Stories
Slash Boxes
Comments

SoylentNews is people

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

Idiosyncratic use of punctuation - which of these annoys you the most?

  • Declarations and assignments that end with }; (C, C++, Javascript, etc.)
  • (Parenthesis (pile-ups (at (the (end (of (Lisp (code))))))))
  • Syntactically-significant whitespace (Python, Ruby, Haskell...)
  • Perl sigils: @array, $array[index], %hash, $hash{key}
  • Unnecessary sigils, like $variable in PHP
  • macro!() in Rust
  • Do you have any idea how much I spent on this Space Cadet keyboard, you insensitive clod?!
  • Something even worse...

[ Results | Polls ]
Comments:50 | Votes:94

posted by hubie on Thursday January 11 2024, @10:31PM   Printer-friendly

https://phys.org/news/2024-01-eco-friendly-fungicide-alternative.html

A material that could replace current fungicides (i.e., anti-fungal pesticides), increase food security, and help protect wildlife has been discovered.

A recent investigation undertaken by Pesticide Action Network (PAN) revealed that the UK is still using 36 harmful pesticides that have been banned in other European countries, with 13 described as "highly hazardous" that have links to water contamination, cancer, infertility, and other illnesses.

Published in Green Chemistry, researchers at the University of Nottingham have completed a successful field trial of a material they have developed to help to protect crops from fungi.

Simon Avery, professor of eukaryotic microbiology in the Faculty of Medicine and Health Sciences, said, "The test material is not toxic but works by passively resisting attachment of fungal spores to protect surfaces from fungal infection, including crop surfaces. Results from this first field trial with wheat are particularly encouraging as there is a lot of scope to optimize further the material properties for crop protection."

"We identified two lead polymer candidates by bio-performance testing using in vitro microplates and leaf-based assays. These were then taken forward into a program to optimize and scale up their synthesis and compound them into a spray formulation that could be used on crops. Our findings showed that the material not only significantly reduced fungal infection by the fungus Septoria tritici by up to 26% but also that the crop grew just as well as the control group—providing an alternative that appears safer for the environment, wildlife, and people, and is effective, too."

Sprayed directly onto wheat at timings conventional for fungicides, the trial has provided the first real-world scale exemplification of how the material interacts with crops. The small plot trial compared the two polymer candidates to a multisite fungicide and two commercial fungicide programs.

[...] Valentina said, "Our attention is now turning to a second field trial that's in the diary for this year to further hone and improve the polymer so we can continue turning our research into reality. The beauty of a material like this is its lack of toxicity, the relative simplicity of its production and the fact that it can be scaled up easily—making it an incredibly attractive prospect for several other industries, not just agriculture."

Journal Reference:
Liam A. Crawford et al, A potential alternative to fungicides using actives-free (meth)acrylate polymers for protection of wheat crops from fungal attachment and infection, Green Chemistry (2023). DOI: 10.1039/D3GC01911J


Original Submission

posted by hubie on Thursday January 11 2024, @05:47PM   Printer-friendly
from the Radio-Radio-Elvis-Costello dept.

As reported in USA Today https://www.usatoday.com/story/money/business/2024/01/08/audacy-radio-bankruptcy/72147915007/ and many outlets:

Radio giant Audacy announced that it plans to file for Chapter 11 bankruptcy, on Sunday.

The company, which owns more than 200 stations across the U.S., announced in a news release it agreed to a prepackaged restructuring support agreement (RSA) with a supermajority of its debt-holders that will allow it to reduce its debt. The company says the plan would reduce its debt by 80% from around $1.9 billion to about $350 million.

Under this agreement, debtholders will receive equity in the reorganized company.

"Over the past few years, we have strategically transformed Audacy into a leading, scaled multi-platform audio content and entertainment company," said David Field, CEO of Audacy.

Do you listen to the radio? Your AC submitter still enjoys having music chosen by a pro -- but there are fewer and fewer high quality DJs around to fill that role...and probably even fewer job slots available in this era of corporate radio.

Best anthem to radio? https://www.youtube.com/watch?v=RAUUVYZ-z7A
or an intense (but partial) version from Saturday Night Live, https://www.youtube.com/watch?v=eD_24nDzkeo


Original Submission

posted by hubie on Thursday January 11 2024, @01:04PM   Printer-friendly

https://www.techdirt.com/2024/01/10/piracy-is-surging-again-because-streaming-execs-ignored-the-lessons-of-the-past/

Back in 2019 we noted how the streaming sector risked driving consumers back to piracy if they didn't heed the lessons of the past. We explored how the rush to raise rates, nickel-and-dime users, implement arbitrary restrictions, and force users toward hunting and pecking their way through a confusing platter of exclusives and availability windows risked driving befuddled users back to piracy.

And lo and behold, that's exactly what's happening.


Original Submission

posted by hubie on Thursday January 11 2024, @08:20AM   Printer-friendly
from the late-and-over-budget-as-usual dept.

NASA expected to announce 'months-long delay' for crewed Artemis moon mission:

NASA leadership is expected on Tuesday to announce a "months-long delay" to the first crewed mission of the agency's flagship Artemis program, according to one current and one former NASA employee.

The delay affects NASA's Artemis II mission, which aims to send four astronauts on a journey to fly by the moon and was slated to lift off this November.

But the mission is no longer expected to take place before 2025, according to the sources, confirming months of speculation that a delay was imminent.

NASA's Inspector General hinted at potential delays for the mission in a November report, citing three main challenges the space agency must address before it can safely fly humans to the moon.

First, the ground structure used to build, transport and launch the program's massive Space Launch System rocket — dubbed Mobile Launcher 1 — "sustained more damage than expected."

The November report stated that repairs to the structure were ongoing.

Second, the heat shield on the Orion spacecraft — intended to be the astronauts' home on Artemis II — "eroded in an unexpected way" during Artemis I as it was exposed to temperatures about half as hot as the surface of the sun upon reentry into Earth's atmosphere.

Finally, the Inspector General noted what NASA officials believed to be "the primary critical path" for the Artemis II mission: preparing Orion for its first crew and integrating it with the European Service Module, which provides power and propulsion. The "critical path" in project planning refers to the aspect of the mission that's expected to take the longest.


Original Submission

posted by hubie on Thursday January 11 2024, @03:35AM   Printer-friendly
from the fine-young-macrophages dept.

https://newatlas.com/medical/rac2-protein-macrophages-cannibalize-t-cells-cancer-immunotherapy/

Following a trail of evidence that started with a study of fruit flies nearly 25 years ago, researchers have found adding a hyperactive form of the protein Rac2 to macrophages, immune cells that eat pathogens, causes them to cannibalize T cells. The novel technique could potentially boost the effectiveness of an emerging cancer treatment.

Rac proteins have been around for a long time. Deeply conserved in evolution, the proteins are thought to have been present in the earliest nucleated cells. But, despite their age, scientists are still uncovering their mysteries. In a new study, researchers from the University of California Santa Barbara (UCSB) discovered more about how Rac proteins work and how they could potentially improve cancer treatment.

The human genome encodes three Rac proteins. Rac1 is expressed ubiquitously, Rac2 is expressed predominantly in cells that produce blood components (hematopoietic cells), and Rac3 is expressed primarily in brain tissue. Back in 1996, researchers studying fruit flies found that the proteins were instrumental in cell movement and that a hyperactive form of Rac1, expressed in only a few cells in a fly's egg chamber, destroyed the whole tissue.

"Just expressing this active Rac in six to eight cells kills the entire tissue, which is composed of about 900 cells," said Abhinava Mishra, the current study's lead author.

That was as far as the researchers got in the '90s. It wasn't until a few years ago that research started to emerge suggesting that cannibalism might be the cause of this tissue destruction.

In 2019, a study published in the journal Blood reported on three unrelated people with recurrent infections and a significant lack of T cells, specialized white blood cells crucial to the immune system, had the same mutation that hyperactivates Rac2. The study also observed that many of the patient's neutrophils, cells that capture and ingest invading microorganisms, were enlarged, indicating they were consuming a lot of cellular material.

After reading this study, Denise Montell, who was involved in the 1996 research and is the corresponding author in the current study, wondered whether the T cells' disappearance was due to innate immune cells with active Rac2 eating them, as had happened with the fruit flies. So, Montell and the other researchers turned their focus to macrophages, the voracious counterpart of the neutrophil. The researchers cultured human macrophages with and without hyperactive Rac2, together with T cells, and found that macrophages with hyperactive Rac consumed more cells, confirming their hypothesis.

Journal Reference:
Abhinava K. Mishra et al., Hyperactive Rac stimulates cannibalism of living target cells and enhances CAR-M-mediated cancer cell killing, PNAS, 2023. https://doi.org/10.1073/pnas.2310221120


Original Submission

posted by hubie on Wednesday January 10 2024, @09:51PM   Printer-friendly

Ryzen Cpu Bug Crashes PCs Using Firewire Devices, But A Fix Is On The Way

Arthur T Knackerbracket has processed the following story:

A strange bug involving AMD's modern Ryzen CPUs and the old Firewire standard

A Linux patch is on the way to solve crashing issues when attempting to use Firewire devices on PCs running Ryzen CPUs and Linux (via Phoronix). The unlikely hardware combination has enough Linux users to get attention from the community, and even a fix coming out with Linux 6.7 will be backported to prior Linux kernel releases.

Despite all that, Linux developer Takashi Sakamoto has pledged to keep Firewire support on Linux alive until 2029. Sakamoto is already making good on his promise with his latest patch, which solves an issue that uniquely affected PCs running AMD Ryzen CPUs. It would seem incredibly unlikely that anyone would be combining two pieces of hardware with nearly a decade between them, but those people certainly exist. They reported an unusually high amount of crashes.

Without getting too technical, Firewire and Ryzen users would often see their PCs crash if the "isochronous cycle timer" register on the CPU was accessed. This register would be accessed if a user ever plugged in a Firewire device or was using software that required constant access to the register.

[...] Although crashes are no longer a problem for Firewire-Ryzen PCs, the patch is a double-edged sword and "brings apparent disadvantage since time-aware application programs require it," according to Sakamoto. Linux users with this hardware combination might have to switch to Intel or even downgrade to one of AMD's pre-Ryzen CPUs, as neither exhibit the same problems seen on Ryzen-powered PCs.

AMD's New Ryzen APUs Show Impressive Single-Core Gains - Ryzen 5 8500G Outperforms Ryzen 5 560

Arthur T Knackerbracket has processed the following story:

AMD announced four processors in its new Ryzen 8000G 'Phoenix' lineup of APUs for its desktop AM5 PCs here at CES 2024 in Las Vegas, Nevada, bringing 1080p-capable integrated graphics to the company's newest platform for the first time, not to mention unlocking a new lower entry pricing point to the AM5 ecosystem. The two flagship Ryzen 8000G processors are also the world's first desktop CPUs with an integrated high-performance Neural Processing Unit (NPU) engine to boost performance in AI workloads, beating Intel to the punch again — AMD was also the first x86 chipmaker to bring an NPU to laptops. Now, they've come to the desktop with models aimed at taking a spot on our list of the Best CPUs for gaming.

AMD pairs this 'XDNA' AI accelerator with the powerful Zen 4 CPU microarchitecture and the RDNA 3 graphics engine to forge the flagship models, while two lower-tier models round out the stack, combining to create compelling lower-cost solutions for entry-level gaming and small form factor builds with Zen 4c cores. The new chips come to market on January 31.

[...] AMD's Ryzen 8000G series brings a disruptive new in-built AI acceleration engine to desktop PCs for the first time, opening up new possibilities. There are already over 100 AI-accelerated applications available in the market, and you can also use local AI models with the XDNA NPU. However, while deploying AI models for local use confers performance, security, cost, and efficiency benefits, it can be a daunting task.

AMD's new Ryzen AI Software suite is designed to allow both enthusiasts and developers to deploy pre-trained AI models on its silicon with a one-click approach that greatly simplifies the process. Users can select machine learning models trained on frameworks like PyTorch or TensorFlow and use AMD's Vitis AI quantizer to quantize the model into an ONNX format. The software then partitions and compiles the model, which runs on the Ryzen NPU. The Ryzen AI Software is available now for free, and AMD also has a pre-optimized model zoo on Hugging Face available.


Original Submission #1Original Submission #2

posted by hubie on Wednesday January 10 2024, @05:04PM   Printer-friendly

Here are a few stories to launch into the new year:

Mortality inaudible

Researchers have observed that older adults with hearing loss who use hearing aids experience a number of ancillary benefits not obviously connected with hearing, like a markedly reduced risk of geriatric-onset dementia.

[...] "We found that adults with hearing loss who regularly used hearing aids had a 24% lower risk of mortality than those who never wore them," said Janet Choi, MD, MPH, the study's lead researcher. "These results are exciting because they suggest that hearing aids may play a protective role in people's health and prevent early death."

Bees vexed

U.S. honey yields have been in decline since the 1990s, and researchers have been trying to understand why. Is it pesticide use? The decline in floral biodiversity? Sticky-pawed bears? Researchers at Pennsylvania State University analyzed databases operated by a number of government departments and built a corpus of data for all 50 states over a 50-year span.

They found reduced honey yield correlated with herbicide application and land use policies that don't include pollinator support. Among their findings, states with both warm and cool regions had higher honey yields, and local soil productivity was surprisingly useful in estimating honey yield.

Fitness 420

In a stunning development that upends the anecdotal experiences of marijuana smokers everywhere, researchers at the University of Colorado at Boulder report that cannabis does not improve exercise performance.

[...] "It is pretty clear from our research that cannabis is not a performance-enhancing drug," said Angela Bryan, a professor of psychology and neuroscience.

Jurassic hobbits

Researchers studying fossils presumed to be juvenile tyrannosaurs report that the remains actually constitute adults of a smaller species, now called Nanotyrannus lancensis.

Pee evaluated

Researchers at the University of Maryland and the National Institutes of Health report that pee is yellow because of a previously unknown microbial enzyme called bilirubin reductase.

Chickens contextual

A University of Queensland-led study found that humans can determine the emotional valence of chickens from the sound of their clucks.


Original Submission

posted by hubie on Wednesday January 10 2024, @12:20PM   Printer-friendly
from the protecting-profit-at-any-cost dept.

Canada adds that importing its drugs will not solve America's drug pricing problems:

Canada issued a warning Monday that it stands ready to defend its prescription drug supply from US importation plans—and also said the plans wouldn't work for the US, anyway. "Bulk importation will not provide an effective solution to the problem of high drug prices in the US," Health Canada said in a statement.

The defensive stance comes just days after the US Food and Drug Administration granted Florida authorization to directly import cheaper prescription drugs from Canada in an effort to help drag down America's uniquely stratospheric drug pricing. Florida is the first state to win such an authorization, and Florida Governor Ron DeSantis celebrated it, claiming the drug imports will save the state "up to $180 million in the first year alone." There are caveats, though. Before Florida can import any drugs, it must complete several obligations, including submitting to the FDA additional drug-specific information, testing the drugs for authenticity and FDA compliance, and relabeling them in accordance with FDA labeling.

The FDA authorized the importation program in accordance with section 804 of the Federal Food, Drug, and Cosmetic Act (FD&C Act). The move stems from President Biden's "Executive Order on Promoting Competition in the American Economy," which directed the FDA to help develop such programs.

[...] Proponents of the program in the US say that importing cheaper drugs from abroad could help lower US drug prices by offering more competition on the market. Canada, like other countries, has lower drug prices than the US, partly because the country's national health system negotiates prices for prescription drugs. The US government only began negotiating prices last year—and is currently being sued by several pharmaceutical companies over the move.

But Canada, which has a population around nine times smaller than the US, has been staunchly opposed to the US importing its drugs. It has repeatedly said that diverting medicines to the US could lead to drug shortages in Canada, make existing shortages worse, and/or cause price spikes.

[...] Drug makers in the US also intend to fight the plans. Stephen Ubl, CEO of the powerful trade group PhRMA—Pharmaceutical Research and Manufacturers of America—said in a statement that the group is "deeply concerned with the FDA's reckless decision to approve Florida's state importation plan" and claimed importation "poses a serious danger to public health." Ubl concluded that "PhRMA is considering all options for preventing this policy from harming patients."


Original Submission

posted by hubie on Wednesday January 10 2024, @07:38AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

There's a megalodon tooth resting on my fireplace mantle.

The ancient, palm-sized fossil is fascinating, but a common household curio: Teeth from the giant extinct shark — which grew around 50 feet long, which is longer than a city bus — are frequently found in accessible coastal areas worldwide. The sharks' huge jaws were lined with 276 teeth, and they likely lost and replaced thousands over their lifetimes, allowing plenty of teeth the chance to fossilize.

But scientists now report the first-ever discovery of a megalodon fossil in the extremely remote, completely dark deep sea, located over 10,000 feet (3,090 meters) beneath the surface. The finding, made by a remotely operated robot, reveals significant insights about the lives of these ocean giants, who lurked in the seas some 20 million to 3.6 million years ago. They were big enough to eat whales.

"This is an amazing find and is interesting in several aspects," Nicolas Straube, a deep sea shark researcher at the University Museum Bergen in Norway and co-author of the study, said in a statement. The study was recently published in the science journal Historical Biology.

One of the main insights is that the predatory megalodon likely traversed the oceans, as opposed to just lurking along the coasts.

[...] Another important revelation from the fossil, found in the Pacific Remote Islands Marine National Monument, located southwest of Hawaii, was its coating in a black mineral called ferromanganese. It takes a million years for just a few millimeters to accrue on deep ocean objects, providing evidence that this megalodon fossil, lodged in sediments and removed with a shovel, had been there for eons.

[...] The deep sea is still largely unexplored, though scientists with several ocean exploration groups are making enormous research strides. This recent expedition, funded by the National Oceanic and Atmospheric Administration's (NOAA) Ocean Exploration program, occurred aboard the Ocean Exploration Trust's 224-foot-long vessel (E/V) Nautilus. It's designed to deploy exploration robots into the deep sea, largely in the sprawling Pacific Ocean.

Indeed, deep sea exploration missions often return to the surface with discoveries, or rarely seen sightings.

"We always discover stuff when we go out into the deep sea. You're always finding things that you haven't seen before," Derek Sowers, an expedition lead for NOAA's Ocean Exploration mission, told Mashable in 2022.


Original Submission

posted by hubie on Wednesday January 10 2024, @02:55AM   Printer-friendly
from the hats-off-to-cory dept.

The American Dialect Society has chosen the neologism "enshittification" as its 2023 word of the year:

The term enshittification became popular in 2023 after it was used in a blog post by author Cory Doctorow, who used it to describe how digital platforms can become worse and worse. "Here is how platforms die: first, they are good to their users; then they abuse their users to make things better for their business customers; finally, they abuse those business customers to claw back all the value for themselves. Then, they die. I call this enshittification," Doctorow wrote on his Pluralistic blog. 

Presiding at the Jan. 6 voting session were Ben Zimmer, chair of the ADS New Words Committee and language columnist for the Wall Street Journal, and Dr. Kelly Elizabeth Wright of Virginia Tech, data czar of the New Words Committee. "Enshittification is a sadly apt term for how our online lives have become gradually degraded," Zimmer said. "From the time that it first appeared in Doctorow's posts and articles, the word had all the markings of a successful neologism, being instantly memorable and adaptable to a variety of contexts."

The term was first seen over at Cory Doctorow's current blog, Pluralistic. It is a form of rent-seeking also known as platform decay.

Previously:
(2023) Enshittification Everywhere. Your Car, Your Phone, Your Tractor, Your Computer...


Original Submission

posted by requerdanos on Tuesday January 09 2024, @11:59PM   Printer-friendly
from the still-yet-another-further-meeting-time dept.

Meeting Announcement: The next meeting of the SoylentNews governance committee is scheduled for Wednesday, January 10, 2024 at 21:00 UTC (4pm Eastern) in #governance on SoylentNews IRC. Logs of the meeting will be available afterwards for review, and minutes will be published when complete.

Minutes and agenda, and other governance committee information have a page on the SoylentNews Wiki at: https://wiki.staging.soylentnews.org/wiki/Governance

Expected topics include the formation of a new corporation and the peaceful transfer of assets. Committee members, you don't want to miss this one!

The community, welcome to observe and participate, is also encouraged to attend the meeting.

posted by hubie on Tuesday January 09 2024, @10:10PM   Printer-friendly

Being fully anonymous is next to impossible—but you can significantly limit what the internet knows about you by sticking to a few basic rules:

On the internet, everyone wants to know who you are. Websites are constantly asking for your email address or trying to place tracking cookies on your devices. A murky slurry of advertisers and tech firms track which websites you visit, predicting what your interests are and what you may want to buy. Search engines, browsers, and apps can log each search or scroll you make.

At this stage of the internet, being totally anonymous across your entire online life is incredibly hard to achieve. Phones, SIM cards, browsers, Wi-Fi networks, and more use identifiers that can be linked to your activity. But there are steps you can take to obscure your identity for everyday browsing.

If you're looking to be truly anonymous or to protect your identity for a specific purpose—such as whistleblowing or activism—you should consider your threat model and individual security situation. But many of the changes you can make, which are listed below, are straightforward switches that can stop you from being tracked as much and apply to most people.

Below is a sampling of suggestions from the article, so click through to see the rest. What ways do you limit your digital fingerprint and where is your line between convenience and privacy?

Start with your web browser. Ideally, you want to block invisible trackers and ads that have tracking tech embedded. Advertisers can also track you using fingerprinting, a sneaky profiling method where the settings of your browser and device (such as language, screen size, and many other details) are used to single you out. If you want to see how your current browser tracks you, the Electronic Frontier Foundation's Cover Your Tracks tool can run a real-time test on your system. Using Chrome, the world's most popular browser, neither tracking ads nor invisible trackers are blocked for me, and my browser has a unique fingerprint.

For the most anonymity, the Tor Browser is best. [...] Several privacy-focused browsers such as FireFox, the Mullvad Browser, and Brave offer enhanced protections against trackers and offer further customizable privacy settings.

If you don't want to switch browsers, there are some browser extensions that can block trackers within Chrome. Both the Ghostery extension and EFF's Privacy Badger will block trackers, with the latter not blocking ads unless they are specifically tracking you. On Walmart's homepage, while using Chrome, for example, Privacy Badger blocked four trackers that were in use, while Ghostery identified five.

Beyond the web, trackers embedded in your mobile applications can gather data on your activity. On Android, you should turn off personalized ads through Google's My Ad Center, simply toggling the setting to off. Also, delete your device's advertising ID by going to Settings, Privacy, Ads and clicking on the Delete advertising ID option. [...] If you use iOS, go to Settings,Privacy & Security, Tracking, and toggle off Allow Apps to Request to Track to stop apps from tracking you across apps and websites.

[...] For messaging, Signal collects very little information about who uses it, and it's encrypted by default, meaning it cannot see the contents of the messages you send. For searching, DuckDuckGo, Brave Search, Kagi, Startpage, and Mojeek are our picks of the most privacy friendly search engines. For email, Proton and Tuta (formerly Tutanota) provide free end-to-end encryption options. OnionShare uses the Tor network to allow you to anonymously share files. Proton Drive offers encrypted file storage online, and Apple's advanced data protection settings allow iCloud storage to be end-to-end encrypted once it is enabled.

If you're using a work laptop or phone, it's also worth keeping in mind that your employer can likely see many, if not all, of the things you do on those devices. If you're searching for a new job or running personal tasks, you likely want to do them on personal devices.

[...] As much as anything, being more anonymous online is linked to your mentality. Simply put, the less you share about yourself online, the less identifiable you will be. That means being careful about what you post on social media—not sharing information that could identify you, your location, or others around you.

[...] As well as being cautious about what you post online, there's also the option to use one-time accounts or masked identities for certain parts of your life. If you require a messaging account that's not tied to your current phone number—over time, phone numbers have become common ways to identify people—it may be worth considering a separate phone and SIM that you can use for that specific purpose.

It has also become easier in recent years to hide your email address from websites and services that you are signing up to. [...]

Being totally anonymous online is incredibly hard to do—and the level of anonymity you require will depend on why you're trying not to be identified. Beyond what we've outlined here (and how paranoid you are), there are more advanced steps that you can take.

It may be worth considering an operating system for your phone or computer that is focused on privacy and anonymity. The Tails operating system, which you need install and run from a USB stick each time you use it, includes Tor, OnionShare, and multiple other tools you can use on your computer. For Android devices, GrapheneOS is an open source operating system that strips away the Google-linked Android elements and focuses on privacy.

There are also a number of extreme security measures you can take if you want to further harden your digital life, without going all the way into what is needed for being anonymous online. You can remove the microphones on your devices, sweep for bugs, or potentially use faraday cages or air gap your devices so that they're not connecting to the outside world. For the majority of people, though, this level of protection may be more trouble than it's worth.


Original Submission

posted by hubie on Tuesday January 09 2024, @05:24PM   Printer-friendly

FDA finds chromium, a second metal contaminant, in applesauce pouches:

Federal investigators have discovered a second contaminant in recalled applesauce pouches — the naturally-occurring metal chromium, which in a certain form can cause a number of adverse health effects.

The finding is the latest development in the Food and Drug Administration's international investigation of high levels of lead found in cinnamon applesauce pouches marketed to children. The pouches of fruit puree that have been recalled were manufactured in Ecuador and sold under the brand names WanaBana, Schnucks and Weis. The U.S. Centers for Disease Control and Prevention is tracking at least 287 confirmed, probable and suspected cases of lead exposure in 37 states linked to the applesauce recall.

The FDA has reported finding extraordinarily high levels of lead in samples of cinnamon from the Ecuador plant where the pouches were made. On Friday, the agency reported it had also found chromium. Chromium is an essential mineral found in foods and dietary supplements, but in one form — called chromium-6 — it can cause harm.

[...] Lead chromate, which contains the potentially toxic chromium-6, has been used in the past to enhance the coloring of turmeric. Federal investigators say the "lead-to-chromium ratio" in the applesauce pouches "is consistent with that of lead chromate."

[...] But investigators said the chromium in lead chromate may be converted to the less toxic form chromium-3, "due to the acidity of the applesauce and the stomach."

Michael Beuhler, the medical director of North Carolina Poison Control, said the discovery of chromium in the applesauce and cinnamon does not necessarily mean the substance will cause harm. He said that "at the levels we're talking about," he doesn't believe there would be much chromium-6 in the pouches. Any chromium-6 that might have been present would probably reduce to a nontoxic form once inside the applesauce pouches, he said.

He said lead chromate could have been added as a powder to cinnamon to affect the weight and color of the spice. Lead chromate can be more than six times heavier than cinnamon, he said.

"I don't believe that this is any cause for additional alarm," Beuhler said. "But it does suggest why it happened."


Original Submission

posted by hubie on Tuesday January 09 2024, @12:37PM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

To say 2023 was a big year in the world of fusion research would be an understatement.

After achieving fusion ignition in late 2022, scientists at the Lawrence Livermore National Laboratory's (LLNL) National Ignition Facility (NIF) in California repeated the feat in late July, and then twice again in recent months, bringing to four the total number of times they've managed to generate more energy from a small pellet of fusion fuel than they put in.

In other words, we're finally on the path to fusion energy, sort of – replicable results and all. 

With the Department of Energy (DoE) recently releasing $42 million in funds for fusion energy research divided between LLNL, Colorado State University, and the University of Rochester, the fusion forecast is calling for some breakthroughs.

Dr John Edwards, LLNL senior advisor and former director of the Inertial Confinement Fusion (ICF) program at Livermore, was happy to tell The Register what he sees on the horizon. 

First things first, Edwards told us. He wants to make sure the world understands something about the fusion research at the NIF: It's never been about fusion energy.

"These results have energized people, but all of that work and funding hasn't been for fusion energy. It's been part of the National Nuclear Security Administration's Stockpile Stewardship and Management Plan (SSMP)," Edwards explained.

[...] "The NIF results were phenomenal," Edwards acknowledged, but "there's a big tech gap between there and commercial fusion. [A pilot plant by the] 2030s is ambitious and there will be setbacks, but we need to be resilient because the results will be tremendous." 

[...] The US government has been wrangling to pass a budget for months, and the latest temporary funding bill only kicks the can down the road to early 2024, but doesn't cover everything. Funding for things like the LLNL and NIF are part of what's been held up, Edwards told us.

[...] If Congress eventually manages to fund the government, the NIF, and "everything else falls into place," Edwards predicted that the NIF will reach new fusion ignition efficiency milestones in 2024.

Anyone following the fusion news out of LLNL knows that, while the X-ray beam that hit the fusion fuel pellet – a diamond-encased, pea sized lump of deuterium and tritium – may have delivered 2.05 megajoules of energy to the pellet and produced 3.15 megajoules, it took far more energy than that to get the whole thing accomplished.

The fuel pellet sits inside a cylindrical chamber known as a hohlraum, which converts laser energy into X-rays that ignite the pellet. Those lasers output 322 megajoules of energy – all but 2.05 mj of which is lost in the conversion to X-rays. 

In essence, Edwards said, the whole system only has an efficiency of around 1 percent, but that could change in 2024.

[...] For starters, using laser fusion to generate power means shooting fuel pellets somewhere in the neighborhood of one to ten times every second – instead of once a month like the NIF.

That means mass production of targets, a method of extracting energy from said targets, and a reliable method of scaling the entire system. In other words, developing an entire framework for an integrated fusion plant – which will be a major part of LLNL's work in the coming year and beyond. 

"We're looking at the emergence of a new public sector," Edwards enthused. "I'm really excited about this." 

[...] So keep an eye open for more breakthroughs in 2024 – provided Congress gets its act together.


Original Submission

posted by hubie on Tuesday January 09 2024, @07:49AM   Printer-friendly
from the buy-out-shut-down dept.

Wickr is Dead

The app was a privacy-championing startup, before becoming an app of choice for drug traffickers and being acquired by Amazon Web Services:

If you open the encrypted messaging app Wickr Me today, you'll be greeted with a line of red text: "Reconnecting..."

[...] Wickr Me is no longer available to download on the Apple App Store or the Google Play Store. The app stopped accepting new users more than a year ago. And now, even current users cannot speak to one another.

So ends the story of an app that while never reaching the popularity of other encrypted messaging apps like Signal, nor those that later turned on end-to-end encryption for the masses like WhatsApp, nonetheless played an important role in the adoption of and debate around secure communications.

[...] Wickr started in 2012. Nico Sell, founder of Wickr, said in a talk a couple of years later that "all of us have something to hide, either now or your future self." Crucially, that came after the Edward Snowden whistleblower revelations of 2013, which saw a massive boom of secure messaging apps and the spread of encryption more generally.

[...] But how was a free app to make money? Part of the answer for Wickr at least ended up being with the U.S. government. In 2021, I reported that Customs and Border Protection (CBP) paid Wickr $700,000 for a number of Wickr licenses. In parallel to its free Wickr Me app, Wickr had developed an enterprise version that allowed governments or businesses to send encrypted messages to one another but still collect and audit messages if necessary. Later that year, I then reported that CBP planned to deploy Wickr across "all components" of the agency as part of a $900,000 contract. I have since obtained more documents about CBP's purchase of Wickr licenses via the Freedom of Information Act (FOIA). I've uploaded them here for posterity.

[...] That transformation from scrappy upstart to government contractor was solidified when Amazon Web Services acquired Wickr in June 2021. I remember being shocked at the time and writing up the news as quickly as I could. What the hell was AWS going to do with an app that was becoming a hotbed for crime, at least in my anecdotal experience?

The answer was to shut it down entirely. After NBC News found in 2022 that Wickr was linked to a string of child abuse cases, AWS announced it would stop accepting new users at the end of that year. The company said it would then kill Wickr Me entirely on December 31, 2023.

The secure messaging world is very different to the one Wickr launched in more than ten years ago. Today mainstream platforms are turning on end-to-end encryption by default, with Facebook doing just that last month. The need for specialist apps like Wickr may be decreasing with certain groups. Maybe it's even a good sign that Wickr has been shown the door.

In addition to the above article, our submitter included a few older, but relevant, links:

What It's Like When The FBI Asks You To Backdoor Your Software

When an FBI agent casually approached Nico Sell about installing a backdoor into her secure messaging program, the agent did not know what he was in for:

At a recent RSA Security Conference, Nico Sell was on stage announcing that her company—Wickr—was making drastic changes to ensure its users' security. She said that the company would switch from RSA encryption to elliptic curve encryption, and that the service wouldn't have a backdoor for anyone.

As she left the stage, before she'd even had a chance to take her microphone off, a man approached her and introduced himself as an agent with the Federal Bureau of Investigation. He then proceeded to "casually" ask if she'd be willing to install a backdoor into Wickr that would allow the FBI to retrieve information.

This encounter, and the agent's casual demeanor, is apparently business as usual as intelligence and law enforcement agencies seek to gain greater access into protected communication systems. Since her encounter with the agent at RSA, Sell says it's a story she's heard again and again. "It sounds like that's how they do it now," she told SecurityWatch. "Always casual, testing, because most people would say yes."

[...] It was clear that the FBI agent didn't know who he was dealing with, because Sell did not back down. Instead, she lectured him on topics ranging from the First and Fourth Amendments to the Constitution, to George Washington's creation of a Post Office in the US. "My ancestor was a drummer boy under Washington," Sell explained. "Washington thought it was very important to have freedom of information and private correspondence without government surveillance."

Her lecture concluded, she proceeded to grill the agent. "I asked if he had official paperwork for me, if this was an official request, who his boss was," said Sell. "He backed down very quickly."

Though she didn't budge for the agent, Sell makes it clear that surveillance and security is a complicated issue. "Ten years ago, I'd have said yes," said Sell. "Because if law enforcement asks you to catch bad guys, who wouldn't want to help?"

The difference now, she explained, was her experiences at BlackHat. Among those, Sell pointed to a BlackHat event where Thomas Cross demonstrated how to break into lawful intercept machines—or wiretaps. "It was very clear that a backdoor for the good guys is always a backdoor for the bad guys."

Secret Documents Show Which Message Apps Are the Most FBI-Proof

WhatsApp and iMessage are not as private as you might think:

Most message apps tout their privacy features in some way. It is common to hear marketing language about "end-to-end encryption" and "private messaging" for basically every communications app out there.

While it's great that encryption has become a selling point for the public, not every "encrypted messaging service" is made equally. Depending on how it is set up, your message app may leak metadata, contacts, and even message contents.

A recently uncovered FBI document obtained by a group called Property of the People and shared with Rolling Stone illustrates just how important your choice of private messenger can be. If you think popular options like Apple's iMessage and the Meta company formerly known as Facebook's WhatsApp are FBI-proof, think again. The nation's top cops can obtain a host of message information on many popular options including some mix of "subscriber data, message sender-receiver data, device backup, IP address, encryption keys, date/time information, registration time data, and user contacts."

[...] Nine popular messaging applications are included in the document: Apple's iMessage; Line, a Japanese message app; Signal, an open source encrypted chat platform popularized by Edward Snowden; Telegram, which originated in Russia and is now based in Dubai; Threema, a paid encryption chat (that I used to use) with servers based in Switzerland; Viber, which was developed in Cyprus and then bought by the Japanese conglomerate Rakuten; the Chinese Swiss army knife app WeChat; Meta's WhatsApp; and Wickr [Me], which is a chat service that Amazon Web Services apparently owns.

The bottom line: of the most popular apps, iMessage and WhatsApp are particularly susceptible to FBI snooping. Telegram and Signal score far better according to the FBI documents. (Line and Viber are also relatively bad picks, and my formerly favored Threema likewise fares more poorly than I'd have expected, but since they aren't as popular this probably isn't relevant for you.)

[...] Now to the encryption winners. It's no surprise that Signal fared well against favored FBI methods. It's open source, independent (albeit with some surprising partnerships), and touted by public personalities with privacy-focused bonafides. Still, I would have expected the FBI to have access to more metadata than they apparently do. Way to go, Signal.

Telegram especially surprised me for scoring so well. End-to-end encryption is not the default for most Telegram communications. You need to select a "secret chat" with an individual to get the full-bodied protection that the FBI document seems to indicate. Groups chats, which is the method preferred of many Telegram users, do not offer the same level of end-to-end encryption. Neither the FBI document nor the Rolling Stone article makes mention of this.

Weirdly, Rolling Stone does not mention Telegram at all, despite being the apparently most FBI-proof application all around and much more popular than Wickr, which does get a nod. The FBI document does note that Telegram may choose to divulge IP addresses and phone numbers for "confirmed terrorist investigations," but it cites Telegram's public policy rather than any secret backchannel.

And in case you want to pick up the banner and roll your own . . .

wicker-crypto-c

GitHub - WickrInc/wickr-crypto-c: An implementation of the Wickr Secure Messaging Protocol in C:

wickr-crypto-c is an implementation of the Wickr Secure Messaging Protocol in C, which provides a platform for secure communications across all Wickr products.

A white paper describing details of the protocol and its security model can be found here. A markdown version of the white paper can also be found in the wiki.

This crypto lib is released for public review for educational, academic, and code audit purposes only (*this is not an open source license, more on license here). We strongly believe in the value of the open source movement and are looking forward to collaborating with the community on this and other future projects, including under the GNU license.


Original Submission