parallel_prankster writes: Augmented immune cells have made an impressive impact on the survival of people with leukemia. Thirteen people with a form of the cancer called multiple myeloma were treated with genetically engineered T-cells, and all improved. Cancers often develop because T-cells have lost their ability to target tumour cells, which they normally destroy. To retune that targeting, a team led by Aaron Rapoport at the University of Maryland in Baltimore engineered T-cell genes that coded for a receptor on the cell's surface. They extracted T-cells from each person, then inserted the engineered genes into these cells and re-injected them. The souped-up cells were better able to recognise proteins called NY-ESO-1 and LAGE-1, found on myeloma cells but not healthy ones. All 13 people also had the standard treatment for multiple myeloma, which boosts white blood cell count. Three months after the injection, 10 of the 13 were in remission or very close to it – a 77 per cent response rate – and the others showed drastic reduction in their cancer. Standard treatment alone gives a response rate of between 33 and 69 per cent. The original paper is available here . The work is encouraging, but a trial that does not include the standard therapy is needed, says Holger Auner, a myeloma specialist at Imperial College London.
kc67 writes: Unfortunately, around 400 U.S. motorists die each year from drowning when their vehicle plunges into water. To help eliminate the chances of being restrained in a submerged car, a new seat belt mechanism has been designed to make sure that occupants can extract themselves quickly and safely when underwater.
The Escape Belt looks like the traditional female latch that plugs into a car’s buckle. When water hits the interior, a salt pill inside the latch dissolves, causing a hammer to release the male section of the belt to free the occupant. It’s the same technology used by airlines in self-inflating life jackets, and while you’ll still need to open the door, popping the seat belt won’t be an issue.
Fijen TMLS, the Dutch manufacturer that created the product, says that the cartridge needs replacement every few years, but that the system is robust enough that it won’t activate from a spilled Fresca. The mechanism costs a little under $40 for each unit and the company is pursuing automotive supplier partnerships to bring it to market.
I have decided to get serious about off site backups. Naturally, I don't want my data to be readable by prying eyes, so I'm encrypting it. I've done some research, and it's obvious that passwords suck. If my encrypted data is not physically in my possession — it could be in the cloud, at a friend's house, in a safe deposit box, or whatever — then all an attacker needs is enough time to crack it. Worse, the time during which an attack might be detected is only however long it takes to make a copy. After obtaining that copy they can spend all the time they need to crack it.
According to Wikipedia, "As of 2011, commercial products are available that claim the ability to test up to 2,800,000,000 passwords per second...Such a device can crack a 10 letter single-case password in one day." Passwords really suck.
OK, so I need to use a much stronger key to protect the encrypted data. This is not difficult, a few hundred randomly-generated characters is more than enough. But it's also more than I can commit to memory so I have to store THAT somewhere safe, too. Did I mention the application is an off site backup? The idea being, of course, that if the primary copy of my data is destroyed I have something I can recover from. So I need to store the key somewhere that's not likely to be involved in any event that takes out my primary data. Something that fits in my wallet, perhaps, so it's in my physical control. But wallets can be stolen, and if Evil Attacker is reading this he'll know just where to look for my key file.
So I believe (and apparently so do many others in the industry) that a good solution has two factors: something I have (the key file) combined with something I know (a... password). If I store my key file on something that's password protected then I have two-factor protection.
But passwords suck. What I really need is a key file storage device that can resist a brute force attack. I've heard of smart cards and USB devices that use built-in hardware encryption and will wipe their keys after some number of failed attempts. I imagine even they can be defeated in a sufficiently-equipped lab, but really, I'm not that important or interesting.
Are these devices all they're hyped up to be? What other solutions should I consider?"