Dozens of Pirate Sites Targeted in New Aussie Crackdown

Post Syndicated from Andy original https://torrentfreak.com/dozens-of-pirate-sites-targeted-in-new-aussie-crackdown-170224/

Following a case brought by Roadshow Films, Foxtel, Disney, Paramount, Columbia, and 20th Century Fox, last December more than fifty Internet service providers Down Under were ordered to start barring subscriber access to ‘pirate’ sites.

At the Federal Court, Justice John Nicholas ruled that The Pirate Bay, Torrentz, TorrentHound, IsoHunt and streaming service SolarMovie would all have to be rendered inaccessible to consumers in Australia. Included in the order were dozens of proxy and mirror sites.

After working so hard to have site-blocking legislation passed, it was only a matter of time before rightsholders returned to have more sites blocked. It was therefore no surprise to hear that a new process was launched earlier today.

Backed by six movie studios, Village Roadshow is again in the driving seat, this time seeking to block dozens of ‘pirate’ sites. ComputerWorld reports that there are 41 sites targeted although a couple of domains in the list relate to the same core site.

Many popular torrent sites are in the spotlight including ExtraTorrent, RarBG, Demonoid, LimeTorrents, Torrent Downloads, TorrentProject, YTS and EZTV.

Streaming portals 123Movies, CouchTuner, Icefilms, Movie4K, PrimeWire, Viooz, Putlocker, WatchFree and WatchSeries are also listed alongside direct download sites RlsBB and TehParadox. The complaint also targets several proxy and mirror sites.

In its application, Roadshow requests that ISPs Telstra, Optus, Vocus, TPG, (and their subsidiaries) block the sites using the template established in the earlier Pirate Bay case. If the movie company wants additional proxy and mirror sites blocked in future, it will need to file an affidavit with the court.

The full list of sites, courtesy of Computerworld, reads as follows:

• 123Movies
• Alluc
• Bitsnoop
• Couchtuner
• Demonoid
• Extra.to
• ExtraTorrent.cc
• EYNY
• EZTV
• FMovies
• GenVideos
• Hdmovieswatch
• Icefilms
• Kinogo
• KissCartoon
• Limetorrents
• MegaShare
• Movie4k
• Phimmoi
• Piratebay.to
• PrimeWire
• Putlocker.ch
• Putlocker.plus
• Putlocker.run
• Putlockers.vip
• Rarbg
• RIsbb
• Shush
• Softarchive
• Spacemov
• Tehparadox
• Torrent Downloads
• TorrentProject
• Viooz
• WatchFree
• WatchSeries
• Xemphimso
• Xmovies8.org
• XMovies8.tv
• Yify Torrent
• YTS

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Lawmakers Won’t Force Google to Police Piracy but Doubt Voluntary Code

Post Syndicated from Andy original https://torrentfreak.com/lawmakers-wont-force-google-police-piracy-doubt-voluntary-code-170224/

Following a Digital Economy Bill committee earlier this month, it was revealed that copyright holders and search engines were close to finalizing a voluntary anti-piracy code. This Monday, it became reality.

Under this agreement, search engines will optimize their algorithms to demote pirated content in search results, with the aim of making infringing content less visible and legal content more so. The system is due to begin in earnest during early summer but what if it doesn’t do its job?

That eventuality has been discussed as part of the negotiations surrounding the Digital Economy Bill, with some lawmakers supporting an amendment which would give the Secretary of State the power to force Google and other search engines to tackle piracy, if the voluntary route fails.

To the relief of Google and the disappointment of rightsholders, this week the amendment was withdrawn but those in favor of the legislation didn’t go quietly. Lord Stevenson of Balmacara was particularly vocal after reading out a portion of the code (shown below) relating to the demoting of sites that receive large numbers of DMCA-style notices.

[T]o more effectively use such notices to demote domains demonstrated to be dedicated to infringement, and to work collaboratively with rights holders to consider other technically reasonable, scalable avenues empirically demonstrated to help materially reduce the appearance of illegitimate sites in the top search rankings

“I could read that again, because you would probably need to hear it again to have the faintest idea what we are talking about,” he said.

“I fear that it smacks of either a lowest common denominator approach or some hard arm-wrestling in the corridors where the discussion took place to get something that looks reasonable on paper.

“It does not smack of a real commitment to scourge out the terrible way in which search engines have referred people who should have known better to material that was not cleared for copyright and should not have been made available to them through that route.”

While Lord Stevenson clearly wasn’t happy, he did reveal some more information on how the code will be managed.

The Minister of State for Intellectual Property will oversee its implementation, supported by quarterly meetings of all parties involved. The Minister will also “set requirements for reporting by search engines and rights holders on any matter herein, including in particular those matters where the Code of Practice calls for ongoing discussion.”

Then, after a year of operation, the effectiveness of the code will be reviewed to ensure “continuing progress towards achieving the Shared Objectives.”

What those objectives are will remain a mystery, however. In response to Lord Stevenson’s request to see a copy of the code, Baroness Buscombe said that wouldn’t be possible.

“We do not plan to publish the code in full because details about the number of copyright infringement reports a site can receive before it is demoted might allow pirates to game the system. We are, however, very happy to share the commitments in the code in more general terms,” she said.

Baroness Buscombe went on to ask for the amendment to be dropped and that was followed by a spirited response from Lord Stevenson.

“I cannot see this agreement lasting and believe that there will have to be a backstop power at some stage,” he said.

“At the moment, it is a ‘large copyright holders against large search engines’ agreement, and on that level it might operate. I do not think it will be effective. I do not think it is sustainable because there will be new people coming in and business models and practices will change — we cannot foresee that.”

And with that the amendment was withdrawn and with it any chance of forcing search engines into compliance by law for the foreseeable future. Only time will tell how things will play out but as the wording of the paragraph cited by Lord Stevenson shows, there is plenty of room for manoever.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Now Available – I3 Instances for Demanding, I/O Intensive Applications

Post Syndicated from Jeff Barr original https://aws.amazon.com/blogs/aws/now-available-i3-instances-for-demanding-io-intensive-applications/

On the first day of AWS re:Invent I published an EC2 Instance Update and promised to share additional information with you as soon as I had it.

Today I am happy to be able to let you know that we are making six sizes of our new I3 instances available in fifteen AWS regions! Designed for I/O intensive workloads and equipped with super-efficient NVMe SSD storage, these instances can deliver up to 3.3 million IOPS at a 4 KB block and up to 16 GB/second of sequential disk throughput. This makes them a great fit for any workload that requires high throughput and low latency including relational databases, NoSQL databases, search engines, data warehouses, real-time analytics, and disk-based caches. When compared to the I2 instances, I3 instances deliver storage that is less expensive and more dense, with the ability to deliver substantially more IOPS and more network bandwidth per CPU core.

The Specs
Here are the instance sizes and the associated specs:

Instance Name vCPU Count Memory
Instance Storage (NVMe SSD) Price/Hour
i3.large 2 15.25 GiB 0.475 TB $0.15
i3.xlarge 4 30.5 GiB 0.950 TB $0.31
i3.2xlarge 8 61 GiB 1.9 TB $0.62
i3.4xlarge 16 122 GiB 3.8 TB (2 disks) $1.25
i3.8xlarge 32 244 GiB 7.6 TB (4 disks) $2.50
i3.16xlarge 64 488 GiB 15.2 TB (8 disks) $4.99

The prices shown are for On-Demand instances in the US East (Northern Virginia) Region; see the EC2 pricing page for more information.

I3 instances are available in On-Demand, Reserved, and Spot form in the US East (Northern Virginia), US West (Oregon), US West (Northern California), US East (Ohio), Canada (Central), South America (São Paulo), EU (Ireland), EU (London), EU (Frankfurt), Asia Pacific (Singapore), Asia Pacific (Tokyo), Asia Pacific (Seoul), Asia Pacific (Mumbai), Asia Pacific (Sydney), and AWS GovCloud (US) Regions. You can also use them as Dedicated Hosts and as Dedicated Instances.

These instances support Hardware Virtualization (HVM) AMIs only, and must be run within a Virtual Private Cloud. In order to benefit from the performance made possible by the NVMe storage, you must run one of the following operating systems:

  • Amazon Linux AMI
  • RHEL – 6.5 or better
  • CentOS – 7.0 or better
  • Ubuntu – 16.04 or 16.10
  • SUSE 12
  • SUSE 11 with SP3
  • Windows Server 2008 R2, 2012 R2, and 2016

The I3 instances offer up to 8 NVMe SSDs. In order to achieve the best possible throughput and to get as many IOPS as possible, you can stripe multiple volumes together, or spread the I/O workload across them in another way.

Each vCPU (Virtual CPU) is a hardware hyperthread on an Intel E5-2686 v4 (Broadwell) processor running at 2.3 GHz. The processor supports the AVX2 instructions, along with Turbo Boost and NUMA.

Go For Launch
The I3 instances are available today in fifteen AWS regions and you can start to use them right now.

Jeff;

 

Лакмус за народи

Post Syndicated from Григор original http://www.gatchev.info/blog/?p=2035

Няма как да живееш в България и да не слушаш постоянно колко велики сме Българите. Как сме повече и по-свестни от всички други народи, във всяко отношение.

И няма как да не слушаш постоянно и колко смотани, извратени и гадни са „гейропата“ и „краварите“. Какъв ужас е при тях. И най-вече как мръсно и гадно се отнасят с хората, които са по дефиниция по-свестни от тях (разбирай българите). Карат ни да си вадим визи. Проверяват дали не сме престъпници. Абе, унижават ни, абсолютно незаслужено… Как да не ги мразиш?

Дали наистина е така? Повечето българи този въпрос не ги интересува. Пък и като гледаш българските медии, няма как иначе да е. Преливат от ужасии за де що се намира на запад от Трън. Дим без огън няма, я!

Само че напоследък се случи нещо прекалено голямо, за да могат да го потулят медиите. Някои се опитаха, де – ама не всички. Една уникална нагледна илюстрация къде е истината.

Новият американски президент, Доналд Дж. Тръмп, така щедро разхвалван от определени медии у нас, предприе определени мерки. А именно – забрани влизането в САЩ на определена категория бежанци. За буйно щастие на определени категории, да ги наречем политически коректно лица. И сащисване на тези, които и с, и без политическа коректност все са си хора.

Само че „краварникът“ в отговор изригна. Имаше купища митинги, протести, тонове възмущение. Одобрението на президента потъна, неодобрението скочи. Известните и обичаните лица от екрана протестираха, и някои подкрепиха думите си с парите си. Даренията към правозащитни организации за ден започнаха да надвишават обичайните към тях за година. (Понеже правозащитните организации застанаха без колебание в защита на бежанците.) Започнаха да се основават комитети за тяхна подкрепа, дори в нарушение на закона, ако е нужно. Тълпи от юристи предложиха услугите си безплатно. Високопоставени съдии обявиха мерките на Тръмп за антиконституционни и ги блокираха. Дори републиканците, защитаващи обичайно Тръмп от всичко, този път го предупредиха – настройва целия народ срещу себе си и срещу тях…

Тръмп, естествено, не се отказа. Социопатите от подтип Аарон Бър много трудно си налагат самоконтрол. Но каквото и да прави той оттук нататък, фактът е налице. Голямата част от американския народ се вдигна, за да защити едни хора, които не са им абсолютно никакви. За които десните медии там непрекъснато им повтарят, че идват, за да бъдат хрантутени от американците и да ги взривяват за благодарност. Доверието, добротата, помощта се вдигнаха на война срещу страха и лъжите и я спечелиха.

Какво правим в такава ситуация ние, великите Българи? Гледаме как динковци ловят мигрантите навсякъде. Опразват им джобовете (което май е и най-честата цел на мероприятието), връзват ги, бият ги и ги отпращат. А ние стоим отстрани, ръкопляскаме и цъкаме с език – какви герои са динковците! Какви патриоти са! Как само ни пазят от злите мигранти, дето иначе ще ги хрантутим, за да ни взривяват!

Прясна-прясна е историята от Елин Пелин. Как семейство бежанци от Сирия, официално признати и приети у нас, си намират там място под наем – но градчето се вдига срещу тях. Всички искат те да бъдат изгонени веднага, за да не ги взривят и ислямизират. Даже виделите ги и запозналите се с тях съседи се присъединяват – „абе те изглеждат готини, ама след тях ще дойдат другите с чалмите и ятаганите“…

Заинтересуваха ли се елинпелинчани – аджеба, тия сирийци мюсюлмани ли са изобщо, още повече пък фанатици? Ако да, защо бягат от „Ислямска държава“, вместо към нея? Много опасно ли е младо семейство с деца? Дали тия с чалмите и ятаганите, дето от тях бяга семейството, са им първи приятелчета и ще дойдат след тях? И ако случайно тръгват да идват, ще им даде ли някой по-решителен отпор от именно това семейство?… Не. За какво им е да се интересуват?

А в Търновската конституция пишеше: „Който роб стъпи на българска земя, свободен става.“ Добре, че е отменена. Защото в момента конституция ни е принципът „който свободен стъпи на българска земя, роб става“. На страха и лъжата.

Може ли човек да отпрати тези, които по независещи от тях причини са останали без прехрана, дом и изобщо възможност за живот? Може, разбира се. Никакъв проблем не е да оставиш някого да умира от глад, или от пристъп на улицата, или от студ през зимата. Да му затвориш вратата е най-лесно… Само дето има цена, ситна и дребна като камилче. Твоето човешко достойнство, лице и стойност.

Възможно ли е сред тези бежанци наистина да има терористи? Да, разбира се. Точно както сред тълпа истински просяци може да има и някой „професионалист“. Както падналият на улицата може да се преструва, за да те преджоби умело, докато му помагаш да се надигне. Както замръзващият пред вратата ти зиме може всъщност да крои планове как да ти отмъкне каквото дребно и скъпо докопа, докато не гледаш… Ще ви спре ли това да купите храна на закъсалата жена пред магазина, която ви моли не за пари, а за парче хляб, пък може и стар? Да помогнете да пренесат до линейката проснатия на тротоара в безсъзнание чичко? Ако да, честито. Ще сте на сигурно и безопасно. Просто ще сте платили цената.

Американците отказаха да я платят. Те са свикнали да имат достойнство, лице и стойност. Ние повечето сме отвикнали отдавна-отдавна – толкова отдавна, че много от нас никога не са ги имали. Затова толкова лесно се съгласихме да платим цената. И я платихме. Лишихме се от човешкото си достойнство – и тези които връзваха бежанците със свински опашки и ги джобеха, и тези които им ръкопляскаха, и тези които просто не надигнахме глас.

Само че мен ме боли от тази платена цена. Срам ме е да се погледна в огледалото, и това не ми харесва. Знам, че на някои не им пука, че са си продали достойнството. И че някои други пък дори не могат да разберат, че са си го продали – за тях достойнство е на някой да му се кланят и да му лижат задника…

Ако случайно някой клиничен патриот сбърка да прочете този запис, сигурно ще е ужасно възмутен. Само че бих го посъветвал да се замисли. Дали възмущението му не е опит да скрие от самия себе си един парещ срам. От това, че едни хора, които той презира, са се показали като хора с достойнство, а той – като човек без достойнство. И не, не ми разправяйте за атентати и жертви. Достойнството не е желанието да се пазиш от реални и измислени заплахи, това се нарича страх. Достойнството е, когато за да помогнеш на другия, побеждаваш страха.

Не че и аз съм щастлив от това сравнение между българите и американците. Хич даже. Но съм твърде дребен и безгласен, за да мога да поуча цял народ. Ще се наложи просто да търпя, че народът ми е избрал да продаде достойнството си.

Докогато мога.

Memory Error Detection Using GCC (Red Hat Developers blog)

Post Syndicated from jake original https://lwn.net/Articles/715438/rss

Over at the Red Hat Developers blog, Martin Sebor looks at some new (or enhanced) warnings available in GCC 7 that will help catch various types of memory errors. For example: “The -Wformat-overflow=level option detects certain and likely buffer overflow in calls to the sprintf family of formatted output functions. The option starts by determining the size of the destination buffer, which can be allocated either statically or dynamically. It then iterates over directives in the format string, calculating the number of bytes each result in output. For integer directives like %i and %x it tries to determine either the exact value of the argument or its range of values and uses the result to calculate the exact or minimum and maximum number of bytes the directive can produce. Similarly for floating point directives such as %a and %f, and string directives such as %s. When it determines that the likely number of bytes a directive results in will not fit in the space remaining in the destination buffer it issues a warning.

Ancient local privilege escalation vulnerability in the kernel announced

Post Syndicated from jake original https://lwn.net/Articles/715429/rss

Andrey Konovalov has announced the discovery and fix of a local privilege escalation in the Linux kernel. Using the syzkaller fuzzer (which LWN looked at around one year ago), he found a double-free in the Datagram Congestion Control Protocol (DCCP) implementation that goes back to at least September 2006 (2.6.18), but probably all the way back to the introduction of DCCP in October 2005 (2.6.14). “[At] this point we have a use-after-free on some_object. An attacker can
control what object that would be and overwrite it’s content with
arbitrary data by using some of the kernel heap spraying techniques.
If the overwritten object has any triggerable function pointers, an
attacker gets to execute arbitrary code within the kernel.

I’ll publish an exploit in a few days, giving people time to update.”

All About Backblaze’s USB Hard Drive Restore

Post Syndicated from Peter Cohen original https://www.backblaze.com/blog/usb-hard-drive-restore/

When you use Backblaze Computer Backup to back up your data to Backblaze it is first encrypted on your PC or Mac, transmitted using encryption, and stored encrypted in the Backblaze cloud. When the time comes for you to restore those files you may decide you don’t want to do that online. After all, it could take a while to download the hundreds of gigabytes of data you have stored with Backblaze. That’s why we offer the ability to securely restore your data using a USB hard drive or USB flash drive instead. Here’s more about the service and how to use it.

Restore By Mail

Backblaze offers the Restore By Mail service for any customer who wants to restore their files by using a USB drive. For restores up to 110 GB we offer a USB flash drive. For larger restores up to 3.5 TB we offer a USB-based hard disk drive instead (we’re currently using WD My Passport Ultra drives). The flash drive costs $99; the hard drive costs $189. Both prices include shipping and handling. You select which method you’d like to use (web, USB hard drive or USB flash drive) at the beginning of the restore process.

We send the drive to you by FedEx. You restore the files at your convenience. What’s more, our Restore Return Refund service saves you money. After your restore is done, send the drive back to us within 30 days. We refund your purchase price in full. We’re not interested in turning hard drive restores into a big profit center. We just want to make it as convenient as possible for you to get your files.

Secure In Transit

Your files are safe even though we’re sending them via a delivery service. If the drive gets intercepted en route, whoever got it can’t to do anything with it. That’s because we encrypt the data on the USB drive before we send it to you. We take the safety and security of your data very seriously at Backblaze.

You’re given a Drive Unlock Code when you order a USB drive from us. View the code by logging into your account page on the Backblaze Web site. Without that Drive Unlock Code, no one can access the data on your drive.

Hard drive encryption used to be optional. A while back we made it the standard operating procedure for any USB flash drive or USB hard drive we send out the door.

How To Restore Your Files Using A USB Hard Drive

Here is a step-by-step guide to recovering your data once you have received your USB hard drive from Backblaze:

  1. To access your data, you will need your personalized drive unlock code. After logging into Backblaze, the drive unlock code can be found on the bottom right of the My Restores page.My Restores
  2. Next, remove the WD My Passport Ultra hard drive from the box and connect it to your computer via the accompanying cable.
  3. Once the hard drive is connected, you will be prompted to enter the unlock code. Copy and paste your drive unlock code from step one into the password field.Unlock My Passport
  4. Now the hard drive will be unlocked and fully accessible to you. You can retrieve all your restored files.

You can send back the USB Hard Drive to us within 30 days, and we’ll refund your purchase price: $189.00 for USB hard drive or $99.00 for USB flash drives. Of course you can keep the USB drive and we’ll keep your money and that’s OK too. We just want to make sure you can get your data back as quickly, conveniently, and securely as possible.

The post All About Backblaze’s USB Hard Drive Restore appeared first on Backblaze Blog | Cloud Storage & Cloud Backup.

Security updates for Thursday

Post Syndicated from jake original https://lwn.net/Articles/715404/rss

Security updates have been issued by Arch Linux (bzip2, kernel, and linux-zen), CentOS (kernel), Debian (bitlbee, kernel, and tomcat7), Fedora (diffoscope, mujs, pcre, plasma-desktop, and tomcat), Mageia (libpcap/tcpdump and spice), Oracle (kernel), Red Hat (kernel, kernel-rt, and python-oslo-middleware), SUSE (php5 and util-linux), Ubuntu (imagemagick), and openSUSE (gd, kernel, libXpm, and libquicktime).

LEDE v17.01.0 final

Post Syndicated from corbet original https://lwn.net/Articles/715356/rss

The final version of the LEDE router distribution’s 17.01.0 release is now
available. “LEDE 17.01.0 “Reboot” incorporates thousands of commits over the last
nine months of effort. With this release, the LEDE development team
closes out an intense effort to modernize many parts of OpenWrt and
incorporate many new modules, packages, and technologies.
” LWN
recently reviewed a release-candidate
version
of LEDE 17.01.

Warner Bros. Settles With Company That Leaked Oscar Screeners

Post Syndicated from Andy original https://torrentfreak.com/warner-bros-settles-with-company-that-leaked-oscar-screeners-170223/

Perfect copies of movies still in theaters are relatively hard to come by, unless you know someone with access to DVD screeners, that is.

These discs are often given out to awards voters “for their consideration” and are supposed to be handled extremely securely so that they don’t fall into the wrong hands.

Nevertheless, every year screeners end up on torrent sites, much to the disappointment of movie companies.

Two titles that leaked back in 2015 were Creed and In the Heart of the Sea but their route to the Internet was a particularly unusual one. After obtaining the discs legally on behalf of its clients, talent agency Innovative Artists used ripping software to copy the movies to its own digital distribution platform.

Quite clearly its security was lacking, as notorious pirate group Hive-CM8 obtained copies of the movies and dumped them online. Both were watermarked, however, which allowed content security company Deluxe Entertainment Services to trace the copies back to Innovative Artists.

In response, Warner Bros. filed a lawsuit against the company last October. Warner pulled no punches, accusing Innovative Artists of using illegal software to circumvent the protection on the discs before placing them on an illegal distribution platform.

The agency publicly apologized for its actions but added that it was surprised by the lawsuit. It had cooperated with Warner right from the beginning in an effort to put things right, so the legal action came out of the blue.

Now, however, the dispute appears to be have been sorted out. According to information received by THR, Warner Bros. and Innovative Artists have come to some kind of settlement agreement.

No court documents have yet been filed to indicate that a settlement has been reached. That being said, it’s rare for such agreements to be made fully public so any terms could remain confidential, even when the notice of dismissal appears. THR says it contacted both parties for comment but neither side provided any information.

Meanwhile, Hive-CM8 have continued releasing copies of leaked DVD screeners over the past several weeks, showing that when one route of supply closes, another one opens.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

s2n Is Now Handling 100 Percent of SSL Traffic for Amazon S3

Post Syndicated from Stephen Schmidt original https://aws.amazon.com/blogs/security/s2n-is-now-handling-100-percent-of-of-ssl-traffic-for-amazon-s3/

s2n logo

In June 2015, we introduced s2n, an open-source implementation of the TLS encryption protocol, making the source code publicly available under the terms of the Apache Software License 2.0 from the s2n GitHub repository. One of the key benefits to s2n is far less code surface, with approximately 6,000 lines of code (compared to OpenSSL’s approximately 500,000 lines). In less than two years, we’ve seen significant enhancements to s2n, with more than 1,000 code commits, plus the addition of fuzz testing and a static analysis tool, tis-interpreter.

Today, we’ve achieved another important milestone for securing customer data: we have replaced OpenSSL with s2n for all internal and external SSL traffic in Amazon Simple Storage Service (Amazon S3) commercial regions. This was implemented with minimal impact to customers, and multiple means of error checking were used to ensure a smooth transition, including client integration tests, catching potential interoperability conflicts, and identifying memory leaks through fuzz testing.

It was only last week that AWS CEO Andy Jassy reiterated something that’s been a continual theme for us here at AWS: “There’s so much security built into cloud computing platforms today, for us, it’s our No. 1 priority—it’s not even close, relative to anything else.” Yes, security remains our top priority, and our commitment to making formal verification of automated reasoning more efficient exemplifies the way we think about our tools and services. Making encryption more developer friendly is critical to what can be a complicated architectural universe. To help make security more robust and precise, we put mechanisms in place to verify every change, including negative test cases that “verify the verifier” by deliberately introducing an error into a test-only build and confirming that the tools reject it.

If you are interested in using or contributing to s2n, the source code, documentation, commits, and enhancements are all publicly available under the terms of the Apache Software License 2.0 from the s2n GitHub repository.

– Steve

Announcing the first SHA1 collision

Post Syndicated from corbet original https://lwn.net/Articles/715348/rss

The Google security blog carries
the news
of the first deliberately constructed SHA-1 hash collision.
We started by creating a PDF prefix specifically crafted to allow us
to generate two documents with arbitrary distinct visual contents, but that
would hash to the same SHA-1 digest. In building this theoretical attack in
practice we had to overcome some new challenges. We then leveraged Google’s
technical expertise and cloud infrastructure to compute the collision which
is one of the largest computations ever completed.

The SHA-1 era is truly coming to an end, even if most attackers lack access
to the computing resources needed for this particular exploit.

Stent-testing smart robot makes the medical grade

Post Syndicated from Lucy Hattersley original https://www.raspberrypi.org/blog/stent-testing-robot/

The Raspberry Pi often makes the world a better place. This time, it’s helping to test 3D-printed stents using a smart stent-testing robot.

Stents are small tubes used to prop open a patient’s airway. They keep people alive, so it’s incredibly important they don’t fail.

In fact, the FDA (Food and Drug Administration) requires testing of each design by compressing it over 300,000 times. That’s a sturdy challenge for any human, which is why machines are normally used to mash up the stents.

The usual stent-destroying machines are dumb clamps, with no idea whether the stent is breaking or not.

Stent Testing Robot Camera

A smarter stent-testing robot

Enter the Stent-Testing Robot, an intelligent arm that mashes stents while a Raspberry Pi Camera Module keeps a sharp eye on how it performs.

It’s designed by Henry J. Feldman, Chief Information Architect at Harvard Medical Faculty Physicians.

“We start with a CT scan of the lungs, and via a 3D reconstruction get the size and shape of the bronchus that we wish to stent open,” explains Henry. “The trick is to make it the exact shape of the airway.”

The challenge with testing is if stents start to fail before the end of the test. The dumb devices currently used continue to pulverise the stent when this happens.

Stent Testing Robot Camera Squisher

Machine vision to control stent-testing

The Raspberry Pi, meanwhile, uses machine vision to stop the mashing at the moment of failure.

The instant-stop approach enables Henry’s team to check which part failed, and view a time-lapse leading up to the failure. The video helps them design more reliable stents in the future.

Henry explains:

Naturally, we turned to the Raspberry Pi, since, along with a servo control HAT, it gave us easy OpenCV integration along with the ability to control a Hitec HS-5665MH servo. We also added an Adafruit 16-channel Servo/PWM HAT. The servo controls a ServoCity Parallel Gripper A.

Python was used to write the servo controller application. The program fires off a separate OpenCV thread to process each image.

Henry and his medical team trained the machine learning system to spot failing stents, and outlined the likely points of failure with a black marker.

Each time the gripper released, the robot took a picture with the Pi Camera Module and performed recognition of the coloured circles via OpenCV. If the black marker had a split or was no longer visible, the robot halted its test.

The test was successful:

While the OpenCV could occasionally get fooled, it was remarkably accurate, and given this was done on an academic budget, the Raspberry Pi gave us high-performance multi-core capabilities for very little money.

The post Stent-testing smart robot makes the medical grade appeared first on Raspberry Pi.

Google: With No Fair Use, It’s More Difficult to Innovate

Post Syndicated from Andy original https://torrentfreak.com/google-with-no-fair-use-its-more-difficult-to-innovate-170223/

With Fair Use Week now in full swing, people around the world are celebrating the freedom to use copyrighted content in certain contexts without fear of prosecution, thereby enabling creativity and inspiring innovation.

The legal freedom offered by fair use is a cornerstone of criticism, research, teaching and news reporting, one that enables the activities of thousands of good causes and enriches the minds of millions. However, not all countries fully embrace the concept.

Perhaps surprisingly, Australia is currently behind the times on this front, a point not lost on Google’s Senior Copyright Counsel, William Patry.

Speaking with The Australian (paywall), Patry describes local copyright law as both arcane and not fit for purpose, while acting as a hindrance to innovation and productivity.

“We think Australians are just as innovative as Americans, but the laws are different. And those laws dictate that commercially we act in a different way,” Patry told the publication.

“Our search function, which is the basis of the entire company, is authorized in the US by fair use. You don’t have anything like that here.”

Australia currently employs a more restrictive “fair dealing” approach, but it’s certainly possible that fair use could be introduced in the near future.

Last year, Australia’s Productivity Commission released a draft report covering various aspects of the country’s intellectual property system. One of its key recommendations was to adopt fair use legislation.

“The Australian Government should amend the Copyright Act 1968 to replace the current fair dealing exceptions with a broad exception for fair use,” the Commission wrote in its report.

“The new exception should contain a clause outlining that the objective of the exception is to ensure Australia’s copyright system targets only those circumstances where infringement would undermine the ordinary exploitation of a work at the time of the infringement.”

Unfortunately, the concept of fair use is not universally welcomed. Local anti-piracy and royalty organizations are opposing its introduction, claiming that it will undermine their ability to make money.

Interestingly, broadcaster Foxtel says that the deployment of fair use would introduce “significant and unnecessary uncertainty into Australian law.” This is the exact opposite of Google’s position.

The search giant says that Australia’s current exceptions fail to offer legal certainty and that a US-style fair use system would be much more predictable.

“If you are a company like Google who wants to store information in the cloud, or internet searches or text and data mining, we can do that safely in the US. We can’t do it here,” Patry concludes.

In its final inquiry paper, Australia’s Productivity Commission renewed its calls for the introduction of fair use, noting that in the US, where fair use is long established, “creative industries thrive.”

Whether fair use will ever hit Aussie shores remains to be seen, but yet again there is a division between how technology companies and entertainment groups would like copyright law to develop. It’s a battle that’s set to continue well into the future.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Free Your Time: Why Outsourcing AWS Management is Vital!

Post Syndicated from Sarah Wilson original http://www.anchor.com.au/blog/2017/02/free-time-outsourcing-aws-management-vital/

While most drivers are capable of carrying out a few basic car maintenance tasks, the majority wouldn’t attempt to reconfigure the clutch or modify the engine, no matter how many YouTube videos or handy guides there might be. Sending the car to a trusted mechanic not only saves a great deal of time and stress—often worth the fee alone— but also gives us the confidence that it is done RIGHT.

Amazon Web Services (AWS) is incredibly powerful, flexible and complex. When a competitive advantage can rely on squeezing every last ounce of performance or uptime from your infrastructure, expert help can make a massive difference that can easily justify—and often more than repay— any management fee. Plus, a certified AWS partner may have access to economies of scale that allow for more competitive pricing—further stretching your AWS spend.

Outsourcing the management of your AWS services isn’t laziness, wasted fees or an admission of defeat. It is a commitment to getting the most from your AWS budget for the benefit of your business.

For more time saving ideas, download our FREE EBook!

The post Free Your Time: Why Outsourcing AWS Management is Vital! appeared first on AWS Managed Services by Anchor.

Turunen: Qt Roadmap for 2017

Post Syndicated from ris original https://lwn.net/Articles/715291/rss

Tuukka Turunen presents a roadmap for
Qt. “Qt 3D was first released with Qt 5.7 and in Qt 5.8 the focus was mostly on stability and performance. With Qt 5.9 we are providing many new features which significantly improve the functionality of Qt 3D. Notable new features include support for mesh morphing and keyframe animations, using Qt Quick items as a texture for 3D elements, as well as support for physically based rendering and particles. There are also multiple smaller features and improvements throughout the Qt 3D module.

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close