Space

Strange Stars Pulse To the Golden Mean 157

An anonymous reader sends this excerpt from an article at Quanta Magazine: What struck John Learned about the blinking of KIC 5520878, a bluish-white star 16,000 light-years away, was how artificial it seemed. Learned, a neutrino physicist at the University of Hawaii, Mnoa, has a pet theory that super-advanced alien civilizations might send messages by tickling stars with neutrino beams, eliciting Morse code-like pulses. "It's the sort of thing tenured senior professors can get away with," he said. The pulsations of KIC 5520878, recorded recently by NASA's Kepler telescope, suggested that the star might be so employed.

A "variable" star, KIC 5520878 brightens and dims in a six-hour cycle, seesawing between cool-and-clear and hot-and-opaque. Overlaying this rhythm is a second, subtler variation of unknown origin; this frequency interplays with the first to make some of the star's pulses brighter than others. In the fluctuations, Learned had identified interesting and, he thought, possibly intelligent sequences, such as prime numbers (which have been floated as a conceivable basis of extraterrestrial communication). He then found hints that the star's pulses were chaotic. But when Learned mentioned his investigations to a colleague, William Ditto, last summer, Ditto was struck by the ratio of the two frequencies driving the star's pulsations. "I said, 'Wait a minute, that's the golden mean.'"
Open Source

Linux Kernel Adopts 'Code of Conflict' 93

Motor was one of several readers to note that a small patch recently added to the Linux kernel contains guidelines for discourse and dispute resolution within the community. It's called the "Code of Conflict." Quoting: Your code and ideas behind it will be carefully reviewed, often resulting in critique and criticism. The review will almost always require improvements to the code before it can be included in the kernel. Know that this happens because everyone involved wants to see the best possible solution for the overall success of Linux. .... If however, anyone feels personally abused, threatened, or otherwise uncomfortable due to this process, that is not acceptable. ... As a reviewer of code, please strive to keep things civil and focused on the technical issues involved.
Transportation

Lawsuit Claims Major Automakers Have Failed To Guard Against Hackers 107

Lucas123 writes: A Dallas-based law firm has filed a class-action lawsuit in the U.S. District Court for the Northern District of California claiming Ford, GM and Toyota all ignored basic electronic security measures that leave vehicles open to hackers who can take control of critical functions and endanger the safety of the driver and passengers. The suit, filed on behalf of three vehicle owners and "all others similarly situated" is seeking unspecified damages and an injunction that would force automakers to install proper firewalls or encryption in vehicle computer bus systems, which connect dozens of electronic control units. "Toyota, Ford and GM have deliberately hidden the dangers associated with car computer systems, misleading consumers," attorney Marc Stanley said. The lawsuit cites several studies revealing security flaws in vehicle electronics. A 2013 study by the Defense Advanced Research Projects Agency found researchers could make vehicles "suddenly accelerate, turn, [and] kill the brakes." A study released last month by Sen. Edward Markey (D-Mass.) also claims automakers have fallen far short in their responsibility to secure their vehicles' electronics.
Open Source

On Firing Open Source Community Members 255

An anonymous reader writes: As open source started booming, more people joined. Opinionated people. People who listened to the "we welcome everyone!" message and felt that their opinion could be their primary contribution. For some, they felt showing up at the gig gave them the right to dictate what the band played. From a leadership perspective, this was a tough spot to be in. On one hand, you want to foster an open, welcoming, and empowered community. You want that diversity of skills, but you also want value and quality. Low-quality contributors don't bring much other than noise: they are a net drain on resources because other good contributors have to take time away to support them.

In addition to this, those entitled, special-snowflakes who felt they deserved to be listened to would invariably start whining on their blogs about what they considered to be poor decisions. This caused heat in a community, heat causes sweating, sweating causes irritability, and irritability causes more angry blog posts. Critical blog posts were not the problem; un-constructive, critical blog posts were the problem. So what's the best way to foster a welcoming environment while still being able to remove the destructive elements?
Space

The Milky Way May Be 50 Percent Bigger Than Previously Thought 59

astroengine writes: A ring-like filament of stars wrapping around the Milky Way may actually belong to the galaxy itself, rippling above and below the relatively flat galactic plane. If so, that would expand the size of the known galaxy by 50 percent and raise intriguing questions about what caused the waves of stars. Scientists used data collected by the Sloan Digital Sky Survey to reanalyze the brightness and distance of stars at the edge of the galaxy. They found that the fringe of the disk is puckered into ridges and grooves of stars, like corrugated cardboard. "It looks to me like maybe these patterns are following the spiral structure of the Milky Way, so they may be related," said astronomer Heidi Newberg. In other Milky Way new, a Cambridge team has found nine new dwarf satellites orbiting our galaxy. Some of them are definitely dwarf galaxies, and the others may be the same, or globular clusters.
Businesses

Reactions to the New MacBook and Apple Watch 450

As the dust settles from Apple's press conference yesterday, there have been a broad variety of reactions around the web. Robinson Meyer at The Atlantic says Apple's $10,000 watch demonstrates the company has lost its soul. "The prices grate. And they grate not because they’re so expensive, but because they’re gratuitously expensive. ... To many commentators, this is unsurprising. It’s good business sense, really. Apple has made its world-devouring profits by ratcheting up profit margins on iPhones. There is no better target for these massive margins than the super-rich. But high margins do not a luxury brand make." Others suspect the high-end watches are targeted more at rich people in China.

As for the less expensive watches, perhaps they're around not so much to become a new major sales category for Apple, but rather to drive more iPhone sales. Meanwhile, the redesigned MacBook may signify a bigger change for the laptop industry than people realize: "We don’t need all those other ports, Apple says. We are living in a wireless world now, where we can connect most of our peripherals without cords." The new MacBook has also fueled speculation that Apple could be working on a more powerful tablet, something that could compete with Microsoft's Surface Pro line.
Medicine

Sugar Industry Shaped NIH Agenda On Dental Research 54

sciencehabit writes: The sugar industry convinced the U.S. National Institutes of Health that studies that might persuade people to cut back on sugary foods should not be part of a national plan to fight childhood tooth decay, a new study of historical documents argues. The authors say the industry's activities, which occurred more than 40 years ago, are reminiscent of the tobacco companies' efforts to minimize the risks of smoking.
Programming

Was Linus Torvalds Right About C++ Being So Wrong? 757

Nerval's Lobster writes: Perhaps the most famous rant against C++ came from none other than Linus Torvalds in 2007. "C++ is a horrible language," he wrote, for starters. "It's made more horrible by the fact that a lot of substandard programmers use it, to the point where it's much much easier to generate total and utter crap with it." He's not alone: A lot of developers dislike how much C++ can do "behind the scenes" with STL and Boost, leading to potential instability and inefficiency. And yet there's still demand for C++ out there. Over at Dice, Jeff Cogswell argues that C++ doesn't deserve the hatred. "I've witnessed a lot of 'over-engineering' in my life, wherein people would write reusable classes with several layers of inheritance, even though the reusable class wasn't actually used more than once," he wrote. "But I would argue that's the exception, not the norm; when done right, generic programming and other high-level aspects of C++ can provide enormous benefits." Was Linus going overboard?
Microsoft

Incomplete Microsoft Patch Left Machines Exposed To Stuxnet LNK Vulnerability 33

msm1267 writes: A five-year-old Microsoft patch for the .LNK vulnerability exploited by Stuxnet failed to properly protect Windows machines, leaving them exposed to exploits since 2010. Microsoft today is expected to release a security bulletin, MS15-020, patching the vulnerability (CVE-2015-0096). It is unknown whether there have been public exploits of patched machines. The original LNK patch was released Aug. 2, 2010. "That patch didn't completely address the .LNK issue in the Windows shell, and there were weaknesses left behind that have been resolved in this patch," said Brian Gorenc, manager of vulnerability research with HP's Zero Day Initiative. Gorenc said the vulnerability works on Windows machines going back to Windows XP through Windows 8.1, and the proof of concept exploit developed by Heerklotz and tweaked by ZDI evades the validation checks put in place by the original Microsoft security bulletin, CVE-2010-2568.
United Kingdom

UK ISPs Quietly Block Sites That List Pirate Bay Proxies 113

An anonymous reader tips news that six ISPs in the UK are now blocking sites that simply link to proxies for The Pirate Bay. This follows efforts from copyright holders to block access to the proxy sites themselves — which they've done to limited success through orders from the UK's High Court. [R]estricting access to proxies did not provide a silver bullet either as new ones continue to appear. This week the blocking efforts were stepped up a notch and are now targeting sites that merely provide an overview of various Pirate Bay proxies. ... One of the other blocked sites, piratebayproxy.co.uk, doesn’t have any direct links to infringing material. Instead, it provides an overview of short Pirate Bay news articles while listing the URLs of various proxies on the side. Apparently, providing information about Pirate Bay proxies already warrants a spot on the UK blocklist. ... It is not a secret that the High Court orders give copyright holders the option to continually update the list of infringing domains. However, it’s questionable whether this should also include sites that do not link to any infringing material.
Science

Scientists Insert a Synthetic Memory Into the Brain of a Sleeping Mouse 111

the_newsbeagle writes: Scientists are learning how to insert fake memories into the brain via precise electrical stimulation (abstract). In the latest experiment, they gave sleeping mice a synthetic memory that linked a particular location in a test chamber to a pleasurable sensation. (At least they gave the mice a nice memory.)

The researchers first recorded the electrical signals from the mice's brains while the mice were awake and exploring the test chamber, until the researchers identified patterns of activity associated with a certain location. Then, when the mice slept, the researchers watched for those neural patterns to be replayed, indicating that the mice were consolidating the memory of that location. At that moment, they zapped a reward center of the mice's brains. When the mice awoke and went back into the chamber, they hung around that reward-associated location, presumably expecting a dose of feel-good.
Data Storage

Ask Slashdot: Video Storage For Time Capsule? 169

New submitter dwywit, anticipating World Backup Day, writes I've been asked to film this year's ANZAC services in my town. This is a big one, as it's the centenary of the Gallipoli campaign, and dear to our hearts here in Oz. The organisers have asked me to provide a camera-to-projector setup for remote viewing (they're expecting big crowds this year), and a recording of the parade and various services throughout the morning. Copies will go to the local and state library as a record of the day, but they would also like a copy to go into a time capsule. I have two issues to solve: 1. a storage medium capable of lasting 50 or 100 years and still be readable, and 2. a wrapper/codec that will be available and usable when the capsule is opened. I have the feeling that a conversion to film might be the only way to satisfy both requirements — it's easy enough to build a projector, or even re-scan the images for viewing. Has anyone got a viable alternative? Cloud storage isn't an option — this is going underground in a stainless steel container. See also this similar question from 2008; how have the options changed in the meantime?
Cellphones

CIA Tried To Crack Security of Apple Devices 119

According to a story at The Guardian passed on by an anonymous reader, The CIA led sophisticated intelligence agency efforts to undermine the encryption used in Apple phones, as well as insert secret surveillance back doors into apps, top-secret documents published by the Intercept online news site have revealed. he newly disclosed documents from the National Security Agency's internal systems show surveillance methods were presented at its secret annual conference, known as the "jamboree."
Government

Secret Service Testing Drones, and How to Disrupt Them 66

schwit1 writes with this news from the Associated Press: Mysterious, middle-of-the-night drone flights by the U.S. Secret Service during the next several weeks over parts of Washington — usually off-limits as a strict no-fly zone — are part of secret government testing intended to find ways to interfere with rogue drones or knock them out of the sky, The Associated Press has learned.

A U.S. official briefed on the plans said the Secret Service was testing drones for law enforcement or protection efforts and to look for ways, such as signal jamming, to thwart threats from civilian drones. The drones were being flown between 1 a.m. and 4 a.m. The official spoke on condition of anonymity because this person was not authorized to publicly discuss the plans. The Secret Service has said details were classified. ... The challenge for the Secret Service is quickly detecting a rogue drone flying near the White House or the president's location, then within moments either hacking it to seize control over its flight or jamming its signal to send it off course or make it crash.
Communications

Clinton's Private Email System Gets a Security "F" Rating 315

Penguinisto writes According to a scan by Qualys, Hillary Clinton's personal e-mail server, which has lately generated more than a little controversy in US political circles, has earned an "F" rating for security from the security vendor. Problems include SSL2 support, a weak signature, and only having support for older TLS protocols, among numerous other problems. Note that there are allegations that the email server was possibly already hacked in 2013. (Note: Mrs. Clinton plans on Giving a press conference to the public today on the issue.)
Networking

Does USB Type C Herald the End of Apple's Proprietary Connectors? 392

An anonymous reader writes The Verge has an interesting editorial about the USB Type C connector on the new Macbook, and what this might mean for Apple's Lightning and Thunderbolt connectors. The former is functionally identical to USB Type C, and the latter has yet to prove popular in the external media and "docking" applications for which it was originally intended. Will Apple phase out these ports in favour of a single, widely-accepted, but novel standard? Or do we face a dystopian future where Apple sells cords with USB Type C on one end, and Lightning on the other?
Google

TSYNC Not a Hard Requirement For Google Chrome After All 46

An anonymous reader writes A few days ago it appeared that Google began requiring new versions of the Linux kernel for the Chrome/Chromium web browser. To some people, such requirement smelled funny, and it turns out that those people had the right hunch. Google does not intend for there to be a hard requirement on the latest versions of the Linux kernel that expose SECCOMP_FILTER_FLAG_TSYNC, but instead many users are hitting an issue around it. A Chromium developer commented on the related bug: "Updating the title so that people who have been mislead into thinking non-TSYNC kernels were deprecated immediately understand that there is simply 'some unknown bug' hitting some users." Of course, a user having the TSYNC feature in his kernel will still get a security benefit.
Businesses

Gigaom Closes Shop 101

Presto Vivace writes "What a loss for the tech community," linking to this announcement at Gigaom that the site is shutting down: Gigaom recently became unable to pay its creditors in full at this time. As a result, the company is working with its creditors that have rights to all of the company's assets as their collateral. All operations have ceased. We do not know at this time what the lenders intend to do with the assets or if there will be any future operations using those assets. The company does not currently intend to file bankruptcy. We would like to take a moment and thank our readers and our community for supporting us all along. — Gigaom management Reader bizwriter adds a link to this story on the shutdown.
Communications

Wikimedia Foundation Files Suit Against NSA and DOJ 103

jrepin sends along the news (excerpted from the Wikimedia Foundation's blog) that Today, the Wikimedia Foundation is filing suit against the National Security Agency (NSA) and the Department of Justice (DOJ) of the United States. The lawsuit challenges the NSA's mass surveillance program, and specifically its large-scale search and seizure of internet communications — frequently referred to as "upstream" surveillance. Our aim in filing this suit is to end this mass surveillance program in order to protect the rights of our users around the world. We are joined by eight other organizations and represented by the American Civil Liberties Union (ACLU).
Crime

On the Dangers and Potential Abuses of DNA Familial Searching 163

Advocatus Diaboli sends a story of how a high tech forensic procedure almost led investigators to the wrong person. In 1996, a young woman named Angie Dodge was assaulted and murdered in Idaho Falls, Idaho. There was a conviction in the case, but later reports claimed the wrong man was in prison, and police thought there were more than one attacker anyway. This eventually led to the re-opening of the investigation. Using DNA evidence that had been preserved from the crime scene, police used a controversial technique called familial searching to try to find a lead. This method is used when there is no direct DNA match within the available databases. Instead, it tries to identify family members of the suspect. Police found a partial match, which eventually led them to Michael Usry, a New Orleans filmmaker. They convinced a judge to provide a search warrant to extract Usry's DNA and test it against the sample. It wasn't until a month after the extraction that they told him he'd been cleared.
Medicine

Mental Health Experts Seek To Block the Paths To Suicide 498

HughPickens.com writes: Experts and laymen have long assumed that people who died by suicide will ultimately do it even if temporarily deterred. Now Celia Watson Seupel reports at the NY Times that a growing body of evidence challenges this view, with many experts calling for a reconsideration of suicide-prevention strategies to stress "means restriction." Instead of treating individual risk, means restriction entails modifying the environment by removing the means by which people usually die by suicide. The world cannot be made suicide-proof, of course. But, these researchers argue, if the walkway over a bridge is fenced off, a struggling college freshman cannot throw herself over the side. If parents leave guns in a locked safe, a teenage son cannot shoot himself if he suddenly decides life is hopeless.

Reducing the availability of highly lethal and commonly used suicide methods has been associated with declines in suicide rates of as much as 30%–50% in other countries (PDF). According to Cathy Barber, people trying to die by suicide tend to choose not the most effective method, but the one most at hand. Some methods have a case fatality rate as low as 1 or 2 percent," says Barber. "With a gun, it's closer to 85 or 90 percent. So it makes a difference what you're reaching for in these low-planned or unplanned suicide attempts." Ken Baldwin, who jumped from the Golden Gate Bridge in 1985 and lived, told reporters that he knew as soon as he had jumped that he had made a terrible mistake. "From the instant I saw my hand leave the railing, I knew I wanted to live. I was terrified out of my skull." Baldwin was lucky to survive the 220 foot plunge into frigid waters. Ms. Barber tells another story: On a friend's very first day as an emergency room physician, a patient was wheeled in, a young man who had shot himself in a suicide attempt. "He was begging the doctors to save him," she says. But they could not.
Encryption

UK Parliament: Banning Tor Is Unacceptable and Technologically Impossible 98

An anonymous reader writes: Months after UK prime minister David Cameron sought to ban strong encryption, a new parliamentary briefing contradicts that, at least when it comes to Tor. The briefing says, "there is widespread agreement that banning online anonymity systems altogether is not seen as an acceptable policy option in the UK. Even if it were, there would be technical challenges." The briefing cites Tor's ability to circumvent such censorship in countries like China as well as looking at both legal and illegal uses of Tor.
Bug

Exploiting the DRAM Rowhammer Bug To Gain Kernel Privileges 180

New submitter netelder sends this excerpt from the Project Zero blog: 'Rowhammer' is a problem with some recent DRAM devices in which repeatedly accessing a row of memory can cause bit flips in adjacent rows. We tested a selection of laptops and found that a subset of them exhibited the problem. We built two working privilege escalation exploits that use this effect. One exploit uses rowhammer-induced bit flips to gain kernel privileges on x86-64 Linux when run as an unprivileged userland process. When run on a machine vulnerable to the rowhammer problem, the process was able to induce bit flips in page table entries (PTEs). It was able to use this to gain write access to its own page table, and hence gain read-write access (PDF) to all of physical memory.

Slashdot Top Deals