Tag Archives: baby

Top 10 Most Pirated Movies of The Week on BitTorrent – 08/14/17

Post Syndicated from Ernesto original https://torrentfreak.com/top-10-pirated-movies-week-bittorrent-081417/

This week we have two newcomers in our chart.

Guardians of the Galaxy Vol. 2 is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This week’s most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (…) Guardians of the Galaxy Vol. 2 8.0 / trailer
2 (1) The Mummy 2017 5.8 / trailer
3 (6) King Arthur: Legend of the Sword 7.2 / trailer
4 (2) Spider-Man: Homecoming (HDTS) 8.0 / trailer
5 (4) The Boss Baby 6.5 / trailer
6 (5) Wonder Woman (Subbed HDrip) 8.2 / trailer
7 (3) Alien Covenant 6.7 / trailer
8 (7) The Wall 6.2 / trailer
9 (8) Ghost In the Shell 6.8 / trailer
10 (…) Despicable Me 3 (HDTS) 6.4 / trailer

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Top 10 Most Pirated Movies of The Week on BitTorrent – 08/08/17

Post Syndicated from Ernesto original https://torrentfreak.com/top-10-most-pirated-movies-of-the-week-on-bittorrent-080817/

This week we have two newcomers in our chart.

The Mummy, which came out as a Web-DL last week, is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This week’s most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (2) The Mummy 2017 5.8 / trailer
2 (1) Spider-Man: Homecoming (HDTS) 8.0 / trailer
3 (10) Alien Covenant 6.7 / trailer
4 (6) The Boss Baby 6.5 / trailer
5 (8) Wonder Woman (Subbed HDrip) 8.2 / trailer
6 (3) King Arthur: Legend of the Sword 7.2 / trailer
7 (9) The Wall 6.2 / trailer
8 (5) Ghost In the Shell 6.8 / trailer
9 (…) How To Be a Latin Lover 5.7 / trailer
10 (4) Going In Style 6.8 / trailer

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Pimoroni is 5 now!

Post Syndicated from guru original https://www.raspberrypi.org/blog/pimoroni-is-5-now/

Long read written by Pimoroni’s Paul Beech, best enjoyed over a cup o’ grog.

Every couple of years, I’ve done a “State of the Fleet” update here on the Raspberry Pi blog to tell everyone how the Sheffield Pirates are doing. Half a decade has gone by in a blink, but reading back over the previous posts shows that a lot has happened in that time!

TL;DR We’re an increasingly medium-sized design/manufacturing/e-commerce business with workshops in Sheffield, UK, and Essen, Germany, and we employ almost 40 people. We’re totally lovely. Thanks for supporting us!

 

We’ve come a long way, baby

I’m sitting looking out the window at Sheffield-on-Sea and feeling pretty lucky about how things are going. In the morning, I’ll be flying east for Maker Faire Tokyo with Niko (more on him later), and to say hi to some amazing people in Shenzhen (and to visit Huaqiangbei, of course). This is after I’ve already visited this year’s Maker Faires in New York, San Francisco, and Berlin.

Pimoroni started out small, but we’ve grown like weeds, and we’re steadily sauntering towards becoming a medium-sized business. That’s thanks to fantastic support from the people who buy our stuff and spread the word. In return, we try to be nice, friendly, and human in everything we do, and to make exciting things, ideally with our own hands here in Sheffield.

Pimoroni soldering

Handmade with love

We’ve made it onto a few ‘fastest-growing’ lists, and we’re in the top 500 of the Inc. 5000 Europe list. Adafruit did it first a few years back, and we’ve never gone wrong when we’ve followed in their footsteps.

The slightly weird nature of Pimoroni means we get listed as either a manufacturing or e-commerce business. In reality, we’re about four or five companies in one shell, which is very much against the conventions of “how business is done”. However, having seen what Adafruit, SparkFun, and Seeed do, we’re more than happy to design, manufacture, and sell our stuff in-house, as well as stocking the best stuff from across the maker community.

Pimoroni stocks

Product and process

The whole process of expansion has not been without its growing pains. We’re just under 40 people strong now, and have an outpost in Germany (also hilariously far from the sea for piratical activities). This means we’ve had to change things quickly to improve and automate processes, so that the wheels won’t fall off as things get bigger. Process optimization is incredibly interesting to a geek, especially the making sure that things are done well, that mistakes are easy to spot and to fix, and that nothing is missed.

At the end of 2015, we had a step change in how busy we were, and our post room and support started to suffer. As a consequence, we implemented measures to become more efficient, including small but important things like checking in parcels with a barcode scanner attached to a Raspberry Pi. That Pi has been happily running on the same SD card for a couple of years now without problems 😀

Pimoroni post room

Going postal?

We also hired a full-time support ninja, Matt, to keep the experience of getting stuff from us light and breezy and to ensure that any problems are sorted. He’s had hugely positive impact already by making the emails and replies you see more friendly. Of course, he’s also started using the laser cutters for tinkering projects. It’d be a shame to work at Pimoroni and not get to use all the wonderful toys, right?

Employing all the people

You can see some of the motley crew we employ here and there on the Pimoroni website. And if you drop by at the Raspberry Pi Birthday Party, Pi Wars, Maker Faires, Deer Shed Festival, or New Scientist Live in September, you’ll be seeing new Pimoroni faces as we start to engage with people more about what we do. On top of that, we’re starting to make proper videos (like Sandy’s soldering guide), as opposed to the 101 episodes of Bilge Tank we recorded in a rather off-the-cuff and haphazard fashion. Although that’s the beauty of Bilge Tank, right?

Pimoroni soldering

Such soldering setup

As Emma, Sandy, Lydia, and Tanya gel as a super creative team, we’re starting to create more formal educational resources, and to make kits that are suitable for a wider audience. Things like our Pi Zero W kits are products of their talents.

Emma is our new Head of Marketing. She’s really ‘The Only Marketing Person Who Would Ever Fit In At Pimoroni’, having been a core part of the Sheffield maker scene since we hung around with one Ben Nuttall, in the dark days before Raspberry Pi was a thing.

Through a series of fortunate coincidences, Niko and his equally talented wife Mena were there when we cut the first Pibow in 2012. They immediately pitched in to help us buy our second laser cutter so we could keep up with demand. They have been supporting Pimoroni with sourcing in East Asia, and now Niko has become a member of the Pirates’ Council and the Head of Engineering as we’re increasing the sophistication and scale of the things we do. The Unicorn HAT HD is one of his masterpieces.

Pimoroni devices

ALL the HATs!

We see ourselves as a wonderful island of misfit toys, and it feels good to have the best toy shop ever, and to support so many lovely people. Business is about more than just profits.

Where do we go to, me hearties?

So what are our plans? At the moment we’re still working absolutely flat-out as demand from wholesalers, retailers, and customers increases. We thought Raspberry Pi was big, but it turns out it’s just getting started. Near the end of 2016, it seemed to reach a whole new level of popularityand still we continue to meet people to whom we have to explain what a Pi is. It’s a good problem to have.

We need a bigger space, but it’s been hard to find somewhere suitable in Sheffield that won’t mean we’re stuck on an industrial estate miles from civilisation. That would be bad for the crewwe like having world-class burritos on our doorstep.

The good news is, it looks like our search is at an end! Just in time for the arrival of our ‘Super-Turbo-Death-Star’ new production line, which will enable to make devices in a bigger, better, faster, more ‘Now now now!’ fashion \o/

Pimoroni warehouse

Spacious, but not spacious enough!

We’ve got lots of treasure in the pipeline, but we want to pick up the pace of development even more and create many new HATs, pHATs, and SHIMs, e.g. for environmental sensing and audio applications. Picade will also be getting some love to make it slicker and more hackable.

We’re also starting to flirt with adding more engineering and production capabilities in-house. The plan is to try our hand at anodising, powder-coating, and maybe even injection-moulding if we get the space and find the right machine. Learning how to do things is amazing, and we love having an idea and being able to bring it to life in almost no time at all.

Pimoroni production

This is where the magic happens

Fanks!

There are so many people involved in supporting our success, and some people we love for just existing and doing wonderful things that make us want to do better. The biggest shout-outs go to Liz, Eben, Gordon, James, all the Raspberry Pi crew, and Limor and pt from Adafruit, for being the most supportive guiding lights a young maker company could ever need.

A note from us

It is amazing for us to witness the growth of businesses within the Raspberry Pi ecosystem. Pimoroni is a wonderful example of an organisation that is creating opportunities for makers within its local community, and the company is helping to reinvigorate Sheffield as the heart of making in the UK.

If you’d like to take advantage of the great products built by the Pirates, Monkeys, Robots, and Ninjas of Sheffield, you should do it soon: Pimoroni are giving everyone 20% off their homemade tech until 6 August.

Pimoroni, from all of us here at Pi Towers (both in the UK and USA), have a wonderful birthday, and many a grog on us!

The post Pimoroni is 5 now! appeared first on Raspberry Pi.

Top 10 Most Obvious Hacks of All Time (v0.9)

Post Syndicated from Robert Graham original http://blog.erratasec.com/2017/07/top-10-most-obvious-hacks-of-all-time.html

For teaching hacking/cybersecurity, I thought I’d create of the most obvious hacks of all time. Not the best hacks, the most sophisticated hacks, or the hacks with the biggest impact, but the most obvious hacks — ones that even the least knowledgeable among us should be able to understand. Below I propose some hacks that fit this bill, though in no particular order.

The reason I’m writing this is that my niece wants me to teach her some hacking. I thought I’d start with the obvious stuff first.

Shared Passwords

If you use the same password for every website, and one of those websites gets hacked, then the hacker has your password for all your websites. The reason your Facebook account got hacked wasn’t because of anything Facebook did, but because you used the same email-address and password when creating an account on “beagleforums.com”, which got hacked last year.

I’ve heard people say “I’m sure, because I choose a complex password and use it everywhere”. No, this is the very worst thing you can do. Sure, you can the use the same password on all sites you don’t care much about, but for Facebook, your email account, and your bank, you should have a unique password, so that when other sites get hacked, your important sites are secure.

And yes, it’s okay to write down your passwords on paper.

Tools: HaveIBeenPwned.com

PIN encrypted PDFs

My accountant emails PDF statements encrypted with the last 4 digits of my Social Security Number. This is not encryption — a 4 digit number has only 10,000 combinations, and a hacker can guess all of them in seconds.
PIN numbers for ATM cards work because ATM machines are online, and the machine can reject your card after four guesses. PIN numbers don’t work for documents, because they are offline — the hacker has a copy of the document on their own machine, disconnected from the Internet, and can continue making bad guesses with no restrictions.
Passwords protecting documents must be long enough that even trillion upon trillion guesses are insufficient to guess.

Tools: Hashcat, John the Ripper

SQL and other injection

The lazy way of combining websites with databases is to combine user input with an SQL statement. This combines code with data, so the obvious consequence is that hackers can craft data to mess with the code.
No, this isn’t obvious to the general public, but it should be obvious to programmers. The moment you write code that adds unfiltered user-input to an SQL statement, the consequence should be obvious. Yet, “SQL injection” has remained one of the most effective hacks for the last 15 years because somehow programmers don’t understand the consequence.
CGI shell injection is a similar issue. Back in early days, when “CGI scripts” were a thing, it was really important, but these days, not so much, so I just included it with SQL. The consequence of executing shell code should’ve been obvious, but weirdly, it wasn’t. The IT guy at the company I worked for back in the late 1990s came to me and asked “this guy says we have a vulnerability, is he full of shit?”, and I had to answer “no, he’s right — obviously so”.

XSS (“Cross Site Scripting”) [*] is another injection issue, but this time at somebody’s web browser rather than a server. It works because websites will echo back what is sent to them. For example, if you search for Cross Site Scripting with the URL https://www.google.com/search?q=cross+site+scripting, then you’ll get a page back from the server that contains that string. If the string is JavaScript code rather than text, then some servers (thought not Google) send back the code in the page in a way that it’ll be executed. This is most often used to hack somebody’s account: you send them an email or tweet a link, and when they click on it, the JavaScript gives control of the account to the hacker.

Cross site injection issues like this should probably be their own category, but I’m including it here for now.

More: Wikipedia on SQL injection, Wikipedia on cross site scripting.
Tools: Burpsuite, SQLmap

Buffer overflows

In the C programming language, programmers first create a buffer, then read input into it. If input is long than the buffer, then it overflows. The extra bytes overwrite other parts of the program, letting the hacker run code.
Again, it’s not a thing the general public is expected to know about, but is instead something C programmers should be expected to understand. They should know that it’s up to them to check the length and stop reading input before it overflows the buffer, that there’s no language feature that takes care of this for them.
We are three decades after the first major buffer overflow exploits, so there is no excuse for C programmers not to understand this issue.

What makes particular obvious is the way they are wrapped in exploits, like in Metasploit. While the bug itself is obvious that it’s a bug, actually exploiting it can take some very non-obvious skill. However, once that exploit is written, any trained monkey can press a button and run the exploit. That’s where we get the insult “script kiddie” from — referring to wannabe-hackers who never learn enough to write their own exploits, but who spend a lot of time running the exploit scripts written by better hackers than they.

More: Wikipedia on buffer overflow, Wikipedia on script kiddie,  “Smashing The Stack For Fun And Profit” — Phrack (1996)
Tools: bash, Metasploit

SendMail DEBUG command (historical)

The first popular email server in the 1980s was called “SendMail”. It had a feature whereby if you send a “DEBUG” command to it, it would execute any code following the command. The consequence of this was obvious — hackers could (and did) upload code to take control of the server. This was used in the Morris Worm of 1988. Most Internet machines of the day ran SendMail, so the worm spread fast infecting most machines.
This bug was mostly ignored at the time. It was thought of as a theoretical problem, that might only rarely be used to hack a system. Part of the motivation of the Morris Worm was to demonstrate that such problems was to demonstrate the consequences — consequences that should’ve been obvious but somehow were rejected by everyone.

More: Wikipedia on Morris Worm

Email Attachments/Links

I’m conflicted whether I should add this or not, because here’s the deal: you are supposed to click on attachments and links within emails. That’s what they are there for. The difference between good and bad attachments/links is not obvious. Indeed, easy-to-use email systems makes detecting the difference harder.
On the other hand, the consequences of bad attachments/links is obvious. That worms like ILOVEYOU spread so easily is because people trusted attachments coming from their friends, and ran them.
We have no solution to the problem of bad email attachments and links. Viruses and phishing are pervasive problems. Yet, we know why they exist.

Default and backdoor passwords

The Mirai botnet was caused by surveillance-cameras having default and backdoor passwords, and being exposed to the Internet without a firewall. The consequence should be obvious: people will discover the passwords and use them to take control of the bots.
Surveillance-cameras have the problem that they are usually exposed to the public, and can’t be reached without a ladder — often a really tall ladder. Therefore, you don’t want a button consumers can press to reset to factory defaults. You want a remote way to reset them. Therefore, they put backdoor passwords to do the reset. Such passwords are easy for hackers to reverse-engineer, and hence, take control of millions of cameras across the Internet.
The same reasoning applies to “default” passwords. Many users will not change the defaults, leaving a ton of devices hackers can hack.

Masscan and background radiation of the Internet

I’ve written a tool that can easily scan the entire Internet in a short period of time. It surprises people that this possible, but it obvious from the numbers. Internet addresses are only 32-bits long, or roughly 4 billion combinations. A fast Internet link can easily handle 1 million packets-per-second, so the entire Internet can be scanned in 4000 seconds, little more than an hour. It’s basic math.
Because it’s so easy, many people do it. If you monitor your Internet link, you’ll see a steady trickle of packets coming in from all over the Internet, especially Russia and China, from hackers scanning the Internet for things they can hack.
People’s reaction to this scanning is weirdly emotional, taking is personally, such as:
  1. Why are they hacking me? What did I do to them?
  2. Great! They are hacking me! That must mean I’m important!
  3. Grrr! How dare they?! How can I hack them back for some retribution!?

I find this odd, because obviously such scanning isn’t personal, the hackers have no idea who you are.

Tools: masscan, firewalls

Packet-sniffing, sidejacking

If you connect to the Starbucks WiFi, a hacker nearby can easily eavesdrop on your network traffic, because it’s not encrypted. Windows even warns you about this, in case you weren’t sure.

At DefCon, they have a “Wall of Sheep”, where they show passwords from people who logged onto stuff using the insecure “DefCon-Open” network. Calling them “sheep” for not grasping this basic fact that unencrypted traffic is unencrypted.

To be fair, it’s actually non-obvious to many people. Even if the WiFi itself is not encrypted, SSL traffic is. They expect their services to be encrypted, without them having to worry about it. And in fact, most are, especially Google, Facebook, Twitter, Apple, and other major services that won’t allow you to log in anymore without encryption.

But many services (especially old ones) may not be encrypted. Unless users check and verify them carefully, they’ll happily expose passwords.

What’s interesting about this was 10 years ago, when most services which only used SSL to encrypt the passwords, but then used unencrypted connections after that, using “cookies”. This allowed the cookies to be sniffed and stolen, allowing other people to share the login session. I used this on stage at BlackHat to connect to somebody’s GMail session. Google, and other major websites, fixed this soon after. But it should never have been a problem — because the sidejacking of cookies should have been obvious.

Tools: Wireshark, dsniff

Stuxnet LNK vulnerability

Again, this issue isn’t obvious to the public, but it should’ve been obvious to anybody who knew how Windows works.
When Windows loads a .dll, it first calls the function DllMain(). A Windows link file (.lnk) can load icons/graphics from the resources in a .dll file. It does this by loading the .dll file, thus calling DllMain. Thus, a hacker could put on a USB drive a .lnk file pointing to a .dll file, and thus, cause arbitrary code execution as soon as a user inserted a drive.
I say this is obvious because I did this, created .lnks that pointed to .dlls, but without hostile DllMain code. The consequence should’ve been obvious to me, but I totally missed the connection. We all missed the connection, for decades.

Social Engineering and Tech Support [* * *]

After posting this, many people have pointed out “social engineering”, especially of “tech support”. This probably should be up near #1 in terms of obviousness.

The classic example of social engineering is when you call tech support and tell them you’ve lost your password, and they reset it for you with minimum of questions proving who you are. For example, you set the volume on your computer really loud and play the sound of a crying baby in the background and appear to be a bit frazzled and incoherent, which explains why you aren’t answering the questions they are asking. They, understanding your predicament as a new parent, will go the extra mile in helping you, resetting “your” password.

One of the interesting consequences is how it affects domain names (DNS). It’s quite easy in many cases to call up the registrar and convince them to transfer a domain name. This has been used in lots of hacks. It’s really hard to defend against. If a registrar charges only $9/year for a domain name, then it really can’t afford to provide very good tech support — or very secure tech support — to prevent this sort of hack.

Social engineering is such a huge problem, and obvious problem, that it’s outside the scope of this document. Just google it to find example after example.

A related issue that perhaps deserves it’s own section is OSINT [*], or “open-source intelligence”, where you gather public information about a target. For example, on the day the bank manager is out on vacation (which you got from their Facebook post) you show up and claim to be a bank auditor, and are shown into their office where you grab their backup tapes. (We’ve actually done this).

More: Wikipedia on Social Engineering, Wikipedia on OSINT, “How I Won the Defcon Social Engineering CTF” — blogpost (2011), “Questioning 42: Where’s the Engineering in Social Engineering of Namespace Compromises” — BSidesLV talk (2016)

Blue-boxes (historical) [*]

Telephones historically used what we call “in-band signaling”. That’s why when you dial on an old phone, it makes sounds — those sounds are sent no differently than the way your voice is sent. Thus, it was possible to make tone generators to do things other than simply dial calls. Early hackers (in the 1970s) would make tone-generators called “blue-boxes” and “black-boxes” to make free long distance calls, for example.

These days, “signaling” and “voice” are digitized, then sent as separate channels or “bands”. This is call “out-of-band signaling”. You can’t trick the phone system by generating tones. When your iPhone makes sounds when you dial, it’s entirely for you benefit and has nothing to do with how it signals the cell tower to make a call.

Early hackers, like the founders of Apple, are famous for having started their careers making such “boxes” for tricking the phone system. The problem was obvious back in the day, which is why as the phone system moves from analog to digital, the problem was fixed.

More: Wikipedia on blue box, Wikipedia article on Steve Wozniak.

Thumb drives in parking lots [*]

A simple trick is to put a virus on a USB flash drive, and drop it in a parking lot. Somebody is bound to notice it, stick it in their computer, and open the file.

This can be extended with tricks. For example, you can put a file labeled “third-quarter-salaries.xlsx” on the drive that required macros to be run in order to open. It’s irresistible to other employees who want to know what their peers are being paid, so they’ll bypass any warning prompts in order to see the data.

Another example is to go online and get custom USB sticks made printed with the logo of the target company, making them seem more trustworthy.

We also did a trick of taking an Adobe Flash game “Punch the Monkey” and replaced the monkey with a logo of a competitor of our target. They now only played the game (infecting themselves with our virus), but gave to others inside the company to play, infecting others, including the CEO.

Thumb drives like this have been used in many incidents, such as Russians hacking military headquarters in Afghanistan. It’s really hard to defend against.

More: “Computer Virus Hits U.S. Military Base in Afghanistan” — USNews (2008), “The Return of the Worm That Ate The Pentagon” — Wired (2011), DoD Bans Flash Drives — Stripes (2008)

Googling [*]

Search engines like Google will index your website — your entire website. Frequently companies put things on their website without much protection because they are nearly impossible for users to find. But Google finds them, then indexes them, causing them to pop up with innocent searches.
There are books written on “Google hacking” explaining what search terms to look for, like “not for public release”, in order to find such documents.

More: Wikipedia entry on Google Hacking, “Google Hacking” book.

URL editing [*]

At the top of every browser is what’s called the “URL”. You can change it. Thus, if you see a URL that looks like this:

http://www.example.com/documents?id=138493

Then you can edit it to see the next document on the server:

http://www.example.com/documents?id=138494

The owner of the website may think they are secure, because nothing points to this document, so the Google search won’t find it. But that doesn’t stop a user from manually editing the URL.
An example of this is a big Fortune 500 company that posts the quarterly results to the website an hour before the official announcement. Simply editing the URL from previous financial announcements allows hackers to find the document, then buy/sell the stock as appropriate in order to make a lot of money.
Another example is the classic case of Andrew “Weev” Auernheimer who did this trick in order to download the account email addresses of early owners of the iPad, including movie stars and members of the Obama administration. It’s an interesting legal case because on one hand, techies consider this so obvious as to not be “hacking”. On the other hand, non-techies, especially judges and prosecutors, believe this to be obviously “hacking”.

DDoS, spoofing, and amplification [*]

For decades now, online gamers have figured out an easy way to win: just flood the opponent with Internet traffic, slowing their network connection. This is called a DoS, which stands for “Denial of Service”. DoSing game competitors is often a teenager’s first foray into hacking.
A variant of this is when you hack a bunch of other machines on the Internet, then command them to flood your target. (The hacked machines are often called a “botnet”, a network of robot computers). This is called DDoS, or “Distributed DoS”. At this point, it gets quite serious, as instead of competitive gamers hackers can take down entire businesses. Extortion scams, DDoSing websites then demanding payment to stop, is a common way hackers earn money.
Another form of DDoS is “amplification”. Sometimes when you send a packet to a machine on the Internet it’ll respond with a much larger response, either a very large packet or many packets. The hacker can then send a packet to many of these sites, “spoofing” or forging the IP address of the victim. This causes all those sites to then flood the victim with traffic. Thus, with a small amount of outbound traffic, the hacker can flood the inbound traffic of the victim.
This is one of those things that has worked for 20 years, because it’s so obvious teenagers can do it, yet there is no obvious solution. President Trump’s executive order of cyberspace specifically demanded that his government come up with a report on how to address this, but it’s unlikely that they’ll come up with any useful strategy.

More: Wikipedia on DDoS, Wikipedia on Spoofing

Conclusion

Tweet me (@ErrataRob) your obvious hacks, so I can add them to the list.

Top 10 Most Pirated Movies of The Week on BitTorrent – 07/31/17

Post Syndicated from Ernesto original https://torrentfreak.com/top-10-pirated-movies-week-bittorrent-073117/

This week we have two newcomers in our chart.

Spider-Man: Homecoming is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This week’s most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (5) Spider-Man: Homecoming (HDTS) 8.0 / trailer
2 (1) The Mummy 2017 (Subbed HDRip) 5.8 / trailer
3 (…) King Arthur: Legend of the Sword 7.2 / trailer
4 (3) Going In Style 6.8 / trailer
5 (2) Ghost In the Shell 6.8 / trailer
6 (4) The Boss Baby 6.5 / trailer
7 (9) S.W.A.T.: Under Siege ?.? / trailer
8 (7) Wonder Woman (Subbed HDrip) 8.2 / trailer
9 (…) Shot Caller 7.5 / trailer
10 (9) Alien Covenant (Subbed HDrip) 6.7 / trailer

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

IoT Sleepbuddy, the robotic babysitter

Post Syndicated from Janina Ander original https://www.raspberrypi.org/blog/sleepbuddy-robotic-babysitter/

You’re watching the new episode of Game of Thrones, and suddenly you hear your children, up and about after their bedtime! Now you’ll probably miss a crucial moment of the show because you have to put them to bed again. Or you’re out to dinner with friends and longing for the sight of your sleeping small humans. What do you do? Text the babysitter to check on them? Well, luckily for you these issues could soon be things of the past, thanks to Bert Vuylsteke and his Pi-powered Sleepbuddy. This IoT-controlled social robot could fulfil all your remote babysitting needs!

IoT Sleepbuddy – babyphone – Design concept

This is the actual concept of my robot and in what context it can be used.

A social robot?

A social robot fulfils a role normally played by a person, and interacts with humans via human language, gestures, and facial expressions. This is what Bert says about the role of the Sleepbuddy:

[For children, it] is a friend or safeguard from nightmares, but it is so much more for the babysitters or parents. The babysitters or parents connect their smartphone/tablet/PC to the Sleepbuddy. This will give them access to control all his emotions, gestures, microphone, speaker and camera. In the eye is a hidden camera to see the kids sleeping. The speaker and microphone allow communication with the kids through WiFi.

The roots of the Sleepbuddy

As a student at Ghent University, Bert had to build a social robot using OPSORO, the university’s open-source robotics platform. The developers of this platform create social robots for research purposes. They are also making all software, as well as hardware design plans, available on GitHub. In addition, you will soon be able to purchase their robot kits via a Kickstarter. OPSORO robots are designed around the Raspberry Pi, and controlled via a web interface. The interface allows you to customise your robot’s behaviour, using visual or text-based programming languages.

Sleepbuddy Bert Vuylsteke components

The Sleepbuddy’s components

Building the Sleepbuddy

Bert has provided a detailed Instructable describing the process of putting the Sleepbuddy together, complete with video walk-throughs. However, the making techniques he has used include thermoforming, laser cutting, and 3D printing. If you want to recreate this build, you may need to contact your local makerspace to find out whether they have the necessary equipment.

Sleepbuddy Bert Vuylsteke assembly

Assembling the Sleepbuddy

Finally, Bert added an especially cute touch to this project by covering the Sleepbuddy in blackboard paint. Therefore, kids can draw on the robot to really make it their own!

So many robots!

At Pi Towers we are partial to all kinds of robots, be they ones that test medical devices, play chess or Connect 4, or fight other robots. If they twerk, or are cute, tiny, or shoddy, we maybe even like them a tiny bit more.

Do you share our love of robots? Would you like to make your own? Then check out our resource for building a simple robot buggy. Maybe it will kick-start your career as the general of a robot army. A robot army that does good, of course! Let us know your benevolent robot overlord plans in the comments.

The post IoT Sleepbuddy, the robotic babysitter appeared first on Raspberry Pi.

Top 10 Most Pirated Movies of The Week on BitTorrent – 07/24/17

Post Syndicated from Ernesto original https://torrentfreak.com/top-10-pirated-movies-week-bittorrent-072417/

This week we have two newcomers in our chart.

The Mummy is the most downloaded movie for the second week in a row.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This week’s most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (1) The Mummy 2017 (Subbed HDRip) 5.8 / trailer
2 (2) Ghost In the Shell 6.8 / trailer
3 (…) Going In Style 6.8 / trailer
4 (3) The Boss Baby 6.5 / trailer
5 (…) Spider-Man: Homecoming (HDTS) 8.0 / trailer
6 (5) Despicable Me 3 (HDTS) 6.7 / trailer
7 (6) Wonder Woman (Subbed HDrip) 8.2 / trailer
8 (…) S.W.A.T.: Under Siege ?.? / trailer
9 (4) Alien Covenant (Subbed HDrip) 6.7 / trailer
10 (7) Kong: Skull Island 6.9 / trailer

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Top 10 Most Pirated Movies of The Week on BitTorrent – 07/17/17

Post Syndicated from Ernesto original https://torrentfreak.com/top-10-pirated-movies-week-bittorrent-071717/

This week we have two newcomers in our chart.

The Mummy, which came out as a subbed HDRip last week, is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This week’s most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (9) The Mummy 2017 (Subbed HDRip) 5.8 / trailer
2 (2) Ghost In the Shell 6.8 / trailer
3 (10) The Boss Baby 6.5 / trailer
4 (1) Alien Covenant (Subbed HDrip) 6.7 / trailer
5 (4) Despicable Me 3 (HDTS) 6.7 / trailer
6 (5) Wonder Woman (Subbed HDrip) 8.2 / trailer
7 (3) Kong: Skull Island 6.9 / trailer
8 (7) The Fate of the Furious 6.7 / trailer
9 (…) Going in Style 7.2 / trailer
10 (6) King Arthur: Legend of the Sword 7.2 / trailer

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Проверка на твърдения: КНСБ, милион емигрирали и минималната заплата

Post Syndicated from Боян Юруков original https://yurukov.net/blog/2017/factchecking-knsb/

КНСБ се активизираха пак в медиите и изсипаха доста твърдения, които е добре да се разгледат. Тук ще се концентрирам върху едно засягащо любимата ми тема – демографията. Имат обаче доста любопитни. Пример е искането им за семейно подпомагане само при „отговорно родителство“, каквото и да значи това. Подкрепят го с твърдение, че в „Холандия“ слагали камери пред домовете на социално слабите, а „Дания, Холандия и Финландия“ изисквали брак за надбавки и социални помощи. Всичко това ми се струва повече от абсурдно, особено познавайки отношението на тези страни към личната неприкосновеност и съжителството. Нямам обаче време да проверявам всичко. Не се съмнявам също, че икономистите вече беснеят над изказванията как прогнозираният растеж ще доведе до вдигане на заплатите в някои сектори със 100 лева месечно.

Твърдението, което ми хвана окото, е че близо милион българи са емигрирали за последните 17 години. Това отразиха редица медии вчера, а някои дори излязаха с такова заглавие. Ако се зачетем по-внимателно, онова, което Димитров всъщност казва е, че 906 хиляди българи с трудоспособна възраст са трайно напуснали страната. „Положението става катастрофално“ продължава шефът на КНСБ.

Няма да споря, че положението с работоспособното население в България, както и в практически целия развит свят, е доста проблемно. Както обясних в последната си статия, именно данните, перспективите и разбирането им ще покажат дали нещо може да се определи като катастрофално, катастрофирало вече или просто проблемно.

Данните на НСИ

За работоспособно население се смятат всички между 15 и 65 годишна възраст. Ако се чудите защо КНСБ говори за последните 17 години, а не за 10 или 20, то е защото са гледали буквално данните на НСИ – системата им позволява бързи справки точно за този период. Може да се заровите в годишниците в електронната им библиотека, както съм правил многократно тук, но това е далеч по-трудно за произвеждането на проста сензационна новина.

Разбира се, може да погледнете данните за външната миграция. Там има разбивка по възрастови групи и градове/села. Пренебрегвайки нарочно входящата миграция (не е въобще малко, но нали все пак търсим сензация), ще получим около 160 хиляди емигрирали за последните 10 години и не повече от 200 хиляди за последните 17. Това не е толкова интересно, а и доста хора се съмняват в моделите на НСИ и това, че не отчитат много „скрити“ емигрирали. Затова продължаваме търсенето.

Сметката на КНСБ излиза, ако гледаме цялото работоспособно население през 2000 и 2016-та. Те са съответно 5551767 и 4628724. Разликата за 17 години така е 926 хиляди. Ако са гледали междинни данни и закръгляли по месец на раждане, излиза наистина около 906 хиляди. До тук изглежда вярно – с толкова е намаляло българите между 15 и 65 години от 2000-та година до сега. Това обаче далеч не означава, че толкова са емигрирали.

Всъщност, най-големият принос към това намаление е намалената раждаемост през 80-те и 90-те. Децата, които са били на 15-19 години през 2000 г. са били родени в началото на 80-те. Между 2000 и 2009-та в работоспособна възраст започват да влизат все по-малко и по-малко деца, най-вече защото много по-малко са раждани между 1981 и 1990-та. Отделно от групата на работоспособните излизат хора родени през 30-те и 40-те – период с изключително голяма раждаемост и дори по-важно – повишено оцеляване на децата. Така само с раждаемостта се обяснява почти цялото намаление. Тук използвам данните от статията ми за историческата раждаемост в България.

Нека разгледаме българите в страната от едната възрастова група – 15 до 19 годишните. Те са тези, които тепърва ще започват работа. КНСБ са прави, че през 2016-та са 244329 по-малко, отколкото през 2000 г. Това, което пропускат обаче е, че ражданията между 1997 и 2001 (днешните 15-19 годишни) са с 268961 по-малко, отколкото родените между 1981 и 1985 (15-19 годишни през 2000 г). Отгоре на това добавяме смъртността, която макар и все по-намаляваща в България, все пак е отговорна за „изчезването“ на още няколко хиляди.

Ако се чудите защо разликата е раждаемостта е по-голяма от разликата в сегашното население с цели 24 хиляди, обяснението е, че в абсолютен брой емигриралите сред сегашните 20-годишни са много по-малко от емигриралите сред 20-годишните преди 17 години. Това далеч не е успокоение, защото и общият им брой намалява. Както видяхме обаче, причината е почти изцяло в намалената раждаемост десетилетия по-рано.

Теглейки чертата

Като съберем аналогичните разлики в намалената раждаемост и смъртност на всички възрастови групи се получава почти цялата сума съобщена от Димитров в медиите като „емигрирали“. Реалният брой „липсващи“ в тези сметки всъщност съвпада с оценката на НСИ – 150 до 200 хиляди. Това далеч не е малко, но явно е недостатъчно за медийна сензация. Особено на фона на хиперболата на шефа на ДАБЧ за 9 млн. българи в чужбина, която също оборих.

Какво означава всичко това? Българите в трудоспособна възраст определено намаляват. Съотношението между работещи/пенсионирани несъмнено ще пада все повече. Емиграцията е огромен проблем и то не само за броя работещи, но и за жените в детеродна възраст и раждаемостта. В същото време обаче не е вярно, че близо милион българи между 15 и 65 г. са емигрирали за този период. Всъщност, приблизително толкова са всички емигрирали от всички възрастови групи за последните 30 години.

На база данните от раждаемостта и емиграцията от последните 60 години може да очакваме, че броят влизащи в работоспособна възраст ще се стабилизира на сегашните нива. В същото време, повече хора ще излизат от нея, просто защото преди 60 години е имало т.н. baby boom – голяма раждаемост, много оцелели бебета последвано от силно намаление. Това ще продължи в следващите 30-тина години, когато броят на пенсионерите ще започне рязко да намалява и именно от сегашната раждаемост ще зависи колко ще са българите в работоспособна възраст.

Фалшиви новини за политически цели

КНСБ както винаги искат повишаване на пенсиите и минималната заплата. Твърдят, че така ще се запазят повече хора в страната, което е абсурдно. Както показах вече, когато българин емигрира в Германия, има доста по-голяма вероятност да не може да свързва двата края, отколкото останалите в България. Причината 250 хиляди да изберат този път често не са парите, а липсата на доверие в системите – съдебна, здравна, образователна, местна власт. Понякога това недоверие не се базира на факти, а на внушения и фалшиви новини като обсъжданото тук. Друг път личният опит е повече от красноречив. Независимо от причините обаче недоверието е най-големият двигател на емиграцията и не може да се реши с повече фалшиви послания.

Такива са изказванията им за минималната заплата. Тя не може да повиши доходите. Някои от целите ѝ са да спре спекулацията на отделни работодатели и да намали крайната бедност. Средната работна заплата не може да се вдигне с мерки на кабинета и определено не с което и да е предложенията на КНСБ. В същото време идеята за отделна МРЗ за висшисти е нищо повече от евтин популизъм. Да учиш „нещо висше“ без особени знания и опит е по-скоро правило, отколкото изключение. За купуването на дипломи да не започвам. Исканията им са разхвърлени и странни.

Тук идва разковничето защо КНСБ ще цитира грешна статистика за емиграцията. Ако разгледаме изказванията на определени политици от коалиционните партньори на ГЕРБ, ще видим припокриване на аргументите и грешките в тях с тези на профсъюзите. Наскоро темата за емиграцията беше подета и от Валери Симеонов и шефа на ДАБЧ от патрЕотите. Те също правят аналогични заявки за вдигане на МРЗ и настояват да се спират надбавки и социални плащания на база също толкова грешни внушения.

Надуването на данните за емиграцията им позволява да отклоняват общественото внимание от бездействието им по други проблеми пречещи на раждаемостта – лошото сексуално образование и семейно планиране; непропорционално високата цена на всякакви бебешки стоки; практическата липса на защита на работното място на жените, когато решат да имат деца. Особено последното е точно в ресора на КНСБ. Понякога наглед прости неща като разбитите улици оказват негативно влияние. Дори когато говорят за емиграцията, внушават, че с повишаване на минималните доходи ще успят да върнат хора. Истината е, че мнозинството от хората напускат заради липсата на сигурност и доверие.

Гледайте съда и корупцията, не пиратките около пенсии и минимални заплати

Нито патрЕотите, нито КНСБ говорят за истинска съдебна реформа, за борба с корупцията. Вместо това с ГЕРБ вървят точно в обратната посока – намаляване на прозрачността и запушване на устата на критикуващите. Казвал съм многократно, че единственият начин да се спре емиграцията и дори да се върнат някои от заминалите, е да се направи България добрия избор, а не просто патриотичния такъв. Това няма да стане с въртене на „Облаче ле бяло“ и политици в народни носии, а когато все по-малко българи в страната виждат терминал 2 като единствен изход за проблемите си. Когато не се притесняваш, че ще ти откраднат бизнеса с чадър от прокурор; че работодателят ще ти да спре заплати, защото не го е страх от съда; че като някой гамен пребие или изнасили на улицата, няма да го срещнеш след ден, защото са го пуснали от „липса на доказателства“ или „процедурни грешки“. Навсякъде по света има такива гамени, работодатели и некоректни бизнес партньори. Разликата е доверието, че в крайна сметка ще законът ще бъде наложен.

В България това доверие деградира все повече въпреки подобрението в редица области и повишеното качество на живот. Затова се опитват с фалшиви числа да подкрепят мерки, които уж ще оправят нещо отклонявайки погледа ни от зеещи проблеми другаде или лобистки поправки, които тихомълком внасят. От медийните послания личи, че вече има политическа сделка и твърдения като това, което оборих тук, имат за цел само да ни го „продадат“. Тепърва ще видим какво са измислили и какво се опитват да скрият.

Pirate Bay Founder Wants to Save Lives With His New App

Post Syndicated from Andy original https://torrentfreak.com/pirate-bay-founder-wants-to-save-lives-with-his-new-app-170714/

Of all the early founders of The Pirate Bay, it is Peter Sunde who has remained most obviously in the public eye. Now distanced from the site, Sunde has styled himself as a public speaker and entrepreneur.

Earlier this year the Swede (who is of both Norwegian and Finnish ancestry) sold his second most famous project Flattr to the parent company of Adblock Plus. Now, however, he has another digital baby to nurture, and this one is quite interesting.

Like many countries, Sweden operates a public early warning system. Popularly known as ‘Hesa Fredrik’, it consists of extremely loud outdoor sirens accompanied by radio and television messages.

The sirens can be activated in specific areas of the country wherever the problems exist. Fire, floods, gas leaks, threats to the water system, terrorist attacks or even war could trigger the alarm.

Just recently the ‘Hesa Fredrik’ alarm was sounded in Sweden, yet there was no planned test and no emergency. The public didn’t know that though and as people struggled to find information, authority websites crashed under the strain. The earliest news report indicating that it was a false alarm appeared behind a news site’s paywall. The national police site published no information.

The false alarm

Although Sunde heard the sirens, it was an earlier incident that motivated him to find a better solution. Speaking with Swedish site Breakit, Sunde says he got the idea during the Västmanland wildfire, which burned for six weeks straight in 2014 and became the largest fire in Sweden for 40 years.

“I got the idea during Västmanland fire. It took several days before text messages were sent to everyone in the area but by then it was already out of control. I thought that was so very bad when it is so easy to build something better,” Sunde said.

Sunde’s solution is the Hesa Fredrika app, which is currently under development by himself and several former members of the Flattr team.

“The goal is for everyone to download the app and then forget about it,” Sunde says.

When one thinks about the problem Sunde is trying to solve (i.e. the lack of decent and timely information in a crisis) today’s mobile phones provide the perfect solution. Not only do most people have one (or are near someone who does), they provide the perfect platform to deliver immediately deliver emergency services advice to people in a precise location.

“It is not enough for a small text to appear in the corner of the screen. I want to build something that makes the phone vibrate and sound so that you notice it properly,” Sunde told Breakit.

But while such an app could genuinely save lives in the event of a frankly rare event, Sunde has bigger ideas for the software that could extend its usefulness significantly.

Users will also be invited to add information about themselves, such as their doctor’s name or if they are a blood donor. The app user could then be messaged if there was an urgent need for a particular match. But while the app will be rolled out soon, it won’t be rushed.

“Since it is extremely important to the quality of the messages, we want as many partnerships as possible before we launch something,” Sunde says, adding that in true Pirate Bay style, it will be completely free for everyone.

“So it will remain forever,” he says. “My philosophy is such that I do not want people to pay for things that can save their lives.”

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Top 10 Most Pirated Movies of The Week on BitTorrent – 07/10/17

Post Syndicated from Ernesto original https://torrentfreak.com/top-10-pirated-movies-week-bittorrent-071017/

This week we have three newcomers in our chart.

Alien Covenant is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This week’s most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (7) Alien Covenant (Subbed HDrip) 6.7 / trailer
2 (…) Ghost In a Shell 6.8 / trailer
3 (1) Kong: Skull Island 6.9 / trailer
4 (…) Despicable Me 3 (HDTS) 6.7 / trailer
5 (2) Wonder Woman (Subbed HDrip) 8.2 / trailer
6 (3) King Arthur: Legend of the Sword 7.2 / trailer
7 (4) The Fate of the Furious 6.7 / trailer
8 (…) Transformers: The Last Knight (TC/HDTS) 5.3 / trailer
9 (5) The Mummy 2017 (HDTS) 5.8 / trailer
10 (6) The Boss Baby 6.5 / trailer

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Top 10 Most Pirated Movies of The Week on BitTorrent – 07/03/17

Post Syndicated from Ernesto original https://torrentfreak.com/top-10-pirated-movies-week-bittorrent-070317/

This week we have two newcomers in our chart.

Kong: Skull Island is the most downloaded movie for the second week in a row.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This week’s most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (1) Kong: Skull Island 6.9 / trailer
2 (3) Wonder Woman (Subbed HDrip) 8.2 / trailer
3 (2) King Arthur: Legend of the Sword 7.2 / trailer
4 (4) The Fate of the Furious 6.7 / trailer
5 (5) The Mummy 2017 (HDTS) 5.8 / trailer
6 (7) The Boss Baby 6.5 / trailer
7 (…) Alien Covenant (Subbed HDrip) 6.8 / trailer
8 (10) Logan 8.6 / trailer
9 (9) John Wick: Chapter 2 8.0 / trailer
10 (…) The Lost City of Z 6.9 / trailer

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

The Terrible Horrors of ‘Kodi Boxes’ Shock The UK

Post Syndicated from Andy original https://torrentfreak.com/the-terrible-horrors-of-kodi-boxes-shock-the-uk-170702/

In the beginning, we were told that Kodi Boxes are probably going to destroy Hollywood, not to mention companies like Sky and The Premier League. But who cares about the big people in suits drinking champagne from gold swimming pools?

No, what the unwashed masses need to hear are stories that make us realize that these little plastic wonder boxes are going to ruin our miserable lives. Luckily, they’ve been appearing thick and fast this past couple of weeks.

It turns out that Kodi Boxes are not only likely to burn your house down, but they’re also part of a master plan to pick away at the delicate threads holding family life together.

Forget about the piracy, that doesn’t matter. The powers that be need you to understand that Kodi Boxes are Trojan horses of misery that people are willingly bringing in to their own homes. Can you believe people are being so stupid?

According to an article in this week’s The Mirror, for example, kids’ movies spewed out by these evil devices are now being interrupted by adverts for alcohol. Well, it makes a change from seeing Phil Mitchell smashed out of his mind at 8pm on BBC1, doesn’t it?

At the same time, Kodi Boxes are straining relationships between father and son, not to mention subjecting unsuspecting parents to malware threats. They include scams purporting to be from the ‘FBI’ which demand money for using Popcorn Time inside Kodi. The world truly has gone mad.

Of course, if only one person sees this nonsense it’s too much, and The Mirror piece is quite rightly filled with quotes from real people who gave up piracy as a result of their bad experiences. It also has plenty of useful advice from the UK’s leading anti-piracy outfit, as you’d expect.

Intrigued, we decided to carry out our own research among a handful of the millions of maniacs who are still prepared to plug one of these death devices into their UK mains supply. And we were shocked – not by a dodgy power adaptor from China – but by the huge numbers of other problems these Kodi Boxes can foist upon the honest working man.

A user called Neil told us that he’d bought a Kodi Box off eBay after hearing all the hype in the media. His plan was to watch Premier League football without paying a penny. However, instead of scooping up that forbidden 3pm kick-off excitement, all it did was ruin his enjoyment of the beautiful game.

“I’d been out drinking all day with the lads. I was proper, proper smashed. I got home and shoved the thing into the nearest telly to watch Liverpool versus Manchester United and although I felt really sick, couldn’t focus on the screen, and soon fell unconscious, I think the picture wasn’t too bad,” he said.

“I don’t think I saw that wheel thing spinning in the middle of the screen and everything stopping either, which is a big plus for me on a free box. And to top it all, Liverpool beat United 2:1, which was a real bonus.

“However, when discussing the game the next day with my dad who watched the game on Sky with a proper subscription, I was horrified to learn that Manchester United actually won the game 3:0 – against Arsenal! It just goes to show, you get what you pay for. My box is now where it should have been all along – in the bin.”

A man called Rich told us that he’d also heard good things about Kodi Boxes but was really upset after being completely misled by the person who sold him one.

“I used to be a subscriber to Sky’s top package, including those fifty channels nobody watches but they force you to have. I also forked out for all their boxing PPVs that come on at stupid o’clock in the morning, and bought several blu-ray discs each time I got paid. All in all I must’ve spent £140 a month.

“So, when a bloke down the pub who I’ve never met before told me that I could legally get the same stuff for free using a Kodi Box, I immediately believed him. I mean, what reasonable bloke wouldn’t? He had just one left as well, how lucky was that?”

But it didn’t take long for Rich’s enthusiasm to wane. The thought of owning a potential incendiary device filled with content provided by a Russian crime syndicate and funded by Columbian drug barons was too much.

“I watched a couple of films on it without my house burning down, but then I started reading horror stories in the paper about these boxes shoving drinks adverts in our kids’ faces,” he told us.

“Enough was enough. After being lied to by the seller the thought of my kids demanding toys and beer for Christmas was just too much, it just wasn’t worth the risk. So I went straight back to giving Sky over a grand a year and life’s never been better.”

Kodi Box user Peter told us that he could really relate to warnings published in the papers this week that set-top box users had been hit with popups demanding their bank details.

“I was hoping to watch the big fight last weekend but it only came on for a few minutes and then suddenly went off,” he explained. “Then a notice appeared telling me to ring a number with my credit card details. Well, I’d heard about these ransomware attacks and I wasn’t going to fall for that old trick.

“However, imagine my surprise when I realized that I’d accidentally put on my official satellite box instead of Kodi, and the message was actually from my pay-per-view provider. Just goes to show, everybody wants your money these days, and these crooks can rope you in for years, and make it really hard to cancel.”

Another chap called James told us that he never considered getting a Kodi Box until he saw an article in a UK tabloid explaining how Kodi Boxes pose a risk for families with children.

“The article quoted some anti-piracy company. They said that parents don’t realize that Kodi Boxes allow easy access to hardcore pornography. And it’s true, I had no idea,” James said.

“But I live alone, so I wasted no time buying one off eBay. I’m watching it in the shed with a fire extinguisher in the other hand, just to be safe.”

But while James clearly has his hands full, our last user is much less satisfied.

Sue told us that she was assured her Kodi box was a miracle device with endless uses. However, after its addons recently stopped working she decided to test the claim by sliding the failing unit under the leg of a wobbly table. It soon became clear the hardware had been massively oversold.

“They say these boxes can do anything but mine clearly wasn’t fit for purpose. It was way too thick so when I put it under the leg, the table sat at a really steep angle. If anything, it was more unstable than it was before.

“I dread to think what could’ve happened if I’d put a pot of boiling oil on it next to the baby. No wonder health and safety are up in arms.”

Tune in next week when we reveal how Kodi Boxes can cause unsightly hair growth and unwanted pregnancies.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Top 10 Most Pirated Movies of The Week on BitTorrent – 06/26/17

Post Syndicated from Ernesto original https://torrentfreak.com/top-10-pirated-movies-week-bittorrent-062617/

This week we have two newcomers in our chart.

Kong: Skull Island is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This week’s most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (…) Kong: Skull Island 6.9 / trailer
2 (…) King Arthur: Legend of the Sword 7.2 / trailer
3 (1) Wonder Woman (TC) 8.2 / trailer
4 (3) The Fate of the Furious 6.7 / trailer
5 (8) The Mummy 2017 (HDTS) 5.8 / trailer
6 (2) Power Rangers 6.5 / trailer
7 (5) The Boss Baby 6.5 / trailer
8 (4) Chips 5.8 / trailer
9 (6) John Wick: Chapter 2 8.0 / trailer
10 (9) Logan 8.6 / trailer

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Top 10 Most Pirated Movies of The Week on BitTorrent – 06/19/17

Post Syndicated from Ernesto original https://torrentfreak.com/top-10-pirated-movies-week-bittorrent-061917/

This week we have three newcomers in our chart.

Wonder Woman is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This week’s most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (2) Wonder Woman (TC) 8.2 / trailer
2 (…) Power Rangers 6.5 / trailer
3 (1) The Fate of the Furious 6.7 / trailer
4 (…) Chips 5.8 / trailer
5 (5) The Boss Baby 6.5 / trailer
6 (4) John Wick: Chapter 2 8.0 / trailer
7 (3) Life 6.8 / trailer
8 (…) The Mummy 2017 (HDTS) 5.8 / trailer
9 (7) Logan 8.6 / trailer
10 (6) Pirates of the Caribbean: Dead Men Tell No Tales (TS) 7.1 / trailer

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Top 10 Most Pirated Movies of The Week on BitTorrent – 06/12/17

Post Syndicated from Ernesto original https://torrentfreak.com/top-10-pirated-movies-week-bittorrent-061217/

This week we have two newcomers in our chart.

The Fate of the Furious, which came out as Web-DL this week, is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This week’s most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (5) The Fate of the Furious 6.7 / trailer
2 (…) Wonder Woman (TC) 8.2 / trailer
3 (7) Life 6.8 / trailer
4 (1) John Wick: Chapter 2 8.0 / trailer
5 (2) The Boss Baby 6.5 / trailer
6 (3) Pirates of the Caribbean: Dead Men Tell No Tales (TS) 7.1 / trailer
7 (4) Logan 8.6 / trailer
8 (…) The Belko Experiment 6.2 / trailer
9 (8) Ghost in The Shell (Subbed HDRip) 6.9 / trailer
10 (9) Kong: Skull Island (Subbed HDRip) 7.0 / trailer

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Top 10 Most Pirated Movies of The Week on BitTorrent – 06/05/17

Post Syndicated from Ernesto original https://torrentfreak.com/top-10-pirated-movies-week-bittorrent-060517/

This week we have two newcomers in our chart.

John Wick: Chapter 2 is the most downloaded movie for the second week in a row.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This week’s most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (1) John Wick: Chapter 2 8.0 / trailer
2 (3) The Boss Baby 6.5 / trailer
3 (…) Pirates of the Caribbean: Dead Men Tell No Tales (TS) 7.1 / trailer
4 (2) Logan 8.6 / trailer
5 (4) The Fate of the Furious (subbed HDRip) 6.7 / trailer
6 (5) A Cure For Wellness 6.5 / trailer
7 (…) Life 6.8 / trailer
8 (7) Ghost in The Shell (Subbed HDRip) 6.9 / trailer
9 (8) Kong: Skull Island (Subbed HDRip) 7.0 / trailer
10 (6) T2 Trainspotting 7.7 / trailer

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Torrents Help Researchers Worldwide to Study Babies’ Brains

Post Syndicated from Ernesto original https://torrentfreak.com/torrents-help-researchers-worldwide-to-study-babies-brains-170603/

One of the core pillars of academic research is sharing.

By letting other researchers know what you do, ideas are criticized, improved upon and extended. In today’s digital age, sharing is easier than ever before, especially with help from torrents.

One of the leading scientific projects that has adopted BitTorrent is the developing Human Connectome Project, or dHCP for short. The goal of the project is to map the brain wiring of developing babies in the wombs of their mothers.

To do so, a consortium of researchers with expertise ranging from computer science, to MRI physics and clinical medicine, has teamed up across three British institutions: Imperial College London, King’s College London and the University of Oxford.

The collected data is extremely valuable for the neuroscience community and the project has received mainstream press coverage and financial backing from the European Union Research Council. Not only to build the dataset, but also to share it with researchers around the globe. This is where BitTorrent comes in.

Sharing more than 150 GB of data with researchers all over the world can be quite a challenge. Regular HTTP downloads are not really up to the task, and many other transfer options have a high failure rate.

Baby brain scan (Credit: Developing Human Connectome Project)

This is why Jonathan Passerat-Palmbach, Research Associate Department of Computing Imperial College London, came up with the idea to embrace BitTorrent instead.

“For me, it was a no-brainer from day one that we couldn’t rely on plain old HTTP to make this dataset available. Our first pilot release is 150GB, and I expect the next ones to reach a couple of TB. Torrents seemed like the de facto solution to share this data with the world’s scientific community.” Passerat-Palmbach says.

The researchers opted to go for the Academic Torrents tracker, which specializes in sharing research data. A torrent with the first batch of images was made available there a few weeks ago.

“This initial release contains 3,629 files accounting for 167.20GB of data. While this figure might not appear extremely large at the moment, it will significantly grow as the project aims to make the data of 1,000 subjects available by the time it has completed.”

Torrent of the first dataset

The download numbers are nowhere in the region of an average Hollywood blockbuster, of course. Thus far the tracker has registered just 28 downloads. That said, as a superior and open file-transfer protocol, BitTorrent does aid in critical research that helps researchers to discover more about the development of conditions such as ADHD and autism.

Interestingly, the biggest challenges of implementing the torrent solution were not of a technical nature. Most time and effort went into assuring other team members that this was the right solution.

“I had to push for more than a year for the adoption of torrents within the consortium. While my colleagues could understand the potential of the approach and its technical inputs, they remained skeptical as to the feasibility to implement such a solution within an academic context and its reception by the world community.

“However, when the first dataset was put together, amounting to 150GB, it became obvious all the HTTP and FTP fallback plans would not fit our needs,” Passerat-Palmbach adds.

Baby brain scans (Credit: Developing Human Connectome Project)

When the consortium finally agreed that BitTorrent was an acceptable way to share the data, local IT staff at the university had to give their seal of approval. Imperial College London doesn’t allow torrent traffic to flow freely across the network, so an exception had to be made.

“Torrents are blocked across the wireless and VPN networks at Imperial. Getting an explicit firewall exception created for our seeding machine was not a walk in the park. It was the first time they were faced with such a situation and we were clearly told that it was not to become the rule.”

Then, finally, the data could be shared around the world.

While BitTorrent is probably the most efficient way to share large files, there were other proprietary solutions that could do the same. However, Passerat-Palmbach preferred not to force other researchers to install “proprietary black boxes” on their machines.

Torrents are free and open, which is more in line with the Open Access approach more academics take today.

Looking back, it certainly wasn’t a walk in the park to share the data via BitTorrent. Passerat-Palmbach was frequently confronted with the piracy stigma torrents have amoung many of his peers, even among younger generations.

“Considering how hard it was to convince my colleagues within the project to actually share this dataset using torrents (‘isn’t it illegal?’ and other kinds of misconceptions…), I think there’s still a lot of work to do to demystify the use of torrents with the public.

“I was even surprised to see that these misconceptions spread out not only to more senior scientists but also to junior researchers who I was expecting to be more tech-aware,” Passerat-Palmbach adds.

That said, the hard work is done now and in the months and years ahead the neuroscience community will have access to Petabytes of important data, with help from BitTorrent. That is definitely worth the effort.

Finally, we thought it was fitting to end with Passerat-Palmbach’s “pledge to seed,” which he shared with his peers. Keep on sharing!


On the importance of seeding

Dear fellow scientist,

Thank for you very much for the interest you are showing in the dHCP dataset!

Once you start downloading the dataset, you’ll notice that your torrent client mentions a sharing / seeding ratio. It means that as soon as you start downloading the dataset, you become part of our community of sharers and contribute to making the dataset available to other researchers all around the world!

There’s no reason to be scared! It’s perfectly legal as long as you’re allowed to have a copy of the dataset (that’s the bit you need to forward to your lab’s IT staff if they’re blocking your ports).

You’re actually providing a tremendous contribution to dHCP by spreading the data, so thank you again for that!

With your help, we can make sure this data remains available and can be downloaded relatively fast in the future. Over time, the dataset will grow and your contribution will be more and more important so that each and everyone of you can still obtain the data in the smoothest possible way.

We cannot do it without you. By seeding, you’re actually saying “cheers!” to your peers whom you downloaded your data from. So leave your client open and stay tuned!

All this is made possible thanks to the amazing folks at academictorrents and their infrastructure, so kudos academictorrents!

You can learn more about their project here and get some help to get started with torrent downloading here.

Jonathan Passerat-Palmbach

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Top 10 Most Pirated Movies of The Week on BitTorrent – 05/29/17

Post Syndicated from Ernesto original https://torrentfreak.com/top-10-pirated-movies-week-bittorrent-052917/

This week we have two newcomers in our chart.

John Wick: Chapter 2 is the most downloaded movie for the second week in a row.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This week’s most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (…) John Wick: Chapter 2 8.0 / trailer
2 (1) Logan 8.6 / trailer
3 (3) The Boss Baby 6.5 / trailer
4 (2) The Fate of the Furious (subbed HDRip) 6.7 / trailer
5 (…) A Cure For Wellness 6.5 / trailer
6 (7) T2 Trainspotting 7.7 / trailer
7 (4) Ghost in The Shell (Subbed HDRip) 6.9 / trailer
8 (6) Kong: Skull Island (Subbed HDRip) 7.0 / trailer
9 (5) First Fight 5.7 / trailer
10 (8) Beauty and the Beast 7.6 / trailer

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.