Skip to main content

Home/ Indie Nation/ Group items matching "research" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
John Lemke

Stealing Encryption Keys Just by Touching a Laptop - 0 views

  • A team of computer security experts at Tel Aviv University (Israel) has come up with a new potentially much simpler method that lets you steal data from computers — Just Touch it — literally.
  • In order to victimize any computer, all you need to do is wear a special digitizer wristband and touch the exposed part of the system. The wristband will measure all the tiny changes in the ground electrical potential that can reveal even stronger encryption keys, such as a 4,096-bit RSA key.
  • in some cases, you don't even have to touch the system directly with your bare hands. You can intercept encryption keys from attached network and video cables as well. Researchers called it a side-channel attack.
  • ...1 more annotation...
  • The actual attack can be performed quickly. According to the research, "despite the GHz-scale clock rate of the laptops and numerous noise sources, the full attacks require a few seconds of measurements using medium frequency signals (around 2 MHz), or one hour using low frequency signals (up to 40 kHz)."
John Lemke

Better Identification of Viking Corpses Reveals: Half of the Warriors Were Female | Tor.com - 0 views

  • By studying osteological signs of gender within the bones themselves, researchers discovered that approximately half of the remains were actually female warriors, given a proper burial with their weapons.
  • I'm a historian who studies burial in the early middle ages, and the burial of women with weapons is one of my specialties! I'm in the process of publishing research about a woman buried with a spear in the 6th century, and am excited to see this important topic being discussed here outside the ivory tower at Tor.com.
  • The key thing to note is the word 'settlers': the article is arguing that women migrated from Scandinavia to England with the invading Viking army in the 9th century. Several of these women, the article notes, were buried with weapons, but they are still far outnumbered by the armed men. Most of the women settlers mentioned in the study were buried with 'traditional' female outfits: brooches that held up their aprons.
  • ...4 more annotations...
  • Archaeologists have been using bones to identify the biological sex of skeletons for the past century, but when burials were found which didn't fit their notions of 'normal,' they tended to assume that the bone analysts had made a mistake. This is not entirely unreasonable, because bones are often so badly decomposed that it is impossible to tell the sex of the person. But I can point to cases where the bones clearly belong to a woman, and the archaeologists insisted that it had to be a man because only men were warriors. That's modern sexism plain and simple, and bad archaeology. But thankfully, archaeologists in recent decades have become aware of this problem, and as a result, more and more women are showing up with weapons!
  • But women with weapons are still a minority, usually fewer than 10% at any given cemetery.
  • First, we're just talking about graves (because that's what survives for archaeologists to dig up). Just because a woman is buried in an apron, does not mean she wasn't a warrior before she died. There was no rule (as far as we know) that warriors had to be buried with their weapons.
  • Second, we can't be sure that everyone buried with a weapon was a warrior. We find infants buried with weapons sometimes; they clearly weren't fighters (though perhaps they would have been had they grown up?). Weapons were powerful ritual objects with lots of magic and social power, and a woman might be buried with one for a reason other than fighting, such as her connection to the ruling family, ownership of land, or role as priestess or magical healer.
John Lemke

Switzerland Questions Crazy Hollywood Claims About File Sharing... Ends Up On Congressional Watchlist | Techdirt - 0 views

  • Last December, we wrote about a report put out by the Swiss executive branch noting that, based on their research, it appeared that unauthorized file sharing was not a big deal, showing that consumers were still spending just as much on entertainment, and that much of it was going directly to artists, rather than to middlemen. In other words, it was a market shift, not a big law enforcement problem. At the time, we wondered if Switzerland had just bought itself a place on the USTR's "Special 301 list" that the administration uses each year to shame countries that Hollywood doesn't like.
John Lemke

A small-town theater campaign's larger projections - latimes.com - 0 views

  • They ran models of Nelson's subscription-based theater idea, showing that to break even they would need 3,000 people, or 15% of the mountain communities, to sign up. For $19.95 per month, a member would be able to see each movie one time and buy individual tickets for friends. Non-members could buy a $16 day pass.
  • While researching the theater business, Nelson learned that studios are transitioning to digital distribution. Thousands of independent theaters that couldn't afford equipment upgrades have closed over the last 10 years, according to industry experts. Hundreds of others — which, like the Met, still show print films — remain on the brink. The subscription business model could pay for the new equipment.
  • The tricky part of the membership-model calculation is that box-office totals are based on ticket sales, and distribution deals for a movie include a percentage of each ticket sold. But Met members would scan magnetic cards to record attendance totals for each film. In the end, the success of the venture may come down to whether major studios are willing to negotiate contracts without traditional tickets being sold. But first, success depends on signing up members.
  •  
    "They ran models of Nelson's subscription-based theater idea, showing that to break even they would need 3,000 people, or 15% of the mountain communities, to sign up. For $19.95 per month, a member would be able to see each movie one time and buy individual tickets for friends. Non-members could buy a $16 day pass."
John Lemke

Want to remotely control a car? $20 in parts, some oily fingers, and you're in command * The Register - 0 views

  • untraceable, off-the-shelf parts worth $20 that can give wireless access to the car's controls while it's on the road.
  • Illera and fellow security researcher Javier Vazquez-Vidal said that they had tested the CAN Hacking Tool (CHT) successfully on four popular makes of cars and had been able to apply the emergency brakes while the car was in motion, affect the steering, turn off the headlights, or set off the car alarm.
  • currently only works via Bluetooth,
John Lemke

Yahoo webcam images from millions of users intercepted by GCHQ | World news | theguardian.com - 0 views

  • Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.
  • between 2008 and 2010
  • Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.The system, eerily reminiscent of the telescreens evoked in George Orwell's 1984, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs
  • ...1 more annotation...
  • Optic Nerve was based on collecting information from GCHQ's huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA's XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo's webcam traffic.
John Lemke

Genetically engineered white blood cells could be the future of HIV treatment | The Verge - 0 views

  • Scientists have successfully modified the white blood cells of 12 patients living with HIV, making their cells resistant to the retrovirus and improving the study participants' overall ability to fight off infection. The researchers achieved this result through a gene editing technique, described today in
  • Unlike the child who went into HIV remission a year ago, the patients in this study continue to test positive for HIV. But the results of this Phase I clinical trial still represent a promising debut for HIV treatments involving tailored gene therapy, as the white blood cells persisted for nearly a year after transfusion.
John Lemke

Force of nature gave life its asymmetry : Nature News & Comment - 0 views

  • In an experiment that took 13 years to perfect1, the researchers have found that these electrons tend to destroy certain organic molecules slightly more often than they destroy their mirror images.
  • The weak nuclear force, which is involved in nuclear decay, is the only force of nature known to have a handedness preference: electrons created in the subatomic process known as β decay are always 'left-handed'. This means that their spin — a quantum property analogous to the magnetization of a bar magnet — is always opposite in direction to the electron's motion.
  • In all cases the asymmetry was tiny, but consistent, like flipping a not-quite-fair coin. “The scale of the asymmetry is as though we flip 20,000 coins again and again, and on average, 10,003 of them land on heads while 9,997 land on tails,” says Dreiling.
John Lemke

Active malware operation let attackers sabotage US energy industry | Ars Technica - 0 views

  • Researchers have uncovered a malware campaign that gave attackers the ability to sabotage the operations of energy grid owners, electricity generation firms, petroleum pipelines, and industrial equipment providers.
  • the hacking group managed to install one of two remote access trojans (RATs) on computers belonging to energy companies located in the US and at least six European countries, according to a
  • Called Dragonfly
  • ...3 more annotations...
  • "This campaign follows in the footsteps of Stuxnet, which was the first known major malware campaign to target ICS systems," the Symantec report stated. "While Stuxnet was narrowly targeted at the Iranian nuclear program and had sabotage as its primary goal, Dragonfly appears to have a much broader focus with espionage and persistent access as its current objective with sabotage as an optional capability if required."
  • been in operation since at least 2011
  • "The Dragonfly group is technically adept and able to think strategically," the Symantec report stated. "Given the size of some of its targets, the group found a 'soft underbelly' by compromising their suppliers, which are invariably smaller, less protected companies."
John Lemke

Sticky Nanobeads Can Strip Bacteria, Viruses From Blood - D-brief | DiscoverMagazine.com - 0 views

  • Bioengineers at Harvard’s Wyss Institute have developed a blood filter that quickly grabs toxins, such as E.coli or Ebola, from the bloodstream using protein-coated nanobeads and magnets. In early tests, the biomechanical treatment removed more than 90 percent of toxins from infected human blood within a few hours.
  • dubbed an “artificial spleen,” instead mechanically clears pathogens from the bloodstream, thereby reducing reliance on heavy doses of antibiotics. Its trick lies in magnetic nanobeads coated with a modified human protein. This protein binds to sugar molecules on the surfaces of more than 90 different bacteria, viruses and fungi, as well as to the toxins released by dead bacteria.
  • Researchers then tested their device by cleaning 5 liters of human blood spiked with a variety of pathogens. The device cleared blood at a rate of 1 liter per hour, and again removed over 90 percent of the pathogens.
John Lemke

Cambridge team breaks superconductor world record | University of Cambridge - 0 views

  • three tonnes of force inside a golf ball-sized sample of material that is normally as brittle as fine china.
  • Superconductors are materials that carry electrical current with little or no resistance when cooled below a certain temperature. While conventional superconductors need to be cooled close to absolute zero (zero degrees on the Kelvin scale, or –273 °C) before they superconduct, high temperature superconductors do so above the boiling point of liquid nitrogen (–196 °C), which makes them relatively easy to cool and cheaper to operate.
  • Superconductors are currently used in scientific and medical applications, such as MRI scanners, and in the future could be used to protect the national grid and increase energy efficiency, due to the amount of electrical current they can carry without losing energy.
John Lemke

Bacteria from bees possible alternative to antibiotics - Lund University - 0 views

  • Raw honey has been used against infections for millennia, before honey - as we now know it - was manufactured and sold in stores. So what is the key to its’ antimicrobial properties? Researchers at Lund University in Sweden have identified a unique group of 13 lactic acid bacteria found in fresh honey, from the honey stomach of bees. The bacteria produce a myriad of active antimicrobial compounds. 
  • While the effect on human bacteria has only been tested in a lab environment thus far, the lactic acid bacteria has been applied directly to horses with persistent wounds. The LAB was mixed with honey and applied to ten horses; where the owners had tried several other methods to no avail. All of the horses' wounds were healed by the mixture.
John Lemke

BBC News - Deep sea 'mushroom' may be new branch of life - 0 views

  • The authors of the article note several similarities with the bizarre and enigmatic soft-bodied life forms that lived between 635 and 540 million years ago - the span of Earth history known as the Ediacaran Period.
  • The authors of the paper recognise two new species of mushroom-shaped animal: Dendrogramma enigmatica and Dendrogramma discoides.
  • The new organisms are multicellular but mostly non-symmetrical, with a dense layer of gelatinous material between the outer skin cell and inner stomach cell layers. The researchers did find some similarities to other animal groupings, such as the Cnidaria - the phylum that comprises corals and jellyfish - and the Ctenophora, which includes the marine organisms known as comb jellies. But the new organisms did not fulfil all the criteria required for inclusion in either of those categories.
  • ...1 more annotation...
  • One way to resolve the question surrounding Dendrogramma's affinities would be to examine its DNA, but new specimens will need to be found. The original samples were first preserved in formaldehyde and later transferred to 80% alcohol, a mode of treatment that prevents analysis of genetic material.
‹ Previous 21 - 34 of 34
Showing 20 items per page