2020-07-01 00:00:00 ..
2020-07-06 14:30:24 UTC
2020-07-07 03:15:40 UTC
We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.
A leading medical-research institution working on a cure for Covid-19 has admitted it paid hackers a $1.14m (£910,000) ransom after a covert negotiation witnessed by BBC News.
The Netwalker criminal gang attacked University of California San Francisco (UCSF) on 1 June.
IT staff unplugged computers in a race to stop the malware spreading.
And an anonymous tip-off enabled BBC News to follow the ransom negotiations in a live chat on the dark web.
[...] At first glance, its dark-web homepage looks like a standard customer-service website, with a frequently asked questions (FAQ) tab, an offer of a "free" sample of its software and a live-chat option.
But there is also a countdown timer ticking down to a time when the hackers either double the price of their ransom, or delete the data they have scrambled with malware.
Also at Security Week.
A security engineer who uses the nickname "Cturt" has hacked a PlayStation 2 console and managed to make it run any game title that he burns on a DVD. We're not talking about pirated games here, but titles that were never meant to run on a PS2, like the classic Mario platformer, for example. The man is calling the hack "FreeDVDBoot" and claims that no hardware intervention or any other type of mods are required to make it work. All that is needed is the exploitation of an existing flaw that triggers a read overflow vulnerability.
The researcher gives all the technical details on his write-up, saying that he had to experiment with emulators a lot in order to figure out the crucial aspects that hide behind Sony's proprietary container format (VOB) used on the PS2 DVD disk reading system. The hacker looked specifically for buffer overflow vulnerabilities in the "getDiscData" call system and found four of them. The existence of these flaws means that if a disc specifies lengths larger than allowed, one can trigger a buffer overflow exploit. Based on this and some luck on the existence of valid memory jumps that occur in regions that can be modified, a series of corruption states can be achieved.
A similar exploit may work with the PS1, which only supports CDs, and the PS3 and PS4, which both support Blu-ray discs. The security engineer may be eligible to earn up to $50,000 for a working PS4 exploit.
PlayStation 2 was released in Japan in March 2000, and discontinued worldwide in January 2013.
Also at Ars Technica.
The EFF has revealed it is teaming up with law firm Durie Tangri to defend the Internet Archive against a lawsuit targeting its Open Library. According to court filings, the impending storm is shaping up to be a battle of the giants, with opposing attorneys having previously defended Google in book scanning cases and won a $1bn verdict for the RIAA against ISP Cox.
In March and faced with the chaos caused by the coronavirus pandemic, the Internet Archive (IA) launched its National Emergency Library (NEL). Built on its existing Open Library, the NEL provided users with unlimited borrowing of more than a million books, something which the IA hoped would help "displaced learners" restricted by quarantine measures.
After making a lot of noise in opposition to both the Open and Emergency libraries, publishers Hachette, HarperCollins, John Wiley and Penguin Random House filed a massive copyright infringement lawsuit against the Internet Archive.
[...] Last evening the EFF announced that it is joining forces with California-based law firm Durie Tangri to defend the Internet Archive against a lawsuit which they say is a threat to IA's Controlled Digital Lending (CDL) program. The CDL program allows people to check out scanned copies of books for which the IA and its partners can produce physically-owned copies. The publishers clearly have a major problem with the system but according to IA and EFF, the service is no different from that offered by other libraries. "EFF is proud to stand with the Archive and protect this important public service," says EFF Legal Director Corynne McSherry.
Previously: Internet Archive Suspends E-Book Lending "Waiting Lists" During U.S. National Emergency
Authors Fume as Online Library "Lends" Unlimited Free Books
University Libraries Offer Online "Lending" of Scanned In-Copyright Books
Publishers Sue the Internet Archive Over its Open Library, Declare it a Pirate Site
Internet Archive Ends "Emergency Library" Early to Appease Publishers
The attack is a variation that uses favicons, but with a twist. Malicious code was tracked back to a malicious domain, cddn[.]site, that is loaded via a favicon file. While the code itself did not appear malicious at first glance, a field called "Copyright" in the metadata field loaded the card skimmer using an[sid] header tag, specifically via an HTML onerror event, which triggers if an error occurs when loading an external resource.
The Magecart group obfuscated the code within the EXIF[*] data, and unusually, will not simply send stolen data via text to a command-and-control server (C2). Instead, data collected is also sent as image files via POST requests.
"The threat actors probably decided to stick with the image theme to also conceal the exfiltrated data via the favicon.ico file," the researchers say.
It is thought that Magecart Group 9 is to blame, due to links made by security researcher @AffableKraut to domains and registrars also hosting scripts using the EXIF technique.
[*] EXIF: Exchangeable image file format.
On June 23, Microsoft released Microsoft Defender Advanced Threat Protection (ATP) for Linux for general use.
But before you get excited while you could use this on a Linux desktop, this version of ATP is not meant for the desktop. It's to protect Linux servers from server and network threats. If you want protection for your standalone desktop, you're better off with a such as ClamAV or Sophos Antivirus for Linux.
For sysadmins and security pros, Microsoft Defender Security Center is now available for monitoring and managing security across the full spectrum of enterprise desktop and server platforms -- Android, Windows, Windows Server, macOS, and Linux.
[20200629_140251 UTC: Update 1: Encourage taking care of personal/local needs, first.]
[20200629_191024 UTC: Update 2: Added stretch goal of $1000.00 ]
[20200630_023201 UTC: Update 3: Increased stretch goal from $1000.00 to $2000.00]
[20200630_023201 UTC] What is possibly one of the worst things to hear from an editor? "I'm at a loss for words." Well, it's happened. The SoylentNews community has done it, again! We started today needing $800 to cover projected operating expenses of $3500 for the first half of the year. And you did it! So, I added a stretch goal of an additional $1000. Now you have gone and reached that goal, too! We'd run at a significant loss ($6000 so far), so that is very much appreciated! THANK-YOU!!!. Stretch goal has now been increased to $2000 [so we can continue to track your subscriptions in the Site News block]. Dare I hope? --martyb
[20200629_191024 UTC] The SoylentNews community is AMAZING! In these especially difficult circumstances, we've reached our original goal for ongoing expenses... and then some!
We started today (Monday June 29) needing over $700.00 to cover projected operating expenses for the first half of the year.
We not only reached our original goal of $3500.00, but I added a stretch goal of $1000.00 and we are already 66% of the way to reaching *that*!
Why a stretch goal? Because we have been running at a deficit for a few years. We are are still about $6,000.00 short of having sufficient funds to pay back our benefactor's original $10,000.00 outlay. Any additional funds raised will go towards that purpose whilst giving us a larger safety cushion. --martyb
The original story (after performing Update #1) appears below:
SoylentNews could use your help.
tl;dr The first half of our fiscal year runs Wed. January 1 through Tue. June 30, inclusive. We are at 80% of the funds needed to cover our expenses for the period. If money is tight for you, take care of yourself first. But, if you can help, it would mean a lot to help us to continue to be here for you.
Please subscribe. The subscription amount provided (e.g. $20.00 for 1 year) is the minimum amount for that period; you can change that default to any larger value.
To all who started a new subscription or renewed an existing subscription: Thank You!
Times are tough. First, please take care of yourself and those close to you. But, if you do have funds to spare, we would very much appreciate your support!
Where We Stand:
So far, we have had 106 subscriptions this year which have netted us an estimated $2,794.92 (after processing fees from Stripe/Paypal) towards our goal of $3,500.00.
We run a very lean operation; $20/day keeps everything going. Staffing is all-volunteer; nobody has ever been paid anything for their work on SoylentNews. That includes the editors who get the stories out on the main page. The sysadmins who keep everything running: the servers and all the services like the MySQL databases, Apache HTTP Server, IRC (Internet Relay Chat), email... it's a long list. That we so rarely have issues is a testament to how fortunate we are to have professionals who donate their free time to keep things running. We had to incorporate to be able to accept subscriptions to pay expenses. And with that there are fees for maintaining the incorporation, calculating taxes, and paying them.
Number of subscriptions for each subscription amount, and the totals at that level, so far in 2020:
Qty Sub Amt Total 7 $4.00 $28.00 12 $5.00 $60.00 2 $12.00 $24.00 63 $20.00 $1260.00 2 $25.00 $50.00 3 $30.00 $90.00 1 $36.60 $36.60 1 $39.39 $39.39 3 $40.00 $120.00 4 $50.00 $200.00 1 $60.00 $60.00 2 $100.00 $200.00 1 $113.00 $113.00 2 $120.00 $240.00
The Pandemic Sucks:
The world has changed in the past six months.
The pandemic hit and with it came lock-downs, work-from-home, and social distancing. Closures of movie theaters, restaurants, and bars. Video conferencing became a norm as in-person gatherings were prohibited. And for good reason: worldwide, over 10 million are known to have been infected and over a half million have died. Untold struggles and suffering as we attempt to understand and adapt to a new reality.
We recognized that many of the community were struggling. On April 19th, we extended all subscriptions that were due to expire in April or May to the end of May. If money was tight and it was a choice of renewing your subscription or paying your bills, we'd rather you spend your money locally and so thereby help keep the money in your local community.
SoylentNews is helping in the fight against SARS-CoV-2. You might not be aware, but SoylentNews has a Folding@Home team. We are currently ranked in the top 300 teama in the world (#297 out of 254150 teams)!
F@H is a distributed computing project designed to help understand how proteins fold and thereby search for cures to various diseases. It was originally focused on Parkinson's and Huntington's diseases as well as cancer. With the appearance of the SARS-CoV-2 virus, F@H has pivoted to trying to unravel the behavior of that virus. To this end, many large infrastructure companies (like AWS, Microsoft, Oracle, and Google) have joined the effort.
How it works: Install the client on your computer, instruct it what amount of resources to use, and you are ready to go. The client will periodically download work units and, when completed, upload the results to the F@H servers. The faster the results are computed, the more points are earned. We are team #230319. If you have computes to spare, we'd love to have you join us!
Stories and Discussions:
Through all this, we here at SoylentNews have persevered. People from all over joined us in discussions on the pandemic and so many other topics. We aim for news with a technological focus but will occasionally offer something a little offbeat.
So far in 2020, SoylentNews has posted over 2,100 stories. Separately, the community has posted 700 journal entries. To these 2,800 items, the community has posted 76,000 comments — over 400 comments per day! In addition, there have been over 55,000 comment moderations — that's nearly 300 per day.
We are continuing our efforts to move services from beryllium (our only Centos server) to aluminum (Gentoo). Deucalion (on IRC; aka Juggs on SoylentNews) has been trudging along trying to get things brought over for IRC (Internet Relate Chat). He reports he had a 100-hour long week at work last week, but still managed to make some progress on this over the weekend. There are significant differences between the two, so it has been quite the challenge. Getting userids added to the correct groups; setting up ACLs; chron syntax incompatibilities; the list goes on and on.
Lawmakers have proposed legislation that would indefinitely ban the use of facial recognition technology by law enforcement nationwide. The new bill comes after months of public concerns surrounding facial recognition's implications for data privacy, government surveillance and racial bias.
The Facial Recognition and Biometric Technology Moratorium Act was proposed Thursday by Sens. Ed Markey (D-MA) and Jeff Merkley (D-OR), and Reps. Pramila Jayapal (D-WA) and Ayanna Pressley (D-MA). While various cities have banned government use of the technology (with Boston this week becoming the tenth U.S. city to do so), the bill would be the first temporary ban on facial recognition technology ever enacted nationwide.
The newly proposed bill would "prohibit biometric surveillance by the Federal Government without explicit statutory authorization and to withhold certain Federal public safety grants from State and local governments that engage in biometric surveillance."
[...] The ban has no definitive time limit in place, and would continue until Congress passed a law to lift it.
[...] "Facial recognition technology doesn't just pose a grave threat to our privacy, it physically endangers Black Americans and other minority populations in our country," said Senator Markey in a statement. "In this moment, the only responsible thing to do is to prohibit government and law enforcement from using these surveillance mechanisms."
I see nothing blocking companies from using recognition -- facial or otherwise -- and whose data government agencies could request or subpoena.
Submitted via IRC for TheMightyBuzzard
This morning at The Perl Conference in the Cloud, Sawyer X announced that Perl has a new plan moving forward. Work on Perl 7 is already underway, but it's not going to be a huge change in code or syntax. It's Perl 5 with modern defaults and it sets the stage for bigger changes later. My latest book Preparing for Perl 7 goes into much more detail.
Perl 7.0 is going to be v5.32 but with different, saner, more modern defaults. You won't have to enable most of the things you are already doing because they are enabled for you. The major version jump sets the boundary between how we have been doing things and what we can do in the future.
Remember, Perl was the "Do what I mean" language where the defaults were probably what you wanted to do. In Perl 4 and the early days of Perl 5, that was easy. But, it's been a couple of decades and the world is more complicated now. We kept adding pragmas, but with Perl's commitment to backward compatibility, we can't change the default settings. Now we're back to the old days of C where we have to include lots of boilerplate before we start doing something:
This is slightly better with v5.12 and later because we get strict for free by using setting a minimum version:
Perl 7 is a chance to make some of these the default even without specifying the version. Perl 5 still has Perl 5's extreme backward compatibility behavior, but Perl 7 gets modern practice with minimal historical baggage.
A new study led by Yeongran Hong of the Korea Advanced Institute of Science and Technology involves a chemical with an impressive affinity for gold. Subject some circuit boards to an acid treatment to release its materials and this stuff will gather up all the dissolved gold. And after it lets go of that gold, it's ready to be used again.
The researchers' gold-scrubber is based on an organic compound called a porphyrin. Linked together in a polymer, it possesses lots and lots of little pores that, energetically, want to host a metal atom. That's the kind of structure chemists look for to help with recycling.
The researchers put their polymer through a number of different tests to work out which metals it worked best on and how much it could capture. It's most effective with a small number of precious metals, most notably gold. In fact, compared to the number of pores in the polymer, they found it was capturing about 10 times as many gold atoms. For other elements like platinum, each pore only hosts one atom (responsible atomic social distancing, shall we say). But gold atoms seemed to make a party at each pore.
That behavior was verified by measurements and explained by some modeling. The researchers found that the polymer would interact with the gold atom—aided by ultraviolet light—and hand it some electrons, which happens to make it possible for more gold atoms to join in a clump. Sure enough, repeating the test with varying amounts of ultraviolet light had an impact, although capture was still quite high even without it.
Yeongran Hong, Damien Thirion, Saravanan Subramanian, et al. Precious metal recovery from electronic waste by a porous porphyrin polymer [$], Proceedings of the National Academy of Sciences (DOI: 10.1073/pnas.2000606117)
The WireGuard VPN protocol has been available on OpenBSD as a port for a while, first as the wireguard-go implementation in Go, but later also as the wiresep port in C, both using tun(4) devices, much like OpenVPN and others, which incurs a slight penalty for crossing the kernel/userspace border for each packet.
WireGuard is a layer3 tunnel that can be run in passive mode, only sending packets when something needs to reach the other side (unless you enable heartbeats). It only allows selected modern crypto algorithms and hashes, chosen to be performant on CPUs which lack crypto accelerators, while still being secure. WireGuard packets are sent over UDP, and can run over and transport both IPv4 and IPv6. It handles NAT/port redirects and endpoints changing IP addresses, which is very nice when changing from wired to wifi or vice versa.
The nearest exoplanets to us provide the best opportunities for detailed study, including searching for evidence of life outside the Solar System. In research led by the University of Göttingen, the RedDots team of astronomers has detected a system of super-Earth planets orbiting the nearby star Gliese 887, the brightest red dwarf star in the sky. Super-Earths are planets which have a mass higher than the Earth's but substantially below those of our local ice giants, Uranus and Neptune. The newly discovered super-Earths lie close to the red dwarf's habitable zone, where water can exist in liquid form, and could be rocky worlds. The results were published in the journal Science.
[...] Gliese 887 is one of the closest stars to the Sun at around 11 light years away. It is much dimmer and about half the size of our Sun, which means that the habitable zone is closer to Gliese 887 than Earth's distance from the Sun. RedDots discovered two more interesting facts about Gliese 887, which turn out to be good news not only for the newly discovered planets but also for astronomers. The first is that the red dwarf has very few starspots, unlike our Sun. If Gliese 887 was as active as our Sun, it is likely that a strong stellar wind - outflowing material which can erode a planet's atmosphere - would simply sweep away the planets' atmospheres. This means that the newly discovered planets may retain their atmospheres, or have thicker atmospheres than the Earth, and potentially host life, even though GJ887 receives more light than the Earth. The other interesting feature the team discovered is that the brightness of Gliese 887 is almost constant. Therefore, it will be relatively easy to detect the atmospheres of the super-Earth system, making it a prime target for the James Webb Space Telescope, a successor to the Hubble Telescope.
Lacaille 9352 (GJ 887).
Also at BGR.
S. V. Jeffers, S. Dreizler, J. R. Barnes, et al. A multiplanet system of super-Earths orbiting the brightest red dwarf star GJ 887 [$], Science (DOI: 10.1126/science.aaz0795)
A spacewalking astronaut added to the millions of pieces of junk orbiting the Earth on Friday, losing a small mirror on his sleeve as soon as he emerged from the International Space Station for battery work.
Commander Chris Cassidy said the mirror quickly floated away. The lost item posed no risk to either the spacewalk or the station, according to NASA.
While millions of pieces of space debris orbit Earth, more than 20,000 items including old rocket parts and busted satellites are big enough to be tracked in order to safeguard the space station and working satellites.
Spacewalking astronauts wear a wrist mirror on each sleeve to get better views while working. The mirror is just 5-by-3 inches (7-by-12 centimeters), and together with its band has a mass of barely one-tenth of a pound (50 grams).
The mirror came loose in darkness. Cassidy inspected his spacesuit sleeve later in sunlight but didn't see any clues that might explain how the mirror came off.
The rest of the six-hour spacewalk went swimmingly.
Apple's iOS 14 beta added a feature that reveals each time an application copies text from the clipboard. A recent article in Ars Technica brought renewed focus to an issue we previously reported in February. This story includes a list of apps from the researcher's blog post.
In March, researchers uncovered a troubling privacy grab by more than four dozen iOS apps including TikTok, the Chinese-owned social media and video-sharing phenomenon that has taken the Internet by storm. Despite TikTok vowing to curb the practice, it continues to access some of Apple users' most sensitive data, which can include passwords, cryptocurrency wallet addresses, account-reset links, and personal messages. Another 53 apps identified in March haven't stopped either.
The privacy invasion is the result of the apps repeatedly reading any text that happens to reside in clipboards, which computers and other devices use to store data that has been cut or copied from things like password managers and email programs. With no clear reason for doing so, researchers Talal Haj Bakry and Tommy Mysk found, the apps deliberately called an iOS programming interface that retrieves text from users' clipboards.
[...] In many cases, the covert reading isn't limited to data stored on the local device. In the event the iPhone or iPad uses the same Apple ID as other Apple devices and are within roughly 10 feet of each other, all of them share a universal clipboard, meaning contents can be copied from the app of one device and pasted into an app running on a separate device.
That leaves open the possibility that an app on an iPhone will read sensitive data on the clipboards of other connected devices. This could include bitcoin addresses, passwords, or email messages that are temporarily stored on the clipboard of a nearby Mac or iPad. Despite running on a separate device, the iOS apps can easily read the sensitive data stored on the other machines.
[...] TikTok's continued snooping has gotten extra scrutiny for other reasons. When called out in March, the video-sharing provider told UK publication The Telegraph it would end the practice in the coming weeks. Mysk said that the app never stopped the monitoring. What's more, a Wednesday Twitter thread revealed that the clipboard reading occurred each time a user entered a punctuation mark or tapped the space bar while composing a comment. That means the clipboard reading can happen every second or so, a much more aggressive pace than documented in the March research, which found monitoring happened when the app was opened or reopened.
A tweet by Jeremy Burge gives an example of how this can be reproduced:
1. Have something on your clipboard. Eg copy some text from Notes or a website
2. Open TikTok and start typing in any text field
3. You learn from iOS 14 beta each time an app "pastes" - but in this instance I didn't request it, and none of that text appears in UI
— Jeremy Burge (@jeremyburge) June 24, 2020
Here is the list of apps (emphasis retained from original) from a researcher's blog post:
List of Apps
This section summarizes the list of apps that snoop on the pasteboard every time the app is opened. The apps are listed alphabetically in the following format:
- App Name — BundleID
- ABC News — com.abcnews.ABCNews
- Al Jazeera English — ajenglishiphone
- CBC News — ca.cbc.CBCNews
- CBS News — com.H443NM7F8H.CBSNews
- CNBC — com.nbcuni.cnbc.cnbcrtipad
- Fox News — com.foxnews.foxnews
- News Break — com.particlenews.newsbreak
- New York Times — com.nytimes.NYTimes
- NPR — org.npr.nprnews
- ntv Nachrichten — de.n-tv.n-tvmobil
- Reuters — com.thomsonreuters.Reuters
- Russia Today — com.rt.RTNewsEnglish
- Stern Nachrichten — de.grunerundjahr.sternneu
- The Economist — com.economist.lamarr
- The Huffington Post — com.huffingtonpost.HuffingtonPost
- The Wall Street Journal — com.dowjones.WSJ.ipad
- Vice News — com.vice.news.VICE-News
- 8 Ball Pool™ — com.miniclip.8ballpoolmult
- AMAZE!!! — com.amaze.game
- Bejeweled — com.ea.ios.bejeweledskies
- Block Puzzle — Game.BlockPuzzle
- Classic Bejeweled — com.popcap.ios.Bej3
- Classic Bejeweled HD — com.popcap.ios.Bej3HD
- FlipTheGun — com.playgendary.flipgun
- Fruit Ninja — com.halfbrick.FruitNinjaLite
- Golfmasters — com.playgendary.sportmasterstwo
- Letter Soup — com.candywriter.apollo7
- Love Nikki — com.elex.nikki
- My Emma — com.crazylabs.myemma
- Plants vs. Zombies™ Heroes — com.ea.ios.pvzheroes
- Pooking – Billiards City — com.pool.club.billiards.city
- PUBG Mobile — com.tencent.ig
- Tomb of the Mask — com.happymagenta.fromcore
- Tomb of the Mask: Color — com.happymagenta.totm2
- Total Party Kill — com.adventureislands.totalpartykill
- Watermarbling — com.hydro.dipping
- TikTok — com.zhiliaoapp.musically
- ToTalk — totalk.gofeiyu.com
- Tok — com.SimpleDate.Tok
- Truecaller — com.truesoftware.TrueCallerOther
- Viber — com.viber
- Weibo — com.sina.weibo
- Zoosk — com.zoosk.Zoosk
- 10% Happier: Meditation —com.changecollective.tenpercenthappier
- 5-0 Radio Police Scanner — com.smartestapple.50radiofree
- Accuweather — com.yourcompany.TestWithCustomTabs
- AliExpress Shopping App — com.alibaba.iAliexpress
- Bed Bath & Beyond — com.digby.bedbathbeyond
- Dazn — com.dazn.theApp
- Hotels.com — com.hotels.HotelsNearMe
- Hotel Tonight — com.hoteltonight.prod
- Overstock — com.overstock.app
- Pigment – Adult Coloring Book — com.pixite.pigment
- Recolor Coloring Book to Color — com.sumoing.ReColor
- Sky Ticket — de.sky.skyonline
- The Weather Network — com.theweathernetwork.weathereyeiphone
Note: the list is not meant to be exhaustive. The researchers surveyed a selection of popular apps. Given how many were found, it is likely there are many more.
The revolutionary Intel 8086 microprocessor was introduced 42 years ago this month so I've been studying its die.1 I came across two 8086 dies with different sizes, which reveal details of how a die shrink works. The concept of a die shrink is that as technology improved, a manufacturer could shrink the silicon die, reducing costs and improving performance. But there's more to it than simply scaling down the whole die. Although the internal circuitry can be directly scaled down,2 external-facing features can't shrink as easily. For instance, the bonding pads need a minimum size so wires can be attached, and the power-distribution traces must be large enough for the current. The result is that Intel scaled the interior of the 8086 without change, but the circuitry and pads around the edge of the chip were redesigned.
The photo below shows an 8086 chip from 1979, and a version with a visibly smaller die from 1986.3 (The ceramic lids have been removed to show the silicon dies inside.) In the updated 8086, the internal circuitry was scaled to about 64% of the original size by length, so it took 40% of the original area. The die as a whole wasn't reduced as much; it was about 54% of the original area. (The chip's package was unchanged, the 40-pin DIP package commonly used for microprocessors of that era.)
Researchers have developed a transgenic rice strain which lowers blood pressure in laboratory rats. Genes from unrelated organisms were artificially introduced into the rice to cause production of ten different blood pressure affecting peptides.
In the future, taking your blood pressure medication could be as simple as eating a spoonful of rice. This "treatment" could also have fewer side effects than current blood pressure medicines. As a first step, researchers reporting in ACS' Journal of Agricultural and Food Chemistry have made transgenic rice that contains several anti-hypertensive peptides. When given to hypertensive rats, the rice lowered their blood pressure.
The rice contains natural ACE inhibitors which help to regulate blood pressure and don't have the side effects often associated with pharmaceutical ACE inhibitors such as "dry cough, headache, skin rashes and kidney impairment."
Two hours after treatment, hypertensive rats showed a reduction in blood pressure, while rats treated with wild-type rice proteins did not. Treatment of rats over a 5-week period with flour from the transgenic rice also reduced blood pressure, and this effect remained 1 week later. The treated rats had no obvious side effects in terms of growth, development or blood biochemistry.
In the United States, Hypertension affects almost half of the adult population and is a primary or contributing cause of death for about half a million people per year.
Hypotensive Activity of Transgenic Rice Seed Accumulating Multiple Antihypertensive Peptides, Journal of Agricultural and Food Chemistry (DOI: 10.1021/acs.jafc.0c01958)