Stories
Slash Boxes
Comments

SoylentNews is people

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

What is your favorite keyboard trait?

  • QWERTY
  • AZERTY
  • Silent (sounds)
  • Clicky sounds
  • Thocky sounds
  • The pretty colored lights
  • I use Braille you insensitive clod
  • Other (please specify in comments)

[ Results | Polls ]
Comments:63 | Votes:105

posted by hubie on Sunday March 17 2024, @08:05PM   Printer-friendly
from the no-school-like-the-old-school dept.

A new IRC client (but don't call it an IRC client) is being developed by Linux Mint:

The Ubuntu-based distro currently includes Hexchat in its default software set. IRC isn't as trendy as Discord or Telegram but it is a free, open standard that no single entity controls, is relatively low-bandwidth, interoperable, and efficient.

But as I reported in February: Hexchat is no more.

Hexchat quitting the chat leaves —I so badly want to type leafs there— Linux Mint with a dilemma and an opportunity.

The dilemma being: "should we continue shipping an IRC client, and what role does it serve?" and the opportunity being: "could we replace it with something better?".

[...] Ever wondered why Linux Mint comes with an IRC client preinstalled? It's mainly to offer a way for users of the distro to talk to, ask questions, and get support from other users of the distro in (relative) real time.

[...] Since its official IRC channels remain active, with users and developers using them daily to answer questions, offer support, and connect over a shared interest, should the demise of Hexchat have to mean moating of IRC entirely?

As is, IRC isn't user-friendly. It's a kind of an arcane magic involving strange commands. Its onboarding is obtuse. And the protocol doesn't natively support things like media sharing (screenshots are useful when troubleshooting), clickable links, or other modern "niceties".

And yet, IRC is a fast, established, open, and versatile protocol. It's not as flashy as Discord but it's not encumbered by superfluous social excesses or corporate caveats. It's free and immediate (no sign-up required to use it) which makes it ideal for 'when you need it' use.

So work has begun on a new dedicated "chat room" app to replace Hexchat, called Jargonaut.

Linux Mint's goal is not to build a fully-featured IRC client, or even an IRC client at all. Jargonaut is a chat app that just happens to use IRC as its underlying chat protocol.


Original Submission

posted by hubie on Sunday March 17 2024, @03:19PM   Printer-friendly
from the Phil-Swift-approved dept.

https://phys.org/news/2024-03-dont-materials-electricity.html

Is there a way to stick hard and soft materials together without any tape, glue or epoxy? A new study published in ACS Central Science shows that applying a small voltage to certain objects forms chemical bonds that securely link the objects together. Reversing the direction of electron flow easily separates the two materials. This electroadhesion effect could help create biohybrid robots, improve biomedical implants and enable new battery technologies.

When an adhesive is used to attach two things, it binds the surfaces either through mechanical or electrostatic forces. But sometimes those attractions or bonds are difficult, if not impossible, to undo. As an alternative, reversible adhesion methods are being explored, including electroadhesion (EA).

Though the term is used to describe a few different phenomena, one definition involves running an electric current through two materials causing them to stick together, thanks to attractions or chemical bonds. Previously, Srinivasa Raghavan and colleagues demonstrated that EA can hold soft, oppositely charged materials together, and even be used to build simple structures. This time, they wanted to see if EA could reversibly bind a hard material, such as graphite, to a soft material, such as animal tissue.

[...] For EA to occur, the authors found that the hard material needs to conduct electrons, and the soft material needs to contain salt ions They hypothesize that the adhesion arises from chemical bonds that form between the surfaces after an exchange of electrons. This may explain why some metals that hold onto their electrons strongly, including titanium, and some fruits that contain more sugar than salts, including grapes, failed to adhere in some situations.

A final experiment showed that EA can occur completely underwater, revealing an even wider range of possible applications. The team says that this work could help create new batteries, enable biohybrid robotics, enhance biomedical implants and much more.

Journal Reference:
Wenhao Xu, Faraz A. Burni, and Srinivasa R. Raghavan, Reversibly Sticking Metals and Graphite to Hydrogels and Tissues, ACS Central Science (2024). https://doi.org/10.1021/acscentsci.3c01593


Original Submission

posted by hubie on Sunday March 17 2024, @10:32AM   Printer-friendly

Spike in new versions of an old Trojan — which mimic legitimate VMware domains — alarms security researchers:

A 20-year-old Trojan resurfaced recently with new variants that target Linux and impersonate a trusted hosted domain to evade detection.

Researchers from Palo Alto Networks spotted a new Linux variant of the Bifrost (aka Bifrose) malware that uses a deceptive practice known as typosquatting to mimic a legitimate VMware domain, which allows the malware to fly under the radar. Bifrost is a remote access Trojan (RAT) that's been active since 2004 and gathers sensitive information, such as hostname and IP address, from a compromised system.

There has been a worrying spike in Bifrost Linux variants during the past few months: Palo Alto Networks has detected more than 100 instances of Bifrost samples, which "raises concerns among security experts and organizations," researchers Anmol Murya and Siddharth Sharma wrote in the company's newly published findings.

Moreover, there is evidence that cyberattackers aim to expand Bifrost's attack surface even further, using a malicious IP address associated with a Linux variant hosting an ARM version of Bifrost as well, they said.

"By providing an ARM version of the malware, attackers can expand their grasp, compromising devices that may not be compatible with x86-based malware," the researchers explained. "As ARM-based devices become more common, cybercriminals will likely change their tactics to include ARM-based malware, making their attacks stronger and able to reach more targets."

[...] Though it may be an old-timer when it comes to malware, the Bifrost RAT remains a significant and evolving threat to individuals and organizations alike, particularly with new variants adopting typosquatting to evade detection, the researchers said.

[...] In their post, the researchers shared a list of indicators of compromise, including malware samples and domain and IP addresses associated with the latest Bifrost Linux variants. The researchers advise that enterprises use next-generation firewall products and cloud-specific security services — including URL filtering, malware-prevention applications, and visibility and analytics — to secure cloud environments.

Ultimately, the process of infection allows the malware to bypass security measures and evade detection, and ultimately compromise targeted systems, the researchers said.


Original Submission

posted by hubie on Sunday March 17 2024, @05:45AM   Printer-friendly
from the bleeping dept.

https://arstechnica.com/gaming/2024/03/you-a-holes-court-docs-reveal-epic-ceos-anger-at-steams-30-fees/

Epic CEO Tim Sweeney has long been an outspoken opponent of what he sees as Valve's unreasonable platform fees for listing games on Steam, which start at 30 percent of the total sale price. Now, though, new emails from before the launch of the competing Epic Games Store in 2018 show just how angry Sweeney was with the "assholes" at companies like Valve and Apple for squeezing "the little guy" with what he saw as inflated fees.

The emails, which came out this week as part of Wolfire's price-fixing case against Valve (as noticed by the GameDiscoverCo newsletter), confront Valve managers directly for platform fees Sweeney says are "no longer justifiable."
[...]
The first mostly unredacted email chain from the court documents, from August 2017, starts with Valve co-founder Gabe Newell asking Sweeney if there is "anything we [are] doing to annoy you?" That query was likely prompted by Sweeney's public tweets at the time questioning "why Steam is still taking 30% of gross [when] MasterCard and Visa charge 2-5% per transaction, and CDN bandwidth is around $0.002/GB." Later in the same thread, he laments that "the internet was supposed to obsolete the rent-seeking software distribution middlemen, but here's Facebook, Google, Apple, Valve, etc."
[...]
The second email chain revealed in the lawsuit started in November 2018, with Sweeney offering Valve a heads-up on the impending launch of the Epic Games Store that would come just weeks later. While that move was focused on PC and Mac games, Sweeney quickly pivots to a discussion of Apple's total control over iOS, the subject at the time of a lawsuit whose technicalities were being considered by the Supreme Court.
[...]
In a follow-up email on December 3, just days before the Epic Games Store launch, Sweeney took Valve to task more directly for its policy of offering lower platform fees for the largest developers on Steam.
[...]
After being forwarded the message by Valve's Erik Johnson, Valve COO Scott Lynch simply offered up a sardonic "You mad bro?"

GameDiscoverCo provides a good summary of other legal tidbits offered in the (often heavily redacted) documents published in the case file this week. Wolfire is now seeking a class-action designation in the suit with arguments that largely rehash those that we covered when the case was originally filed in 2021 (and revived in 2022). While Epic Games isn't directly involved in those legal arguments, it seems Sweeney's long-standing position against Valve's monopoly might continue to factor into the case anyway.

Previously on SoylentNews:
Judge Brings Dismissed Steam Antitrust Lawsuit Back From the Dead - 20220513

Related stories on SoylentNews:
US DoJ, Microsoft and 35 States Support an Appeal of Epic Games-Apple Decision - 20200202
"Apple Must be Stopped" and Google is "Crazy" Says Epic Games CEO Tim Sweeney - 20211117
Judge Denies Apple's Request to Delay App Store Changes in Epic Games Case - 20211110
Apple Turns Post-Lawsuit Tables on Epic, Will Block Fortnite on iOS - 20210924
Apple Can No Longer Force Developers to Use In-App Purchasing, Judge Rules - 20210913
Valve Gets Dragged into Apple and Epic's Legal Fight Over Fortnite - 20210219
Your iPhone Copy of Fortnite is About to Become Out of Date [Updated] - 20200826
Judge Issues Restraining Order Protecting Unreal Engine Development on iOS - 20200825
Microsoft Issues Statement in Support of Epic Games to Remain on Apple Ecosystem - 20200824
Epic-Apple Feud Could Also Affect Third-Party Unreal Engine Games - 20200819
Fortnite Maker Sues Apple after Removal of Game From App Store - 20200814
U.S. Video Game Sales Hit $43B in 2018, Eclipsing Record Year at the Box Office - 20190125
Netflix Claims Fortnite is Now a Bigger Competitor than HBO - 20190121


Original Submission

posted by hubie on Sunday March 17 2024, @01:02AM   Printer-friendly
from the everything-is-fine dept.

https://arstechnica.com/tech-policy/2024/03/charges-against-journalist-tim-burke-are-a-hack-job/

Caitlin Vogus is the deputy director of advocacy at Freedom of the Press Foundation and a First Amendment lawyer. Jennifer Stisa Granick is the surveillance and cybersecurity counsel with the ACLU's Speech, Privacy, and Technology Project. The opinions in this piece do not necessarily reflect the views of Ars Technica.

Imagine a journalist finds a folder on a park bench, opens it, and sees a telephone number inside. She dials the number. A famous rapper answers and spews a racist rant. If no one gave her permission to open the folder and the rapper's telephone number was unlisted, should the reporter go to jail for publishing what she heard?

If that sounds ridiculous, it's because it is. And yet, add in a computer and the Internet, and that's basically what a newly unsealed federal indictment accuses Florida journalist Tim Burke of doing when he found and disseminated outtakes of Tucker Carlson's Fox News interview with Ye, the artist formerly known as Kanye West, going on the first of many antisemitic diatribes.
[...]
According to Burke, the video of Carlson's interview with Ye was streamed via a publicly available, unencrypted URL that anyone could access by typing the address into your browser. Those URLs were not listed in any search engine, but Burke says that a source pointed him to a website on the Internet Archive where a radio station had posted "demo credentials" that gave access to a page where the URLs were listed.

The credentials were for a webpage created by LiveU, a company that provides video streaming services to broadcasters. Using the demo username and password, Burke logged into the website, and, Burke's lawyer claims, the list of URLs for video streams automatically downloaded to his computer.

And that, the government says, is a crime. It charges Burke with violating the CFAA's prohibition on intentionally accessing a computer "without authorization" because he accessed the LiveU website and URLs without having been authorized by Fox or LiveU. In other words, because Burke didn't ask Fox or LiveU for permission to use the demo account or view the URLs, the indictment alleges, he acted without authorization.

[...] Using a published demo password to get a list of URLs, which anyone could have used a software program to guess and access, isn't that big of a deal. What was a big deal is that Burke's research embarrassed Fox News. But that's what journalists are supposed to do—uncover questionable practices of powerful entities.

Journalists need never ask corporations for permission to investigate or embarrass them, and the law shouldn't encourage or force them to. Just because someone doesn't like what a reporter does online doesn't mean that it's without authorization and that what he did is therefore a crime.

Still, this isn't the first time that prosecutors have abused computer hacking laws to go after journalists and others, like security researchers. Until a 2021 Supreme Court ruling, researchers and journalists worried that their good faith investigations of algorithmic discrimination could expose them to CFAA liability for exceeding sites' terms of service.
[...]
If journalists must seek permission to publish information they find online from the very people they're exposing, as the government's indictment of Burke suggests, it's a good bet that most information from the obscure but public corners of the Internet will never see the light of day. That would endanger both journalism and public access to important truths. The court reviewing Burke's case should dismiss the charges.

Related Stories on SoylentNews:
No NGO Has Been Allowed to See Julian Assange Since Four Years Ago - 20230410
Federal Court Says Scraping Court Records is Most Likely Protected by the First Amendment - 20230126
'The Government Killed Him': A Tribute to Activist and Programmer Aaron Swartz - 20230112
DOJ Announces It Won't Prosecute White Hat Security Researchers - 20220522
LinkedIn Can't Use Anti-Hacking Law to Block Web Scraping, Judges Rule - 20220420
Supreme Court Overturns Overbroad Interpretation of CFAA, Protecting Researchers and Users - 20210709
China, Coronavirus and Censorship - 20201231
Court: Violating a Site's Terms of Service Isn't Criminal Hacking - 20200401
Web Scraping Doesn't Violate Anti-Hacking Law, Appeals Court Rules - 20190910
The FBI Secretly Collected Data on Aaron Swartz Earlier Than We Thought—in a Case Involving Al Qaeda - 20181214
Court Says Scraping Websites and Creating Fake Profiles Can be Protected by the First Amendment - 20180404
Matthew Keys Leaves Jail but CFAA Reform Will have to Wait - 20180313
Ninth Circuit Doubles Down: Violating a Website's Terms of Service Is Not a Crime - 20180111
Man Gets Threats-Not Bug Bounty-After Finding DJI Customer Data in Public View - 20171121
UK Gov: Journalists Who Obtain Leaked Official Material Could be Sent to Prison Under New Proposals - 20170213
Protection of White-Hat Hackers is Slow in Coming - 20161105
Sharing Your Netflix Password Is Now a Federal Crime - 20160711
When can Password Sharing put you in Prison? - 20160707
ACLU Drags Feds to Court Challenging Hacking Laws - 20160701
14 Pulitzer Winners Call on the Justice Dept to End its Pursuit of James Risen - 20140814
The Aaron Swartz Documentary: Review - 20140808
US DOJ drops 11 of 12 charges against journalist - 20140405


Original Submission

posted by janrinok on Saturday March 16 2024, @08:16PM   Printer-friendly
from the opium-tiktok-vs-spinach-tiktok dept.

Multiple sites are covering H.R.7521 - Protecting Americans from Foreign Adversary Controlled Applications Act which aims to ban Bytedance's Tiktok, a platform for influence and surveillance, from the US.

The app has been a diplomatic hot potato between the United States and China since the administration of former president Donald Trump, who once wanted to ban the app.

Now, a bill in Congress aims to force the company to cut ties with ByteDance or be barred from the United States.

The bill's supporters say ByteDance as a Chinese firm simply cannot go against the wishes of Beijing, and can provide access to the data on more than 170 million American users for everything from spying to election influence campaigns.

And

But that glosses over the deeper TikTok security problem, which the legislation does not fully address. In the four years this battle has gone on, it has become clear that the security threat posed by TikTok has far less to do with who owns it than it does with who writes the code and algorithms that make TikTok tick.

Those algorithms, which guide how TikTok watches its users and feeds them more of what they want, are the magic sauce of an app that 170 million Americans now have on their phones. That's half the country.

But TikTok doesn't own those algorithms; they are developed by engineers who work for its Chinese parent company, ByteDance, which assembles the code in great secrecy in its software labs, in Beijing, Singapore and Mountain View, Calif. But China has issued regulations that appear designed to require government review before any of ByteDance's algorithms could be licensed to outsiders. Few expect those licenses to be issued — meaning that selling TikTok to an American owner without the underlying code might be like selling a Ferrari without its famed engine.

And many other sites:

Back in 2022, CBS 60 Minutes covered Bytedance's Tiktok and the differences between the domestic edition served to audiences in Red China versus the apparent psyops weapon served up to those outside Red China.


Original Submission

posted by janrinok on Saturday March 16 2024, @03:32PM   Printer-friendly
from the so-the-prices-will-come-down,-right? dept.

https://newatlas.com/science/cows-low-cost-insulin-production/

A genetically modified cow has produced milk containing human insulin, according to a new study. The proof-of-concept achievement could be scaled up to, eventually, produce enough insulin to ensure availability and reduced cost for all diabetics requiring the life-maintaining drug.

Unable to rely on their own supply due to damaged pancreatic cells, type 1 diabetics need injectable insulin to live. As do some type 2 diabetics. The World Health Organization estimates that of those who require insulin, between 150 and 200 million people worldwide, only about half are being treated with it. Access to insulin remains inadequate in many low- and middle-income countries – and some high-income countries – and its cost and unavailability have been well-documented.

In a newly published study led by the Department of Animal Sciences in the College of Agricultural, Consumer and Environmental Sciences at the University of Illinois Urbana-Champaign and the Universidade de São Paulo, researchers say they may have developed a way of eliminating insulin scarcity and reducing its cost using cows. Yep, cows.

"Mother Nature designed the mammary gland as a factory to make protein really, really efficiently," said Matt Wheeler, corresponding author of the study. "We can take advantage of that system to produce a protein that can help hundreds of millions of people worldwide."

[...] In the current study, the researchers inserted a segment of human DNA coding for proinsulin into the cells of ten cow embryos implanted into the uteruses of regular Brazilian cows. The implantation resulted in the birth of one transgenic calf. The term 'transgenic' describes an organism that contains artificially introduced DNA from an unrelated organism. Here, the human DNA used was targeted for expression in milk-producing, that is, mammary tissue only. Of course, a cow's mammary gland is more commonly called an udder.
...
When the calf matured, she was given hormones to stimulate her first lactation. While the volume of milk was less than would ordinarily be produced, the researchers found that it contained human proinsulin and – surprisingly – insulin.

"Our goal was to make proinsulin, purify it out to insulin, and go from there," said Wheeler. "But the cow basically processed it herself. She makes [a ratio of] about three-to-one biologically active insulin to proinsulin. The mammary gland is a magical thing."

The insulin and proinsulin were expressed at a few grams per liter of milk. Because lactation was induced by hormones and the milk volume was smaller than expected, the researchers are unable to say exactly how much insulin a cow would make during a typical lactation. But they're willing to hazard a (conservative) guess; if proven correct, the numbers are astounding.

[...] Wheeler said that if a cow produced one gram of insulin per liter of milk and a typical Holstein cow – which produces more milk than any other breed of dairy cow – made 40 to 50 liters a day, that adds up to a lot of insulin. This is especially true considering that one international unit (IU) of insulin is the biological equivalent of 0.0347 mg of pure crystalline insulin.

"That means each gram is equivalent to 28,818 units of insulin," Wheeler said. "And that's just one liter; Holsteins can produce 50 liters a day. You can do the math."

Journal Reference:
Monzani, P. S., Sangalli, J. R., Sampaio, R. V., et al. (2024). Human proinsulin production in the milk of transgenic cattle. Biotechnology Journal, 19, e2300307. https://doi.org/10.1002/biot.202300307


Original Submission

posted by janrinok on Saturday March 16 2024, @10:48AM   Printer-friendly
from the all-your-pixels-belong-to-us dept.

https://arstechnica.com/security/2024/03/hackers-can-read-private-ai-assistant-chats-even-though-theyre-encrypted/

AI assistants have been widely available for a little more than a year, and they already have access to our most private thoughts and business secrets. People ask them about becoming pregnant or terminating or preventing pregnancy, consult them when considering a divorce, seek information about drug addiction, or ask for edits in emails containing proprietary trade secrets. The providers of these AI-powered chat services are keenly aware of the sensitivity of these discussions and take active steps—mainly in the form of encrypting them—to prevent potential snoops from reading other people's interactions.

But now, researchers have devised an attack that deciphers AI assistant responses with surprising accuracy. The technique exploits a side channel present in all of the major AI assistants, with the exception of Google Gemini.

[...] By carefully monitoring these sources, attackers can assemble enough information to recover encrypted keystrokes or encryption keys from CPUs, browser cookies from HTTPS traffic, or secrets from smartcards, The side channel used in this latest attack resides in tokens that AI assistants use when responding to a user query.


Original Submission

posted by janrinok on Saturday March 16 2024, @06:02AM   Printer-friendly

https://www.theregister.com/2024/03/14/voyager_1_not_dead/

Engineers are hopeful that the veteran spacecraft Voyager 1 might have turned a corner after spending the last three months spouting gibberish at controllers.

On March 1, the Voyager team sent a command, dubbed a "poke," to get the probe's Flight Data System (FDS) to try some other sequences in its software in the hope of circumventing whatever had become corrupted.

Readers of a certain vintage will doubtless have memories of poke sheets for various 1980s games. Not that this hack ever used a poke to get infinite lives in Jet Set Willy, of course.

While Voyager 1's lifespan is not infinite, it has endured far longer than anticipated and might be about to dodge yet another bullet. On March 3, the mission team saw something different in the stream of data returned from the spacecraft, which had been unreadable since December.

An engineer with the Deep Space Network (DSN) was able to decode it, and by March 10, the team determined that it contained a complete memory dump from the FDS.

[...] The next step is to study the memory read-out and compare it to one transmitted before the problem arose. A solution to the issue could then be devised.

One of the original Voyager scientists, Garry Hunt, told The Register that engineers at JPL were determined to get communications with the stricken probe working again: "This requires both skills and patience with the long time between communication instructions and response."


Original Submission

posted by hubie on Saturday March 16 2024, @01:17AM   Printer-friendly
from the subscription-everything dept.

https://arstechnica.com/science/2024/03/study-finds-that-we-could-lose-science-if-publishers-go-bankrupt/

Back when scientific publications came in paper form, libraries played a key role in ensuring that knowledge didn't disappear. Copies went out to so many libraries that any failure—a publisher going bankrupt, a library getting closed—wouldn't put us at risk of losing information. But, as with anything else, scientific content has gone digital, which has changed what's involved with preservation.

[...] The work was done by Martin Eve, a developer at Crossref. That's the organization that organizes the DOI system, which provides a permanent pointer toward digital documents, including almost every scientific publication. If updates are done properly, a DOI will always resolve to a document, even if that document gets shifted to a new URL.

But it also has a way of handling documents disappearing from their expected location, as might happen if a publisher went bankrupt. There is a set of what's called "dark archives" that the public doesn't have access to but should contain copies of anything that has had a DOI assigned. If anything goes wrong with a DOI, it should trigger the dark archives to open access and the DOI to update to point to the copy in the dark archive.

For that to work, however, copies of everything published must be in the archives. So Eve decided to check whether that's the case.

[...] When Eve broke down the results by publisher, less than 1 percent of the 204 publishers had put the majority of their content into multiple archives. (The cutoff was 75 percent of their content in three or more archives.) Fewer than 10 percent had put more than half their content in at least two archives. And a full third seemed to be doing no organized archiving at all.

[...] The good news is that large academic publishers appear to be reasonably good about getting things into archives; most of the unarchived issues stem from smaller publishers.

[...] None of this is to say that we've already lost important research documents. But Eve's paper serves a valuable function by highlighting that the risk is real. We're well into the era where print copies of journals are irrelevant to most academics, and digital-only academic journals have proliferated. It's long past time for us to have clear standards in place to ensure that digital versions of research have the endurance that print works have enjoyed.


Original Submission

posted by hubie on Friday March 15 2024, @08:35PM   Printer-friendly

https://www.jmargolin.com/xy/xymon.htm

During my time at Atari/Atari Games I worked on several XY games. This article represents what I know about XY Monitors. XY was Atari's name for what the Computer Graphics industry calls '"Random Scan" and the Video Game Community calls "Vector Games." The major parts of the XY Monitor are the Cathode Ray Tube (CRT), the Deflection Amplifiers, and the High Voltage Supply.


Original Submission

posted by janrinok on Friday March 15 2024, @02:42PM   Printer-friendly

Boeing Paper Trail Goes Cold Over Door Plug Blowout

Arthur T Knackerbracket has processed the following story:

Boeing has come in for criticism from the US National Transportation Safety Board (NTSB) over documentation detailing who was responsible for failures in the Alaska Airlines Flight 1282 door plug attachment.

NTSB chair Jennifer Homendy spoke before the Senate Commerce Committee on March 6. Responding to a question from ranking member Senator Ted Cruz regarding cooperation from the parties involved in the incident, Homendy said: "Boeing has not provided us with the documents and information that we have requested numerous times over the past few months. Specifically with respect to opening, closing, and removal of the door and the team that does that work at the Renton facility."

[...] Investigations have since focused on the door plug and how it was fitted. A preliminary investigation found that the door plug had not been properly bolted into place following work to deal with damaged rivets at the edge of the door frame.

"Wow," said Cruz. "Are you telling us that even two months later, you still do not know who actually opened the door plug?"

"That's correct, Senator," replied Homendy. "We don't know, and it's not for lack of trying." Homendy acknowledged that it can take a while for all the paperwork to be forthcoming. "But for this one, it's two months later."

Homendy told the committee that despite inquiries, the NTSB had not received the names of the 25-member team handling the door plugs. It had also not received all the records regarding the work to deal with the door plug and was having to use email dates and photographs to work out the timeline.

"It's absurd that we don't have that," said Homendy.

Boeing Whistleblower John Barnett Found Dead in US

Boeing whistleblower John Barnett found dead in US - www.independent.co.uk

Barnett blew the whistle on alleged safety problems at Boeing and had been giving evidence in a lawsuit against the company

Boeing whistleblower John Barnett, 62, was found dead in his truck in a hotel parking lot in South Carolina over the weekend.

Mr Barnett blew the whistle on alleged safety problems at the aircraft manufacturing giant and had been giving evidence in a lawsuit against the company in recent days.

[...] Mr Barnett's former employer, Boeing, has responded to his death, saying: "We are saddened by Mr Barnett's passing, and our thoughts are with his family and friends."

[...] In 2019, Mr Barnett alleged that Boeing intentionally used defective parts in its planes and warned that passengers on its 787 Dreamliner might face a lack of oxygen if a sudden decompression occurred.

[....] His attorney Brian Knowles told TMZ that he had doubts about the circumstances of his death.

Boeing Whistleblower John Barnett Found Dead - www.washingtonpost.com

Barnett's whistleblower complaint against the company has been pending for several years, according to court documents

John Barnett, 62, was a quality manager who retired in 2017 after several decades with the company. He died March 9 of what appeared to be a self-inflicted gunshot wound [...]

[...] Barnett's whistleblower complaint has been pending for more than seven years, according to a 2022 order denying Boeing's motion to dismiss the case.

[...] Barnett originally filed a complaint with the Occupational Safety and Health Administration in January 2017 alleging that Boeing retaliated against him. After nearly four years, the agency concluded that there was no retaliation, a decision that Barnett appealed about three years ago. His case has been pending since then, as the two sides have gone through discovery and prehearing motions.


Original Submission #1Original Submission #2

posted by janrinok on Friday March 15 2024, @10:01AM   Printer-friendly

https://hellgatenyc.com/nypd-warrantless-subpoena-copwatcher-social-media

The NYPD sent a sweeping subpoena seeking information from the social media account of the president of a New York City police accountability organization in February, records reviewed by Hell Gate show, only to withdraw its subpoena when told they would need to justify the subpoena in court.

Michael Clancy, better known to friends on and off social media as Rabbi, received a notice last month from X, formerly known as Twitter, alerting him to the fact that the NYPD had sent X a subpoena requesting "all records consisting but not limited to all subscriber name(s), Email address(s), Phone number(s), account creation date, IP logs with timestamps (IP address of account logins and logouts), all logs of previous messages sent and received." The subpoena also requested "all videos sent and received, including but not limited to meta-data. exit data about the messages and videos" for the account.

The notification included a copy of the subpoena, which warned X not to tell Clancy of its existence. "You are not to disclose or notify any customer or third party of the existence of this subpoena or that records were provided pursuant to this subpoena," the document read.

But X, following its own corporate policy, told Clancy anyway, and suggested he might want to get some legal representation to fight the subpoena, recommending the American Civil Liberties Union.


Original Submission

posted by janrinok on Friday March 15 2024, @05:15AM   Printer-friendly
from the is-that-a-banana-in-your-router-or-are-you-just-happy-to-route-packets? dept.

Banana Pi's low-cost router supports 2.5G+5G WiFi with LAN ports:

Banana Pi is now selling a fully built Wi-Fi 6 router with some solid features for just $30 excluding shipping via Ali Express. This router uses OpenWRT firmware and dual-core Arm A9 Processor-based Triductor TR6560 SoC with Triductor's TR5220 WiFi 6 chipset.

The company has been selling this WiFi 6 router board on its own, but now you can buy an out-of-box unit that contains an enclosure for the board with six external antennas, Ethernet cables, and a power adapter with either EU or US plugs. The only difference here is that one of the LAN ports is removed.

[...] The router supports the 802.11ax bandwidth protocol and provides WPA3 password protection. Power over Ethernet is optional and can be added via a module, but it needs to be soldered. Banana Pi's wiki page specifies that its 2.4G signal works up to 40 meters to provide 573.5 Mbps bandwidth and 5G works up to 160 meters up to 2,401.9 Mbps.

Read the specs here.

Related:


Original Submission

posted by janrinok on Friday March 15 2024, @12:28AM   Printer-friendly

https://newatlas.com/energy/sand-battery-finland/

A new industrial-scale 'sand battery' has been announced for Finland, which packs 1 MW of power and a capacity of up to 100 MWh of thermal energy for use during those cold polar winters. The new battery will be about 10 times bigger than a pilot plant that's been running since 2022.

The sand battery, developed by Polar Night Energy, is a clever concept. Basically, it's a big steel silo of sand (or a similar solid material) that's warmed up through a heat exchanger buried in the center, using excess electricity from the grid – say, that generated during a spike from renewable sources, when it's cheap.

That energy can then be stored for months at a time, with reportedly very little loss, before being extracted as heat on demand. This could theoretically be converted back into electricity, although with some energy loss. But Polar Night says that the most efficient method is to just use the heat itself.

In a chilly place like Finland, that means feeding it into the local district heating system, which shares heat produced from industry or energy production through the community. Networks of pipes carry this heat as hot water or steam to warm up houses, buildings, even swimming pools. In this case, the new sand battery would be trialed in the district heating system of the Finnish municipality of Pornainen, run by a company called Loviisan Lämpö.

This new sand battery is expected to stand 13 m (42.7 ft) tall and 15 m (49.2 ft) wide, providing an output power of 1 MW and a capacity of 100 MWh. That, the companies claim, equates to a week's worth of Pornainen's heat demands in winter, or a month's worth in summer. By comparison, Polar Night's previous sand battery stands 4 x 7 m (13 x 23 ft), for a nominal power rating of 100 kW and a capacity of 8 MWh.


Original Submission