An anonymous reader writes: Three researchers have published a paper that details a new method of cracking Bitcoin "brain wallet passwords," which is 2.5 times speedier than previous techniques and incredibly cheap to perform. The researcher revealed that by using a run-of-the-mill Amazon EC2 account, an attacker would be able to check over 500,000 Bitcoin passwords per second. For each US dollar spent on renting the EC2 server, an attacker would be able to check 17.9 billion password strings. To check a trillion passwords, it would cost the attacker only $55.86 (€49.63). In the end, they managed to crack around 18,000 passwords used for real accounts.
David Rothman writes: Props to Amazon. The Helvetica font will be restored to a more readable weight than the anorexic one in the latest update for E Ink Kindles. Let's hope that an all-bold switch—or, better, a font weight adjuster of the kind that Kobo now offers—will also happen. I've queried Amazon about that possibility. Meanwhile thanks to Slashdot community members who spoke up against the anorexic Helvetica!
JoeyRox writes: A new study from the Hebrew University of Jerusalem reveals a paradoxical aspect of human behavior — people who win in competitive situations are more likely to cheat in the future. In one experiment, 86 students were split up into pairs and competed in a game where cheating was impossible. The students were then rearranged into new pairs to play a second game where cheating was possible. The result? Students who won the first game were much more likely to cheat at the second game. Additional experiments indicated that cheating was also more likely if students simply recalled a memory of winning in the past. The experiments further demonstrated that subsequent cheating was more likely in situations where the outcome of previous competitions was determined by merit rather than luck.
derekmead writes: Harvesting electrical power from vibrations or other mechanical stress is pretty easy. Turns out all it really takes is a bit of crystal or ceramic material and a couple of wires and, there you go, piezoelectricity. As stress is applied to the material, charge accumulates, which can then be shuttled away to do useful work. The classic example is an electric lighter, in which a spring-loaded hammer smacks a crystal, producing a spark. Another example is described in a new paper in the Journal of Sound and Vibration, courtesy of engineers at Ohio State's Laboratory of Sound and Vibration Research. The basic idea behind the energy harvesting platform: exploit the natural internal resonances of trees within tiny artificial forests capable of generating enough voltage to power sensors and structural monitoring systems.
JG0LD writes with this news from Network World: A breach-of-contract and copyright lawsuit filed nearly 13 years ago by a successor company to business Linux vendor Caldera International against IBM may be drawing to a close at last, after a U.S. District Court judge issued an order in favor of the latter company earlier this week.
Here's the decision itself (PDF). Also at The Register.
Here's the decision itself (PDF). Also at The Register.
An anonymous reader writes: As part of its wider Internet.org initiative to deliver connectivity to poor and rural communities, Facebook is actively developing a new network technology which uses millimetre wave bands to transmit data. Facebook engineer Sanjai Kohli filed two patents which outlined a 'next generation' data system, which would make use of millimetre wave technology deployed as mesh networks. Kohli's patents detailed a type of centralised, cloud-based routing system which 'dynamically adjusts route and frequency channel assignments, transmit power, modulation, coding, and symbol rate to maximize network capacity and probability of packet delivery, rather than trying to maximize the capacity of any one link.'
prisoninmate writes: After being in development for the last three months or so, LibreOffice 5.1 comes today to a desktop environment near you with some of the most attractive features you've ever seen in an open-source office suite software product, no matter the operating system used. The release highlights of LibreOffice 5.1 include a redesigned user interface for improved ease of use, better interoperability with OOXML files, support for reading and writing files on cloud servers, enhanced support for the ODF 1.2 file format, as well as additional Spreadsheet functions and features. Yesterday, even with the previous version, I was able to successfully use a moderately complex docx template without a hitch — the kind of thing that would have been a pipe-dream not too long ago.
An anonymous reader writes with a link to Robotics Trends, which reports that: After doubling the radius of the "no-drone zone" from 15 miles to 30 miles outside of Washington, D.C. in 2015, the FAA announced drones can now fly in the "outer ring" of the Special Flight Rules Area. This means drones can operate between a 15- to 30-mile radius outside of the nation's capitol. Drones that fly between the 15- to 30-mile radius still have to operate under specific conditions: drones must weigh less than 55 pounds, be registered and marked, fly under 400 feet, stay in the operator's line of sight, only fly in clear conditions, and avoid other aircraft.
munwin99 writes: For the longest time, when bringing up Wayland a recurring question was 'what about network transparency?!' Well, Samsung's Derek Foreman has today published the set of Wayland patches for providing Wayland network transparency by pushing the Wayland protocol over TCP/IP.
v3rgEz writes: Running at over 50 sections and hundreds of subsections, Amazon AWS's terms of service are somewhat exhaustive, but there's one paragraph that might catch your eye. As of yesterday's update, Amazon has added a section that nullifies restrictions on the use of their Lumberyard game platform in the event of a zombie outbreak. Pre-apocalypse, the terms of service prohibit the use of the engine to manage life-or-death situations, but being able to spin up a zombie firefight simulator at a moment's notice might come in handy. You do have to wonder, though: Does Jeff Bezos know something we don't? Lawyers typically don't approve of Easter Eggs in legal documents.
MojoKid writes: To look at the Dell Precision 15 5510, you wouldn't know that it sits in the middle of Dell's workstation lineup. The laptop is thinner and sleeker than you might expect a workstation-class laptop to be and the premium carbon fiber palm rest gives the system a decidedly high-end vibe. Not to mention, like the XPS 15, Dell equipped this machine with its 4K IGZO Infinity Edge display that has almost no bezel on three of its sides. However, the Precision 15 5510 is actually Dell's mid-range mobile workstation that also supports Intel Xeon E3 processors and NVIDIA's Quadro M1000 series GPUs. It's essentially a mobile workstation version of Dell's XPS 15 line but along with an NVMe PCIe Solid State Drive, delivers professional grade performance and the pro app certifications that go with it. Compared to Lenovo's ThinkPad W550 line, the Precision 15 is a more sleek, stylish machine and in testing it packs more punch as well. Lenovo may already have their Skylake Xeon refresh in the works for the ThinkPad W series, however.
An anonymous reader writes: It took 22 months for Trane to patch three security bugs in its ComfortLink II XL950 smart Wi-Fi thermostat product, the ComfortLink II XL950, a modern IoT device along the lines of Google Nest, which offers a simple way to manage your apartment's or building's internal temperature. Researchers contacted Trane about their three issues in April 2014, the company fixed the RCE flaws in April 2015 and recently released a firmware update at the end of January to fix the last issue. During all this time, the company barely answered emails and continued to sell an exposed product.
An anonymous reader writes: In the largest study of gender bias [in programming] to date, researchers found that women tend to have their pull requests accepted at a higher rate than men, across a variety of programming languages. This, despite the finding that their pull requests are larger and less likely to serve an immediate project need. At the same time, when the gender of the women is identifiable (as opposed to hidden), their pull requests are accepted less often than men's.