Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 17 submissions in the queue.

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

Who or what piqued your interest in technology?

  • School
  • Parent
  • Friend
  • Book
  • Gadget
  • Curiosity
  • I have been kidnapped by a technology company you insensitive clod
  • Other (please specify in the comments)

[ Results | Polls ]
Comments:11 | Votes:31

posted by martyb on Monday September 06 2021, @10:40PM   Printer-friendly

Long-Lasting Disinfectant Protects Against Viruses for Up to 7 Days – Promises To Help Fight Pandemics:

UCF researchers have developed a nanoparticle-based disinfectant that can continuously kill viruses on a surface for up to seven days – a discovery that could be a powerful weapon against COVID-19 and other emerging pathogenic viruses.

The findings, by a multidisciplinary team of the university's virus and engineering experts and the leader of an Orlando technology firm, were published this week in ACS Nano, a journal of the American Chemical Society.

Christina Drake '07PhD, founder of Kismet Technologies, was inspired to develop the disinfectant after making a trip to the grocery store in the early days of the pandemic. There she saw a worker spraying disinfectant on a refrigerator handle, then wiping off the spray immediately.

"Initially my thought was to develop a fast-acting disinfectant," she says, "but we spoke to consumers, such as doctors and dentists, to find out what they really wanted from a disinfectant. What mattered the most to them was something long-lasting that would continue to disinfect high-touch areas like doorhandles and floors long after application."

Drake partnered with Sudipta Seal, a UCF materials engineer and nanoscience expert, and Griff Parks, a College of Medicine virologist who is also associate dean of research and director of the Burnett School of Biomedical Sciences. With funding from the U.S. National Science Foundation, Kismet Tech and the Florida High Tech Corridor, the researchers created a nanoparticle-engineered disinfectant.

Its active ingredient is an engineered nanostructure called cerium oxide, which is known for its regenerative antioxidant properties. The cerium oxide nanoparticles are modified with small amounts of silver to make them more potent against pathogens.

"It works both chemically and mechanically," says Seal, who has been studying nanotechnology for more than 20 years. "The nanoparticles emit electrons that oxidize the virus, rendering it inactive. Mechanically, they also attach themselves to the virus and rupture the surface, almost like popping a balloon."

Most disinfecting wipes or sprays will disinfect a surface within three to six minutes of application but have no residual effects. This means surfaces need to be wiped down repeatedly to stay clean from a number of viruses, like COVID-19. The nanoparticle formulation maintains its ability to inactivate microbes and continues to disinfect a surface for up to seven days after a single application.

Journal Reference:
Craig J. Neal, Candace R. Fox, Tamil Selvan Sakthivel, et al. Metal-Mediated Nanoscale Cerium Oxide Inactivates Human Coronavirus and Rhinovirus by Surface Disruption, ACS Nano (DOI: 10.1021/acsnano.1c04142)


Original Submission

posted by martyb on Monday September 06 2021, @05:53PM   Printer-friendly
from the firefly-flew-into-fiery-flash dept.

Rocket 'terminated' in fiery explosion over Pacific Ocean:

A privately designed, unmanned rocket built to carry satellites was destroyed in an explosive fireball after suffering an "anomaly" off the California coast during its first attempt at reaching Earth's orbit.

Firefly Aerospace's Alpha rocket was "terminated" over the Pacific Ocean shortly after its 6:59 p.m. Thursday liftoff from Vandenberg Space Force Base, according to a base statement. Video from the San Luis Obispo Tribune showed the explosion.

Firefly said an "anomaly" occurred during the first-stage ascent that "resulted in the loss of the vehicle" about two minutes, 30 seconds into the flight. Vandenberg said a team of investigators will try to determine what caused the failure.

The rocket was carrying a payload called DREAM, or the Dedicated Research and Education Accelerator Mission. It consisted of items from schools and other institutions, including small satellites and several demonstration spacecraft.

"While we did not meet all of our mission objectives, we did achieve a number of them: successful first stage ignition, liftoff of the pad, progression to supersonic speed, and we obtained a substantial amount of flight data," Firefly said in a statement. The information will be applied to future missions.

[...] Standing 95 feet (26 meters) high, the two-stage Alpha is designed to carry up to 2,200 pounds (1,000 kilograms) of payload into low orbit. The company wants to be capable of launching Alphas twice a month. Launches would have a starting price of $15 million, according to Firefly.


Original Submission

posted by martyb on Monday September 06 2021, @01:12PM   Printer-friendly

Making Methane from CO2: Carbon Capture Grows More Affordable:

RICHLAND, Wash.—In their ongoing effort to make carbon capture more affordable, researchers at the Department of Energy's Pacific Northwest National Laboratory have developed a method to convert captured carbon dioxide (CO2) into methane, the primary component of natural gas.

By streamlining a longstanding process in which CO2 is converted to methane, the researchers' new method reduces the materials needed to run the reaction, the energy needed to fuel it and, ultimately, the selling price of the gas.

A key chemical player known as EEMPA makes the process possible. EEMPA is a PNNL-developed solvent that snatches CO2 from power plant flue gas, binding the greenhouse gas so it can be converted into useful chemicals.

Earlier this year, PNNL researchers revealed that using EEMPA in power plants could slash the price of carbon capture to 19 percent lower than standard industry costs—the lowest documented price of carbon capture. Now, in a study published Friday, August 21 in the journal ChemSusChem, the team reveals a new incentive—in cheaper natural gas—to further drive down costs.

When compared to the conventional method of methane conversion, the new process requires an initial investment that costs 32 percent less. Operation and maintenance costs are 35 percent cheaper, bringing the selling price of synthetic natural gas down by 12 percent.

Different methods for converting CO2 into methane have long been known. However, most processes rely on high temperatures and are often too expensive for widespread commercial use.

In addition to geologic production, methane can be produced from renewable or recycled CO2 sources, and can be used as fuel itself or as an H2 energy carrier. Though it is a greenhouse gas and requires careful supply chain management, methane has many applications, ranging from household use to industrial processes, said lead author and PNNL chemist Jotheeswari Kothandaraman.

"Right now a large fraction of the natural gas used in the U.S. has to be pumped out of the ground," said Kothandaraman, "and demand is expected to increase over time, even under climate change mitigation pathways. The methane produced by this process—made using waste CO2 and renewably sourced hydrogen—could offer an alternative for utilities and consumers looking for natural gas with a renewable component and a lower carbon footprint."

Journal Reference:
David Heldebrant, Jotheeswari Kothandaraman, Johnny Saavedra Lopez, et al. Integrated Capture and Conversion of CO2 to Methane using a Water‐lean, Post‐Combustion CO2 Capture Solvent, ChemSusChem (DOI: 10.1002/cssc.202101590)


Original Submission

posted by janrinok on Monday September 06 2021, @08:25AM   Printer-friendly

We already had safety data from samples of tens of thousands in the Phase 3 trials. What's new here is the size, and one of the increased risks is one I had not heard of before.

Israel somehow found a control group of more than 884,000 unvaccinated people. They matched them to a comparable sample of vaccinated people the same size, and asked the right question, which is does a bad thing happen more often for vaccinated people or is it just what you'd expect statistically?

"Vaccination was most strongly associated with an elevated risk of myocarditis (risk ratio, 3.24; 95% confidence interval [CI], 1.55 to 12.44; risk difference, 2.7 events per 100,000 persons; 95% CI, 1.0 to 4.6), lymphadenopathy (risk ratio, 2.43; 95% CI, 2.05 to 2.78; risk difference, 78.4 events per 100,000 persons; 95% CI, 64.1 to 89.3), appendicitis (risk ratio, 1.40; 95% CI, 1.02 to 2.01; risk difference, 5.0 events per 100,000 persons; 95% CI, 0.3 to 9.9), and herpes zoster infection (risk ratio, 1.43; 95% CI, 1.20 to 1.73; risk difference, 15.8 events per 100,000 persons; 95% CI, 8.2 to 24.2)."

Those are the risk ratios. With herpes zoster flareups happening at a 160 per million rate, maybe 'per million' isn't the best way to think about it and we could call it 0.16 per thousand. That's the one I hadn't known about.

The word "neuropathy" doesn't appear when I search the paper, so maybe they've ruled it out as an effect. I know this is a real issue for someone in our Soylent community. But if they didn't include people with existing neuropathy, it sheds no light.

They also include data on the side effects of a COVID infection. Eep. To avoid that I'll raise my chance of appendicitis 40%.

Journal Reference:
Noam Barda, Noa Dagan, Yatir Ben-Shlomo, et al. Safety of the BNT162b2 mRNA Covid-19 Vaccine in a Nationwide Setting [open], New England Journal of Medicine (DOI: 10.1056/NEJMoa2110475)


Original Submission

posted by requerdanos on Monday September 06 2021, @03:41AM   Printer-friendly
from the apple-taking-another-RISC dept.

From tom's HARDWARE: Apple Exploring RISC-V, Hiring RISC-V 'High Performance' Programmers

Apple is in the process of switching its PCs to Arm-based SoCs, but the company might not be putting all its eggs into one basket, as it is also exploring the emerging open-source RISC-V architecture. This week the company posted a job alert for RISC-V high-performance programmer(s).

Apple is currently looking for experienced programmers with detailed knowledge of the RISC-V Instruction Set Architecture (ISA) and Arm's Neon vector ISA for its Vector and Numerics Group (VaNG) within its Core Operating Systems group. Apple's VaNG is responsible for developing and improving various embedded subsystems running on iOS, macOS, watchOS, and tvOS.

Known for its secrecy, Apple's listing doesn't disclose exactly what it plans to do with RISC-V, but the job description indicates that the programmer will have to work with machine learning, computational vision, and natural language processing. Among other things, low-level high-performance programming experience is required. Furthermore, the job description also indicates that Apple is already working with RISC-V.

"You will work in a SW and HW cross functional team which is implementing innovative RISC-V solutions and state of the art routines," the description reads [emphasis added]. "This is to support the necessary computation for such things as machine learning, vision algorithms, signal and video processing. [....]

Does RISC-V offer Apple any technical flexibility that their ARM license does not?


Original Submission

posted by requerdanos on Sunday September 05 2021, @11:05PM   Printer-friendly
from the virtually-indestructible dept.

A brief overview of IBM's new 7 nm Telum mainframe CPU:

From the perspective of a traditional x86 computing enthusiast—or professional—mainframes are strange, archaic beasts. They're physically enormous, power-hungry, and expensive by comparison to more traditional data-center gear, generally offering less compute per rack at a higher cost.

This raises the question, "Why keep using mainframes, then?" Once you hand-wave the cynical answers that boil down to "because that's how we've always done it," the practical answers largely come down to reliability and consistency. As AnandTech's Ian Cutress points out in a speculative piece focused on the Telum's redesigned cache, "downtime of these [IBM Z] systems is measured in milliseconds per year." (If true, that's at least seven nines.)

IBM's own announcement of the Telum hints at just how different mainframe and commodity computing's priorities are. It casually describes Telum's memory interface as "capable of tolerating complete channel or DIMM failures, and designed to transparently recover data without impact to response time."

When you pull a DIMM from a live, running x86 server, that server does not "transparently recover data"—it simply crashes.

Telum is designed to be something of a one-chip-to-rule-them-all for mainframes, replacing a much more heterogeneous setup in earlier IBM mainframes.


Original Submission

posted by requerdanos on Sunday September 05 2021, @06:22PM   Printer-friendly
from the stifle-opposition-quash-free-speech-and-muzzle-expression dept.

Internet shutdowns by governments have 'proliferated at a truly alarming pace':

The number of government-led internet shutdowns has exploded over the last decade as states seek to stifle dissent and protest by limiting citizens' access to the web.

Nearly 850 intentional shutdowns have been recorded over the past 10 years by nonprofit Access Now's Shutdown Tracker Optimization Project (STOP), and although the group acknowledges that data on incidents before 2016 is "patchy," some 768 of these shutdowns took place in the last five years. There were 213 shutdowns in 2019 alone, with this figure ticking down to 155 in 2020 as the world adapted to the COVID-19 pandemic (which delayed elections and led to lockdowns that kept populations at home more often). And already in the first five months of 2021 there have been 50 shutdowns across 21 countries.

"Since we began tracking government-initiated internet shutdowns, their use has proliferated at a truly alarming pace," Access Now's Felicia Anthonio, campaigner and #KeepItOn lead, said in a new report on the issue in The Current, a publication of Google's internet thinktank Jigsaw. "As governments across the globe learn this authoritarian tactic from each other, it has moved from the fringes to become a common method many authorities use to stifle opposition, quash free speech and muzzle expression."


Original Submission

posted by requerdanos on Sunday September 05 2021, @01:40PM   Printer-friendly
from the strong-arm-power-of-the-seal dept.

Arm China appears to be fully independent of Arm

A recent Semianalysis article by Dylan Patel goes further claiming Arm China is now an independent company from Arm. [This is refuted - see below. --JR] It all started when SoftBank formed a joint venture where Arm Limited and the SoftBank subsidiary sold a 51% stake of the company to a consortium of Chinese investors with the venture having the exclusive right to distribute Arm's IP within China. They lost control of the company that way, but it was probably due to regulations as this type of law is common in Asia, and for instance, CNX Software Limited is a Hong Kong company instead of a Thai company, as foreigners can own 49% of a company, except for some expensive and time-consuming options.

The joint venture recently gave a presentation to the where they had plans to rebrand, develop their own IP, and operate independently from Arm. This is easy to see why once we learn the rest of the story... With the "power of the seal", Allen Wu ousted executives that were loyal to Arm and kept them out of the building with hired security. Arm stopped providing IP to Arm China, and Cortex-A77 core is the latest Arm IP available to Arm China. Neoverse, Armv9, Cortex-A78, and all other recent IP have not been shared with the Chinese entity.

Arm China also unveiled the XPU family with IP blocks including NPU AI accelerators, secure processing units (SPU), image signal processor (ISP), and video processing units (VPU), but no CPU cores that I could see. It's going to be interesting to see how Chinese vendors like Allwinner or Rockchip will be able to use newer technology from Arm. The companies do not typically rely on high-end (and expensive) cores, but the Arm Cortex-A510 Armv9 core would certainly have to be part of their roadmap for the next few years. Can Arm China block those designs in China, or on the reverse, would Arm decide to block designs based on Arm China IP stealing their IP to enter markets outside of China. It just feels like a lose-lose situation at this point.

However, in ARM Refutes Accusations of IP Theft by Its ARM China Subsidiary we get the following correction from ExtremeTech:

Not everything in the original article [their version of the above report-JR] was incorrect. ARM is currently in a legal fight with ARM China and Allen Wu. Wu was voted out for reportedly using ARM China's resources to procure orders for his own company. The various allegations that Wu has hired security guards, fired a number of employees, and still holds the seal of the company have been reported on by multiple publications. There is an ongoing dispute between ARM and ARM China.

But the accusations that ARM China had stolen ARM IP and was relaunching it under its own banner? Those don't appear to be true. First, here's a formal statement, as provided to us by an ARM representative:

Arm has seen strong growth in our business as our global partners shipped more than 25 billion Arm-based chips in 2020. Of those 25 billion chips, more than 3 billion were shipped by our partners based in China.

Arm continues to have a successful working relationship with the Arm China team in support of this growth, and both the structure and ownership of the JV remains unchanged since its inception in 2018.

[...] The story ExtremeTech originally linked was based on accurate reporting but was not, itself, particularly accurate. ET regrets the error.

Also at ExtremeTech.

See also: The Semiconductor Heist Of The Century | Arm China Has Gone Completely Rogue, Operating As An Independent Company With Inhouse IP/R&D


Original Submission

posted by martyb on Sunday September 05 2021, @08:56AM   Printer-friendly
from the See-dick-mod.-See-dick-sock-mod.-See-dick-get-banned.-Don't-be-a-dick dept.

Labor Day:
In observance of Labor Day (a federal holiday in the United States celebrated on the first Monday in September) I am hereby inviting the SoylentNews editorial staff to enjoy a three-day weekend — Saturday, Sunday, and Monday. Stories will be scheduled and released on a weekend-story-spacing schedule. The holiday marks the unofficial end of summer and it often marked by parades, sales, cookouts, and the like.

These volunteers give selflessly of their spare time to try and make sure we keep the stories coming. Please join me in thanking them for their generous sacrifice of spare time and experience to keep those stories coming!

Tor:
(short for The Onion Router) is in the process of rolling out an updated protocol. ThIs update is NOT compatible with prior versions. SoylentNews has had support from the early days of the site (thanks to NCommander, IIRC). As nobody on staff has experience in this area, our support will cease at any time - the TOR site is saying October. It was laudable at the time. Unfortunately, its more recent use seems to have been primarily by spammers. As such, we could lose access to Tor at anytime as our network "neighbors" either upgrade or find themselves no longer "adjacent" to back-level versions like ours is. You can still access this site using TOR with our normal URL.

Sock Mods
We have been methodically identifying and shutting down sockpuppet accounts. These are NOT allowed. Attempts to bypass the will of the community by controlling multiple accounts is forbidden. One user, one account. Do NOT use another account (or accounts) to upmod one-or-more accounts that you control. If you do not like getting downmods, take a look at the comments you post. Sure, occasionally, someone might mis-moderate a comment by accident (heck, *I* have done it!) In our experience, such errors are generally rare and are frequently followed at some point by others, offsetting moderations.

So: "Sock mods" are being tracked. We are methodically investigating cases. Accounts are being disabled, and never in isolation. It takes agreement by at least two admins, and usually more, for any action to be taken.

If you are generally a positive contributor to the site, such impacts to your karma are usually just "line noise" in the grand scheme of things.

Mod bombs:
In a similar vein, if you disagree with someone, do not attempt to silence them by using multiple accounts to mod their comments down.

We have seen cases of both "mod bombs" and "sock mods". We have held back on taking action until we are certain. Any action taken is first confirmed by at least one other staff member. Complaining about moderation is OFF TOPIC and tends to get moderated as such.

Limits
We've previously tried to set concrete limits. "Give them an inch and they'll take a mile." I have personally witnessed cases where one account downmodded another account 4 times in one day. For ten days in a row! That was just enough to avoid getting moderations reversed, but certainly enough to show a concerted effort to moderate the commenter rather than just the comment.

This will no longer be tolerated.

Admins can see who has moderated whom. We talk among ourselves. We discuss cases that come up. It's pretty simple, really: "Don't be a jerk!"

posted by janrinok on Sunday September 05 2021, @04:07AM   Printer-friendly
from the speedy-delivery dept.

Too much of a good thing: Mourning the slow death of the retail game store:

When I was a kid, buying video games was an incredibly stressful process. In the late '80s, I was too young to buy magazines to find out what games deserved my hard-earned pocket-money. So, in an experience all too familiar to many millennial gamers, I used my (poor) intuition to look at the box art to decide what to bring home.

[...] At the time, a console title cost something in the realm of $100 in today's dollars (or over €85-95), which made each game purchase an investment requiring long consideration and thoughtful planning. At that price, every game needed to last weeks, if not months, to justify the investment. Most games achieved this with the good old "Nintendo-hard" philosophy: Brutal challenges make a relative dearth of original content last longer.

[...] The rise of downloadable game options has been a veritable bonanza for consumers, with a practically infinite library of games at one's fingertips and easy-to-access crowdsourced review systems separating the wheat from the chaff. Players today can get a lot more for their money, too. The money you'd spend to purchase a single monthly game in the '90s can now provide access to multiple subscription services with hundreds of games each, with some money left over for additional purchases. And that doesn't even get into the free-to-play titles with frequently updated online content or the frequent steep sales on many digital storefronts.

But the rise in the number of games available and the drop in their respective prices brings its own set of problems. While subscription services can feature hundreds of games at relatively low prices, they're also bloated with filler content that most players will ignore. These services can also lead to perverse incentives for developers, who may be paid based on how often their subscription game is played rather than for creating a satisfying but short experience. With purely digital games, access can be cut off by the rights-holder at a moment's notice.

At least they weren't like Blockbuster. $50 overdue charge for you!

What are your memories of when you started gaming?


Original Submission

posted by janrinok on Saturday September 04 2021, @11:35PM   Printer-friendly
from the just-chill-man-chill dept.

New food freezing concept improves quality, increases safety and cuts energy use:

"A complete change over to this new method of food freezing worldwide could cut energy use by as much as 6.5 billion kilowatt-hours each year while reducing the carbon emissions that go along with generating that power by 4.6 billion kg, the equivalent of removing roughly one million cars from roads," said ARS research food technologist Cristina Bilbao-Sainz. She is with the Healthy Processed Foods Research Unit, part of ARS's Western Regional Research Center (WRRC) in Albany.

"These savings could be achieved without requiring any significant changes in current frozen food manufacturing equipment and infrastructure, if food manufacturers adopt this concept," Bilbao-Sainz added.

The new freezing method, called isochoric freezing, works by storing foods in a sealed, rigid container -- typically made of hard plastic or metal -- completely filled with a liquid such as water. Unlike conventional freezing in which the food is exposed to the air and freezes solid at temperatures below 32 degrees F, isochoric freezing preserves food without turning it to solid ice.

As long as the food stays immersed in the liquid portion, it is protected from ice crystallization, which is the main threat to food quality.

[...] Another benefit of isochoric freezing is that it also kills microbial contaminants during processing.

Journal Reference:
Analysis of global energy savings in the frozen food industry made possible by transitioning from conventional isobaric freezing to isochoric freezing, Renewable and Sustainable Energy Reviews (DOI: 10.1016/j.rser.2021.111621)


Original Submission

posted by janrinok on Saturday September 04 2021, @06:51PM   Printer-friendly
from the nom-nom-nom dept.

From ScienceNews:

For the first time, astronomers have captured solid evidence of a rare double cosmic cannibalism — a star swallowing a compact object such as a black hole or neutron star. In turn, that object gobbled the star's core, causing it to explode and leave behind only a black hole.

[...] Piecing the data together, Dong and his colleagues think this is what happened: Long ago, a binary pair of stars were born orbiting each other; one died in a spectacular supernova and became either a neutron star or a black hole. As gravity brought the two objects closer together, the dead star actually entered the outer layers of its larger stellar sibling.

The compact object spiraled inside the still-living star for hundreds of years, eventually making its way down to and then eating its partner's core. During this time, the larger star shed huge amounts of gas and dust, forming a shell of material around the duo.

In the living star's center, gravitational forces and complex magnetic interactions from the dead star's munching launched enormous jets of energy — picked up as an X-ray flash in 2014 — as well as causing the larger star to explode. Debris from the detonation smashed with colossal speed into the surrounding shell of material, generating the optical and radio light.

While theorists have previously envisioned such a scenario, dubbed a merger-triggered core collapse supernova, this appears to represent the first direct observation of this phenomenon, Dong says.

Journal Referencess:
1) D. Dong et al. A transient radio source consistent with a merger-triggered core collapse supernova. Science. Vol. 373, September 3, 2021, p. 1125. doi: https://doi.org/10.1126/science.abg6037
2) N. Ivanova, S. Justham, X. Chen, et al. Common envelope evolution: where we stand and... [open], The Astronomy and Astrophysics Review (DOI: 10.1007/s00159-013-0059-2)


Original Submission

posted by Fnord666 on Saturday September 04 2021, @02:09PM   Printer-friendly
from the well,-almost dept.

https://spectrum.ieee.org/the-scandalous-history-of-the-last-rotor-cipher-machine

If you've never heard of the HX-63 until just now, don't feel bad. Most professional cryptographers have never heard of it. Yet it was so secure that its invention alarmed William Friedman, one of the greatest cryptanalysts ever and, in the early 1950s, the first chief cryptologist of the U.S. National Security Agency (NSA). After reading a 1957 Hagelin patent (more on that later), Friedman realized that the HX-63, then under development, was, if anything, more secure than the NSA's own KL-7, then considered unbreakable. During the Cold War, the NSA built thousands of KL-7s, which were used by every U.S. military, diplomatic, and intelligence agency from 1952 to 1968.

The reasons for Friedman's anxiety are easy enough to understand. The HX-63 had about 10600 possible key combinations; in modern terms, that's equivalent to a 2,000-bit binary key. For comparison, the Advanced Encryption Standard, which is used today to protect sensitive information in government, banking, and many other sectors, typically uses a 128- or a 256-bit key.

Just as worrisome was that CAG was a privately owned Swiss company, selling to any government, business, or individual. At the NSA, Friedman's job was to ensure that the U.S. government had access to the sensitive, encrypted communications of all governments and threats worldwide. But traffic encrypted by the HX-63 would be unbreakable.

[...] But in 1963, CAG started to market the HX-63, and Friedman became even more alarmed. He convinced Hagelin not to manufacture the new device, even though the machine had taken more than a decade to design and only about 15 had been built, most of them for the French army. However, 1963 was an interesting year in cryptography. Machine encryption was approaching a crossroads; it was starting to become clear that the future belonged to electronic encipherment. Even a great rotor machine like the HX-63 would soon be obsolete.

That was a challenge for CAG, which had never built an electronic cipher machine. Perhaps partly because of this, in 1966, the relationship among CAG, the NSA, and the CIA went to the next level. That year, the NSA delivered to its Swiss partner an electronic enciphering system that became the basis of a CAG machine called the H-460. Introduced in 1970, the machine was a failure. However, there were bigger changes afoot at CAG: That same year, the CIA and the German Federal Intelligence Service secretly acquired CAG for US $5.75 million. (Also in 1970, Hagelin's son Bo, who was the company's sales manager for the Americas and who had opposed the transaction, died in a car crash near Washington, D.C.)

Although the H-460 was a failure, it was succeeded by a machine called the H-4605, of which thousands were sold. The H-4605 was designed with NSA assistance. To generate random numbers, it used multiple shift registers based on the then-emerging technology of CMOS electronics. These numbers were not true random numbers, which never repeat, but rather pseudorandom numbers, which are generated by a mathematical algorithm from an initial "seed."

This mathematical algorithm was created by the NSA, which could therefore decrypt any messages enciphered by the machine. In common parlance, the machines were "backdoored." This was the start of a new era for CAG. From then on, its electronic machines, such as the HC-500 series, were secretly designed by the NSA, sometimes with the help of corporate partners such as Motorola. This U.S.-Swiss operation was code-named Rubicon. The backdooring of all CAG machines continued until 2018, when the company was liquidated.

[...] The revelation of Crypto AG's secret deals with U.S. intelligence may have caused a bitter scandal, but viewed from another angle, Rubicon was also one of the most successful espionage operations in history—and a forerunner of modern backdoors. Nowadays, it's not just intelligence agencies that are exploiting backdoors and eavesdropping on "secure" messages and transactions. Windows 10's "telemetry" function continuously monitors a user's activity and data. Nor are Apple Macs safe. Malware that allowed attackers to take control of a Mac has circulated from time to time; a notable example was Backdoor.MAC.Eleanor, around 2016. And in late 2020, the cybersecurity company FireEye disclosed that malware had opened up a backdoor in the SolarWinds Orion platform, used in supply-chain and government servers. The malware, called SUNBURST, was the first of a series of malware attacks on Orion. The full extent of the damage is still unknown.


Original Submission

posted by janrinok on Saturday September 04 2021, @09:24AM   Printer-friendly
from the I-was-chatting-with-my-mushrooms-yesterday dept.

The fungal mind: on the evidence for mushroom intelligence:

Mushrooms and other kinds of fungi are often associated with witchcraft and are the subjects of longstanding superstitions. Witches dance inside fairy rings of mushrooms according to German folklore, while a French fable warns that anyone foolish enough to step inside these 'sorcerer's rings' will be cursed by enormous toads with bulging eyes. These impressions come from the poisonous and psychoactive peculiarities of some species, as well as the overnight appearance of toadstool ring-formations.

Given the magical reputation of the fungi, claiming that they might be conscious is dangerous territory for a credentialled scientist. But in recent years, a body of remarkable experiments have shown that fungi operate as individuals, engage in decision-making, are capable of learning, and possess short-term memory. These findings highlight the spectacular sensitivity of such 'simple' organisms, and situate the human version of the mind within a spectrum of consciousness that might well span the entire natural world.

Before we explore the evidence for fungal intelligence, we need to consider the slippery vocabulary of cognitive science. Consciousness implies awareness, evidence of which might be expressed in an organism's responsiveness or sensitivity to its surroundings. There is an implicit hierarchy here, with consciousness present in a smaller subset of species, while sensitivity applies to every living thing. Until recently, most philosophers and scientists awarded consciousness to big-brained animals and excluded other forms of life from this honour. The problem with this favouritism, as the cognitive psychologist Arthur Reber has pointed out, is that it's impossible to identify a threshold level of awareness or responsiveness that separates conscious animals from the unconscious. We can escape this dilemma, however, once we allow ourselves to identify different versions of consciousness across a continuum of species, from apes to amoebas. That's not to imply that all organisms possess rich emotional lives and are capable of thinking, although fungi do appear to express the biological rudiments of these faculties.

Just what are mushrooms? It turns out that this question doesn't have a simple answer. Mushrooms are the reproductive organs produced by fungi that spend most of their lives below ground in the form of microscopic filaments called hyphae. These hyphae, in turn, branch to form colonies called mycelia. Mycelia spread out in three dimensions within soil and leaf litter, absorbing water and feeding on roots, wood, and the bodies of dead insects and other animals. Each of the hyphae in a mycelium is a tube filled with pressurised fluid, and extends at its tip. The materials that power this elongation are conveyed in little packages called vesicles, whose motion is guided along an interior system of rails by proteins that operate as motors. The speed and direction of hyphal extension, as well as the positions of branch formation, are determined by patterns of vesicle delivery. This growth mechanism responds, second by second, to changes in temperature, water availability, and other opportunities and hardships imposed by the surrounding environment.

[...] Fungal expressions of consciousness are certainly very simple. But they do align with an emerging consensus that, while the human mind might be particular in its refinements, it's typical in its cellular mechanisms. Experiments on fungal consciousness are exciting for mycologists because they've made space for the study of behaviour within the broader field of research on the biology of fungi. Those who study animal behaviour do so without reference to the molecular interactions of their muscles; likewise, mycologists can learn a great deal about fungi simply by paying closer attention to what they do. As crucial players in the ecology of the planet, these fascinating organisms deserve our full attention as genuine partners in sustaining a functional biosphere.

Journal Reference:
František Baluška, Arthur Reber. Sentience and Consciousness in Single Cells: How the First Minds Emerged in Unicellular Species, BioEssays (DOI: 10.1002/bies.201800229)


Original Submission

posted by martyb on Saturday September 04 2021, @04:39AM   Printer-friendly
from the AI-does-everything-better-than-humans dept.

AI computers can't patent their own inventions — yet — a US judge rules

Should an artificially intelligent machine be able to patent its own inventions? For a US federal judge, the larger implications of that question were irrelevant. In April 2020, the US Patent and Trademark Office (USPTO) ruled that only "natural persons" could be credited as the inventor of a patent, and a US court decided Thursday that yes, that's what the law technically says (via Bloomberg).

Not every country agrees with that direction. South Africa and Australia decided to go the other direction, granting one patent and reinstating a second patent application filed by AI researcher Steven Thaler, whose AI system DABUS reportedly came up with a flashing light and a new type of food container. Thaler is the one who sued the US in this case as well — he's part of a group called The Artificial Inventor Project that's lobbying for AI recognition around the globe.

On a patent application doesn't the inventor have to swear they invented it? [602.01 Naming the Inventor]


Original Submission