming; but Indonesia (60%), India (43%) and Brazil (38%) have much more dangerous hit rates.
Source: http://blog.checkpoint.com/2017/06/01/fireball-chinese-malware-250-million-infection/
A study carried out by an anti-bullying charity found that 57% of the young people it surveyed had experienced bullying online when playing games.
In addition, 22% said they had stopped playing a game as a result.
Ditch the Label surveyed around 2,500 young members of the virtual hotel platform Habbo, aged between 12 and 25.
One 16-year-old gamer, Bailey Mitchell, told the BBC he had experienced bullying while playing online games since the age of 10.
"If you're going to school every day and you're being bullied in school you want to go home to your computer to escape," he said.
"So if you're getting more abuse thrown at you it's going to put you off doing anything social - it has for a lot of people I know, me included.
"It's regular, every other game you're in, there's always someone who has a mic or types in chat. They'll call you some random abusive thing they can think of."
Indeed, young gamers should stop bullying old people in online games.
NPR, formerly National Public Radio, reports
Timothy Loehmann, the police officer who shot and killed 12-year-old Tamir Rice in 2014, was fired by the Cleveland Police Department [May 30]. At a news conference, city authorities announced that the reason for his termination wasn't the deadly incident that brought him to national attention, but rather violations he committed in the course of his hiring process.
"Patrol officer Loehmann had been charged with rule violations concerning his application process to be considered a cadet with the Division of Police--specifically, answers he had provided on his personal history statement", Michael McGrath, the city's director of public safety, told reporters in prepared remarks.
The Cleveland Plain Dealer explains that Loehmann failed to disclose the full circumstances of how his time at a previous police department ended:
"Loehmann was allowed to resign from the Independence department after six months following a series of incidents where supervisors determined he was unfit to be a police officer.
"The disciplinary letter cites a letter in Loehmann's personnel file from Independence that says he was emotionally immature and had 'an inability to emotionally function'. The letter also cites an emotional breakdown Loehmann had on the gun range in Independence."
Cleveland authorities also announced that Frank Garmback, the officer driving the patrol car at the time Loehmann shot Tamir, would be suspended for 10 days for administrative rule violations of his own. He would also be required to take a tactical training course.
The penalties cap a review process conducted by Cleveland's Critical Incident Review Committee, or CIRC, in the wake of Tamir's death and the widespread protests it elicited. As the Plain Dealer reported last month, CIRC already "found no fault in the officers' actions leading up to, during and after the Nov. 22, 2014 shooting at Cudell Recreation Center on Cleveland's West Side".
The Electronic Frontier Foundation has filed a Freedom of Information Act lawsuit against the Federal Bureau of Investigation to obtain records related to the FBI's secret relationship with Best Buy's Geek Squad:
Sending your computer to Best Buy for repairs shouldn't require you to surrender your Fourth Amendment rights. But that's apparently what's been happening when customers send their computers to a Geek Squad repair facility in Kentucky.
We think the FBI's use of Best Buy Geek Squad employees to search people's computers without a warrant threatens to circumvent people's constitutional rights. That's why we filed a Freedom of Information Act (FOIA) lawsuit today against the FBI seeking records about the extent to which it directs and trains Best Buy employees to conduct warrantless searches of people's devices. Read our complaint here [PDF].
EFF has long been concerned about law enforcement using private actors, such as Best Buy employees, to conduct warrantless searches that the Fourth Amendment plainly bars police from doing themselves. The key question is at what point does a private person's search turn into a government search that implicates the Fourth Amendment.
Previously: Cooperation Alleged Between Best Buy and the FBI
http://www.kurzweilai.net/common-antioxidant-could-slow-symptoms-of-aging-in-human-skin
University of Maryland (UMD) researchers have found evidence that a common, inexpensive, and safe antioxidant chemical called methylene blue could slow the aging of human skin, based on tests in cultured human skin cells and simulated skin tissue.
"The effects we are seeing are not temporary. Methylene blue appears to make fundamental, long-term changes to skin cells," said Kan Cao, senior author on the study and an associate professor of cell biology and molecular genetics at UMD.
The researchers tested methylene blue for four weeks in skin cells from healthy middle-aged donors, as well as those diagnosed with progeria — a rare genetic disease that mimics the normal aging process at an accelerated rate. The researchers also tested three other known antioxidants: N-Acetyl-L-Cysteine (NAC), MitoQ and MitoTEMPO (mTEM).
In these experiments, methylene blue outperformed the other three antioxidants, improving several age-related symptoms in cells from both healthy donors and progeria patients. The skin cells (fibroblasts, the cells that produce the structural protein collagen) experienced a decrease in damaging molecules known as reactive oxygen species (ROS), a reduced rate of cell death, and an increase in the rate of cell division throughout the four-week treatment.
Next, Cao and her colleagues tested methylene blue in fibroblasts from older donors (>80 years old), again for a period of four weeks. At the end of the treatment, the cells from older donors had experienced a range of improvements, including decreased expression of two genes commonly used as indicators of cellular aging: senescence-associated beta-galactosidase and p16.
Anti-Aging Potentials of Methylene Blue for Human Skin Longevity (open, DOI: 10.1038/s41598-017-02419-3) (DX)
From Phys.org:
Global food consumption and production is seriously unbalanced. In the UK alone we threw away 4.4 million tonnes of "avoidable" food waste in 2015 – that is food that was edible before it was discarded – which equates to £13 billion worth of food wasted, or £470 per household. Meanwhile, nearly 800 million people globally are chronically undernourished.
The world population is projected to grow to 9 billion people by the middle of this century. We face a huge challenge in finding ways to adequately feed this rapidly growing population whilst also protecting the natural environment.
However it is not just the amount of food production and the balance of its distribution that are key concerns for sustainably feeding the planet. We also need to think about what we are eating.
Presently western diets are characterised by a high proportion of animal foodstuffs, and this is a problem not just for our health, but for the environment. The Hunger Project has cited climate change as one of the hidden sources of hunger. In doing so it highlights how food production and the environment are inextricably linked.
Meat and dairy production requires more land, more water and has higher greenhouse gas emissions than plant based alternatives. As the global population continues to grow, we will need to be ever more prudent with the resources that are required for food production. We must consider whether the proportion of resources currently devoted to meat and dairy production is optimal given the numbers needing to be fed and the environmental impacts such diets can cause.
OneLogin, an online service that lets users manage logins to sites and apps from a single platform, says it has suffered a security breach in which customer data was compromised, including the ability to decrypt encrypted data.
Headquartered in San Francisco, OneLogin provides single sign-on and identity management for cloud-base applications. OneLogin counts among its customers some 2,000 companies in 44 countries, over 300 app vendors and more than 70 software-as-a-service providers.
A breach that allowed intruders to decrypt customer data could be extremely damaging for affected customers. After OneLogin customers sign into their account, the service takes care of remembering and supplying the customer's usernames and passwords for all of their other applications.
In a brief blog post Wednesday, OneLogin chief information security officer Alvaro Hoyos wrote that the company detected unauthorized access to OneLogin data.
"Today we detected unauthorized access to OneLogin data in our US data region. We have since blocked this unauthorized access, reported the matter to law enforcement, and are working with an independent security firm to determine how the unauthorized access happened and verify the extent of the impact of this incident. We want our customers to know that the trust they have placed in us is paramount."
"While our investigation is still ongoing, we have already reached out to impacted customers with specific recommended remediation steps and are actively working to determine how best to prevent such an incident from occurring in the future and will update our customers as these improvements are implemented."
[...] Update 7:54 p.m ET: OneLogin posted an update to its blog with more details about the breach:
“Our review has shown that a threat actor obtained access to a set of AWS keys and used them to access the AWS API from an intermediate host with another, smaller service provider in the US. Evidence shows the attack started on May 31, 2017 around 2 am PST. Through the AWS API, the actor created several instances in our infrastructure to do reconnaissance. OneLogin staff was alerted of unusual database activity around 9 am PST and within minutes shut down the affected instance as well as the AWS keys that were used to create it.”
Source: KrebsonSecurity
See also:
Ars Technica
[Ed Note: What follows is the official press release from President Donald Trump at the White House. It marks the official stance of the United States pulling out of the Paris Agreement. Though there is certainly a political aspect to this, I would like to see if we can try to avoid political bickering and focus discussion on the actual details of the press release. See, also, our previous coverage, Report: Trump Plans to Exit Paris Climate Agreement. --martyb]
For Immediate Release
June 01, 2017
President Trump Puts American Jobs First
“Our government rushed to join international agreements where the United States pays the costs and bears the burdens while other countries get the benefit and pay nothing.” – President Donald J. Trump
ALREADY THE WORLD’S ENERGY LEADER: The United States had already become the leader in cutting CO2 emissions while still leading in oil & gas production.
HARMFUL TO THE AMERICAN PEOPLE: The Paris Climate Accord could cost the United States economy millions of jobs and trillions of dollars in economic output over the next several decades.
SHOULDERING THE BURDEN: Under the Paris Climate Accord, the United States would carry the burden while other countries would get the benefits.
INEFFECTIVE: Even if every nation fully complied with the Paris Climate Accord, it would barely impact the climate.
PROMISE TO THE AMERICAN PEOPLE: President Trump is fulfilling his promise to the American people to stop international agreements that disadvantage the United States.
https://nest.com/camera/meet-nest-cam-iq/
Nest plans to bring a new camera to their lineup with 4k resolution and facial recognition. It appears the facial recognition actually takes place on Nest/Google Servers rather than on the camera. It seems like that feature could be extended to the existing camera lineup, but perhaps the higher resolution is required to make this effective.
Also included is a better WiFi antenna system in the camera to compensate for the fact that these cams are often placed at the edge of your WiFi envelope. MiMo moving out of the routers into the clients.
So how creepy can this get? Will Nest start federating the facial recognition from all its subscribers so you have names of people you don't even know as the arrive at your doorstep for the first time?
The Laser Interferometer Gravitational-Wave Observatory (LIGO) announced an observation of the merger of two black holes observed on 2017-01-04 having masses of approximately 31 and 19 times the mass of our sun (M⊙) at a distance of approximately 880 Mpc (megaparsec) or approximately 2.8 billion light years.
From the full open access report (pdf) which was published in Physical Review Letters, by the American Physical Society (DOI: 10.1103/PhysRevLett.118.221101):
We describe the observation of GW170104, a gravitational-wave signal produced by the coalescence of a pair of stellar-mass black holes. The signal was measured on January 4, 2017 at 10:11:58.6 UTC by the twin advanced detectors of the Laser Interferometer Gravitational-Wave Observatory during their second observing run, with a network signal-to-noise ratio of 13 and a false alarm rate less than 1 in 70,000 years. The inferred component black hole masses are 31.2+8.4
−6.0 M⊙ and 19.4+5.3
−5.9 M⊙ (at the 90% credible level). The black hole spins are best constrained through measurement of the effective inspiral spin parameter, a mass-weighted combination of the spin components perpendicular to the orbital plane, χeff = −0.12+0.21
−0.30. This result implies that spin configurations with both component spins positively aligned with the orbital angular momentum are disfavored. The source luminosity distance is 880+450
−390 Mpc corresponding to a redshift of z = 0.18+0.08
−0.07. We constrain the magnitude of modifications to the gravitational-wave dispersion relation and perform null tests of general relativity. Assuming that gravitons are dispersed in vacuum like massive particles, we bound the graviton mass to mg ≤ 7.7 × 10−23 eV/c2. In all cases, we find that GW170104 is consistent with general relativity.[...] The first observing run of the Advanced Laser Interferometer Gravitational-Wave Observatory (LIGO) [1] identified two binary black hole coalescence signals with high statistical significance, GW150914 [2] and GW151226 [3], as well as a less significant candidate LVT151012 [4,5]. These discoveries ushered in a new era of observational astronomy, allowing us to investigate the astrophysics of binary black holes and test general relativity (GR) in ways that were previously inaccessible [6,7]. We now know that there is a population of binary black holes with component masses ≳25M⊙ [5,6], and that merger rates are high enough for us to expect more detections [5,8]. Advanced LIGO’s second observing run began on November 30, 2016. On January 4, 2017, a gravitational wave signal was detected with high statistical significance. Figure 1 shows a time-frequency representation of the data from the LIGO Hanford and Livingston detectors, with the signal GW170104 visible as the characteristic chirp of a binary coalescence.
B.P. Abbott et al. (Full author list appears at the end of the linked journal article).
Published by the American Physical Society under the terms of the Creative Commons Attribution 4.0 International license. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI.
Once again, no visual confirmation. This time possibly due to technical issues with one detector:
The event candidate was not reported by the low-latency analysis pipelines because re-tuning the calibration of the LIGO Hanford detector is not yet complete after the holiday shutdown. This resulted in a delay of over 4 hours before the candidate could be fully examined. We are confident that this is a highly significant event candidate, but the calibration issue may be affecting the initial sky maps.
See also:
https://dcc.ligo.org/LIGO-P170104/public