Tag Archives: Search

За религиозността на няколко хиляди в социалките и защо повечето такива изследвания са счупени

Post Syndicated from Боян Юруков original https://yurukov.net/blog/2017/religia-i-schupeni-anketi/

Постоянно сме облъчвани от анкети и социологически проучвания. Особено когато става дума за избори, политика и мнения по актуални за деня въпроси. През май излезе едно такова изследване на Pew Research засягащо отношението на религията в източна Европа. То, както и няколко често споделяни мемета в социалните мрежи, ме накараха да направя свой експеримент преди месец. Пуснах анкета за „религиозността на българите“.

Преди да задълбая в резултатите, има няколко важни детайла, които трябва да обсъдим. Първият е, че анкетата ми в никакъв случай не претендира за представителност. Не съм започвал анкетата с тази идея и нямам илюзии, че може да е. Причините за това е важно да се разберат, ако искаме да разпознаваме лошата „статистика“ и ще ги обсъдя подробно по-долу.

Въпреки това, интересно и до голяма степен неочаквано е, че беше попълнена от 3120 души, 2400 от които в първите 24 часа. Това само по себе си показва, че темата за религията занимава много хора от всички страни на дебата и определено е нещо, за което трябва да говорим повече. В този смисъл, самата дискусия и активност около анкетата може да е дори по-показателна от самите данни.

Също така, някои обърнаха внимание на някои странни въпроси като този за църковния данък. Целта му, както и подборът на отговорите на повечето въпроси, беше да илюстрирам същността на критиката ми към изследването на Pew Research. Тезата ми не е, че умишлено са подправили данните, а че липсата на разбиране за културните различния ги обезсмисля.

Не на последно място, дори взимайки предвид всички условности, резултатите от тези няколко хиляди отговора си остават интересни и с доста уговорки може да ни покажат позициите и самоопределянето ако не на друго, то поне на балона от познати и техни приятели, които има около мен в социалките.

Самоопределяне, политика и изучаване на религия

След като отметнахме всичко това, мисля да започна отзад напред. Не заради друго, а просто защото отговорите са интересни.

В следващите няколко графики съм обединил всички самоопределящи се към някоя религия в една група и всички, които не се самоопределят – в друга. Знам, че това ще раздразни някои, но за по-кратко ще ги наричам „религиозни“ и „нерелигиозни“. Разпределението впрочем е съответно 51.4% „религиозни“ срещу 44.7% с още 3.9% отговорили „друго“. Разбивка на отговорите им ще видите вдясно, а вляво е средното за всички анкетирани. Скрил съм колебаещите се. В червено са отворите „вярно“, а в лилаво – „невярно“.

При първия въпрос няма изненади – 91% от „нерелигиозните“ са отговорили, че религията не е важна за тях. Интересно е, че 20% от „религиозните“ са отговорили по същия начин. Значително повече хора и от двете групи отговарят обаче, че религията е (предимно) важна част от българската идентичност – 71% и 26%. 50% от всички отговорили са дали този отговор срещу 30% отговорили с „не“. Това съвпада с изводите на Pew.

Разминаване идва обаче при следващите въпроси. Едва 17% от отговорилите са казали, че религията влияе на религиозните им убеждения, а 19% – че трябва да играе роля в политическия живот. Дори сред отговорилите, че религията е определено важна за тях, едва половината казват, че тя им влияе политически. В България някак този въпрос е естествен – „вържи попа … да ти е мирно селото“, както се казваше в приказката. В доста държави обаче не е така и щатите определено са сред тях. В анализите на Pew се опитват да направят връзка между религиозността на източна Европа и мнението за Русия. Внушават също, че увеличаване на религиозността би имала някакъв осезаем ефект във външнополитическите ни взаимоотношенията с тях. Макар за отделни маргинални групи това да е вярно, то определено не е сериозен фактор в политиката ни, най-малкото заради мястото на официалната църква.

Следващият въпрос също не изненадва – почти половината от самоопределящите се с някоя религия смятат, че религиозният канон трябва да се изучава в училище, докато 90% от „нерелигиозните“ не са съгласни. Интересно е обаче единодушието по последния въпрос – да се изучава историята на всички религии в час. Над 60% от анкетираните отговарят така и само 24% са против.

Религиозни, религиозни, колкото да сме религиозни

Така, нека да обясня. Чест проблем при съставянето на анкетите е приемането, че всички ще възприемат концепциите по един и същ начин. Мона Чалаби от The Guardian дава един интересен пример с нашумяло изследване за мнението на мюсюлманите във Великобритания за джихада. Мнозинството са отговорили, че го подкрепят и точно тези няколко думи обикалят световните медии. Не става ясно обаче, че повечето анкетирани също отговарят, че възприемат дефиницията за „джихад“ като „мирна вътрешна борба за лично израстване“.

Аналогично, въпросът за самоопределянето с дадена религия може да има доста различен смисъл. Именно на база това направихме разбивка на данните до сега. В следващите въпроси се вижда, че дори „религиозните“ се възпротивяват срещу въвеждането на църковен данък. Едва 15% от „религиозните“ смятат, че трябва да се въведе, а 20% биха го плащали, ако се наложи. 74% от „религиозните“, които смятат, че трябва да се въведе, биха се регистрирали и плащали.

Изборът на точно тази сума не е случайна. Взимам за пример Германия, където такъв църковен данък има отдавна и е процент от заплатата. Този процент варира, но съпоставен със средните доходи там, би се равнявал на около 25 лв. месечно у нас. В Германия този данък се плаща единствено, ако се регистрираш като принадлежащ към някоя от църквите. Доста емигрирали българи правят грешката да се пишат просто „християни“ и още с първата си заплата осъзнават, че вече спонсорират деноминацията на църквата, към която конкретният данъчен служител принадлежи. Лесно е да се отрегистрираш и немалко немци го правят като станат на 18 години. Тогава обаче нямат право на църковна сватба, кръщене или погребение с поп. Общо взето или си в клуба и плащаш, или не си. Затова много немци плащат църковен данък и годишно той генерира около 17 млрд. евро разпределени най-вече между католическата и евангелистката църква.

Този принцип е толкова залегнал в разбирането им за религиозност, че ако зададеш въпрос на немец дали е религиозен, почти сигурно е да отговори с „не“, ако не плаща данъка. Онези, които плащат данъци пък са особено религиозни. Всъщност Германия въпреки либералния си облик е доста религиозна държава. Едва наскоро научих, че в петъка преди Великден всички клубове са затворени и партита забранени. Стига се до викане на полиция и глоби. Това идва изцяло от християнския канон. Все още общините са разделени по линиите католици/евангелисти и гледат да се придържат към общностите си. За празничните паради да не обяснявам. Не мислете и че думата „християн-“ в името на партията на Меркел е просто така – религията има сериозна роля в политиките и кампаниите им.

В същото време, поне съдейки по тези данни, ако в България бъде въведен такъв данък, 4/5 от идентифициращите се с някоя религия и 2/3 от отговорилите, че религията е важна за тях ще „окапят“. Причината да посочвам това, че различни мемета в мрежата показват колко по-религиозни сме от тях. Едно такова нарежда Германия сред атеистичните държави, които са и мирни и прави връзка между тези неща. Някои посочват като източник изследвания като това на Галъп, където наистина се твърди, че Германия има драстично повече атеисти. Ако и в България се налага да плащаш колкото месечна винетка за отговора „религиозен“, съвсем лесно ще ги задминем в атеизма.

В графиката горе ще забележите и че с 50% повече „нерелигиозни“ смятат, че трябва да се въведе данъка, в сравнение с „религиозните“. Причината може би е, че държавата отдели 4.5 млн. лв от бюджета за 2016-та за субсидии на вероизповеданията. През годините има тенденция на увеличаване и повечето пари отиват за ремонти. Няколко стотин хиляди са за подпомагане на български църкви зад граница. Ако се въведе данък и наистина онези 7.7% отговорили с твърдо „да“ се регистрират, то субсидията ще набъбне на поне 60 млн. Това би разтоварило останалите данъкоплатци с поне няколко милиона, с което си обяснявам отговорите на „нерелигиозните“. Разбира се, всичко това е условно, защото анкетата далеч не е представителна за всички работещи.

Социо-стъкмистика

Въпросът за представителността на анкетата беше засегнат още от самото ѝ пускане. Навсякъде коментирах, че целта въобще не е представителност и че нямам намерение да правя обобщения за „религиозността на нацията“. Изводите, които описах до тук, идват с много условности и уговорки. Похвално е, че толкова много хора ги забелязаха от рано и това ми дава надежда, че все пак критичното мислене не е залязло толкова, колкото си мислим.

Най-очевиднияt проблем с анкетата ми е, че се провежда в мрежата. Това само по себе си силно ограничава качеството, защото не покрива представителна извадка от населението. Отделно, анкетата беше разпространяване в социалките от човек на човек, което още повече предполага затвореност на кръга на хора, които я попълват. Най-ясно изразеният белег за това се вижда в активността и групирането на отговарящите през времето. Тази графика показва точно това – в синьо са попълнилите на час, а в червено – дялът самоопределящи се с някоя религия. Вижда се ясно, че в 9 до 11 сутринта е имало много попълващи „нерелигиозни“, докато тенденцията се обръща около 14 часа и вечерта. Това съвпада като време със споделянията на групи на тема атеизъм и религия.

Представителността е най-ключовото понятие, за което трябва да внимаваме. Белезите за „счупена“ представителност са много – анкети в интернет, само пред стационарен телефон или друго ограничено средство за комуникация, концентриране само върху градовете или дори центъра им и прочие. Най-ясен пример за такива дефекти се виждат в социологическите проучвания около изборите. Почти без изключение те са безсмислени като данни, но за сметка на това имат огромно влияние върху общественото мнение. Няма по-известен пример от провала на прогнозите за изборите през 2016-та в щатите. Сайтът FiveThirtyEight има доста добро обяснение защо се случи това. Сред основните причини е именно пропускането на цели демографски групи в допитванията.

Друг фактор в мащабът. Тук всъщност той говори в моя полза, тъй като дори големите социологически агенции боравят с няколко хиляди анкетирани. Ако се вгледате в доклада на Pew Research, техните изводи за България се основават на само 1619 души. Разбира се, броят няма значение, когато в извадката няма представителност. Те твърдят, че са използвали методи осигуряващи такава. Това обаче трябва да се докаже. Обикновено сред въпросите се поставя такъв, резултатите от които може да се сравнят с обективна статистика. Например – възрастовото разпределение на населението, броят женени или брой деца в домакинството. Ако средните стойности по възрастови групи или местоживеене не отговарят на средното за страната, то извадката не е представителна. Именно такъв сериозен дефект илюстрирах с едно друго нашумяло изследване разглеждащо отлагането на деца и брака сред младите в България. Pew още не са публикували данните си, за да сравним. 1600 души обаче не са много. Вчера Инфограф предупреди, че привидното повишаване на дяла бедни българи може да се дължи на увеличената извадка в анкетата на НСИ – от 7300 на 8600 домакинства. Това може да е индикация, че старата извадка е била твърде малка или недостатъчно представителна. Разликата между анкетираните от НСИ и Pew e 4.5 пъти.

Дефект на всяка една подобна анкета е, че разчита на субективни фактори. В повечето случаи, като етническото и религиозното самоопределяне, това е неизбежно. Ако не сме внимателни обаче, това може да доведе до сериозни проблеми. Чалаби посочва, че онази анкета за мюсюлманите и джихада също е била през интернет и отговорилите са били доста малко предвид голямото мюсюлманско население на Великобритания. По-важното обаче е, че е нямало абсолютно никакъв начин да се потвърди, че някой не е попълвал анкетата без да е мюсюлманин просто така – за да изкриви резултата. Това съвсем не е за пренебрегване предвид медийният отзвук, който такива „изследвания“ привличат. Бихте се учудили колко от сензационните новини, които четем, всъщност се осланят именно на изследвания като цитираното от Чалаби и това, което аз направих. Разликата е, че там не говорят за условностите, а дори сериозни медии скачат на бомбастични изводи без да направят критична проверка.

Не по-малко важни са и предложените отговори. Вече обсъдихме как въпросите може да се разбират различно в различните държави и култури. Изборът на отговори също може да изкриви значително резултата. Нарочно добавих отговор „други религии“ и „други“ при въпроса за самоопределянето. Идеята какво е религия доста се разминава между хората. Аз, например се самоопределям като православен християнин, но в никакъв случай не бих се самоопределил с БПЦ. Също така вярванията ми са много по-близки до агностиците, отколкото до религиозните. Това разминаване между възприятие за религия, традиции, празници и спиритуалност трудно се вписва в която и да е от кутийките, които сам дадох като отговори. Съвсем естествено липсата на „атеист“ и различни степени от спектъра на вярващите раздразни някои хора. Отново обаче повтарям – целта ми не беше да изследвам религиозността, което е невъзможно предвид вложените дефекти описани тук. Основната ми цел е да илюстрирам тези дефекти.

Другите въпроси

В анкетата имаше още няколко точки, които добавих просто, защото бяха интересни и присъстваха в оригиналното изследване на Pew. Малко над 22% от отговорилите и около 41% от религиозните казват, че ходят поне веднъж месечно в храм. 57% от всички или посещават църкви, джамии и синагоги като туристи, или не ходят въобще. Интересно е, че едва 25% посещаващите храм всяка седмица, казват, че са съгласни с въвеждането на църковен данък. Ако се въведе, по-малко от половината от тях (45%) казват, че биха го плащали. Струва ми се, че това показва друг интересен аспект на връзката между религиозност и църква поне сред балона ни от познати в мрежата.

В следващите отговори се забелязва относително единодушие. Разделени сме дали възрастните са повече или по-малко религиозни от соца насам. За религиозността на младите има известно разминаване между двата лагера, но мнозинството не смята, че се е увеличила. Това се разминава и с резултатите на Pew. Над 60% от всички групи смятат, че религията има място само в семейни традиции и празници. Това пък потвърждава голямото мнозинство отговорили, че религията няма място в политиката. Все пак, също толкова смятат, че политиците се опитват и навярно успяват да я използват в кампаниите си.

Тук виждате разбивката по възрасти. Не се различава драстично от разпределението на населението на страната, но това не го прави приложимо към населението. Също така, 75% от попълнилите живеят в град на 100 хиляди души, а 10% са в чужбина. Това говори повече за социалния ми балон, отколкото за религиозността на българите като цяло.

Тук съм показал религиозността по възрасти. Вижда се ясна пропорционална корелация между възрастта и самоопределянието с някоя религия. Отрязал съм графиката на 50 години, защото попълнилите посочили над тази възраст са по 10-20, което не позволява да се правят изводи.

Всъщност, именно затова не направих сравнение на отговорите по възрастови групи. Тъй като анкетата е проведена в интернет, се вижда ясно практическата липса на отговорили над 65 години. Така не мога да сравнявам „млади“ и „стари“. Това не означава, че доста „изследвания“ го правят – взима се извадка от 1000 души, 10 от тях са в пенсионна възраст и на тяхна база се съди за всички 1.4 млн. българи в тази група.

Данни и препратки

Статиите на Pew Research заедно с въпросниците и целият доклад за религията в източна Европа ще намерите на страницата им. Данните от моята анкета ще може да свалите като Excel файл. Може да го използвате както намерите за добре, но ще се радвам, ако сложите обратна връзка.

Други подобни анализи са разяснението ми за смъртността и как не разбираме тази метрика, раждаемостта и как е пълно с фалшиви новини, броя на работещите българи в чужбина и как тази статистика е просто измислена и не на последно място – защо не разбираме данните за бедността.

AWS Marketplace Update – SaaS Contracts in Action

Post Syndicated from Jeff Barr original https://aws.amazon.com/blogs/aws/aws-marketplace-update-saas-contracts-in-action/

AWS Marketplace lets AWS customers find and use products and services offered by members of the AWS Partner Network (APN). Some marketplace offerings are billed on an hourly basis, many with a cost-saving annual option designed to line up with the procurement cycles of our enterprise customers. Other offerings are available in SaaS (Software as a Service) form and are billed based on consumption units specified by the seller. The SaaS model (described in New – SaaS subscriptions on AWS Marketplace) give sellers the flexibility to bill for actual usage: number of active hosts, number of requests, GB of log files processed, and so forth.

Recently we extended the SaaS model with the addition of SaaS contracts, which my colleague Brad Lyman introduced in his post, Announcing SaaS Contracts, a Feature to Simplify SaaS Procurement on AWS Marketplace. The contracts give our customers the opportunity save money by setting up monthly subscriptions that can be expanded to cover a one, two, or three year contract term, with automatic, configurable renewals. Sellers can provide services that require up-front payment or that offer discounts in exchange for a usage commitment.

Since Brad has already covered the seller side of this powerful and flexible new model, I would like to show you what it is like to purchase a SaaS contract. Let’s say that I want to use Splunk Cloud. I simply search for it as usual:

I click on Splunk Cloud and see that it is available in SaaS Contract form:

I can also see and review the pricing options, noting that pricing varies by location, index volume, and subscription duration:

I click on Continue. Since I do not have a contract with Splunk for this software, I’ll be redirected to the vendor’s site to create one as part of the process. I choose my location, index volume, and contract duration, and opt for automatic renewal, and then click on Create Contract:

This sets up my subscription, and I need only set up my account with Splunk:

I click on Set Up Your Account and I am ready to move forward by setting up my custom URL on the Splunk site:

This feature is available now and you can start using it today.

Jeff;

 

BPI Breaks Record After Sending 310 Million Google Takedowns

Post Syndicated from Andy original https://torrentfreak.com/bpi-breaks-record-after-sending-310-million-google-takedowns-170619/

A little over a year ago during March 2016, music industry group BPI reached an important milestone. After years of sending takedown notices to Google, the group burst through the 200 million URL barrier.

The fact that it took BPI several years to reach its 200 million milestone made the surpassing of the quarter billion milestone a few months later even more remarkable. In October 2016, the group sent its 250 millionth takedown to Google, a figure that nearly doubled when accounting for notices sent to Microsoft’s Bing.

But despite the volumes, the battle hadn’t been won, let alone the war. The BPI’s takedown machine continued to run at a remarkable rate, churning out millions more notices per week.

As a result, yet another new milestone was reached this month when the BPI smashed through the 300 million URL barrier. Then, days later, a further 10 million were added, with the latter couple of million added during the time it took to put this piece together.

BPI takedown notices, as reported by Google

While demanding that Google places greater emphasis on its de-ranking of ‘pirate’ sites, the BPI has called again and again for a “notice and stay down” regime, to ensure that content taken down by the search engine doesn’t simply reappear under a new URL. It’s a position BPI maintains today.

“The battle would be a whole lot easier if intermediaries played fair,” a BPI spokesperson informs TF.

“They need to take more proactive responsibility to reduce infringing content that appears on their platform, and, where we expressly notify infringing content to them, to ensure that they do not only take it down, but also keep it down.”

The long-standing suggestion is that the volume of takedown notices sent would reduce if a “take down, stay down” regime was implemented. The BPI says it’s difficult to present a precise figure but infringing content has a tendency to reappear, both in search engines and on hosting sites.

“Google rejects repeat notices for the same URL. But illegal content reappears as it is re-indexed by Google. As to the sites that actually host the content, the vast majority of notices sent to them could be avoided if they implemented take-down & stay-down,” BPI says.

The fact that the BPI has added 60 million more takedowns since the quarter billion milestone a few months ago is quite remarkable, particularly since there appears to be little slowdown from month to month. However, the numbers have grown so huge that 310 billion now feels a lot like 250 million, with just a few added on top for good measure.

That an extra 60 million takedowns can almost be dismissed as a handful is an indication of just how massive the issue is online. While pirates always welcome an abundance of links to juicy content, it’s no surprise that groups like the BPI are seeking more comprehensive and sustainable solutions.

Previously, it was hoped that the Digital Economy Bill would provide some relief, hopefully via government intervention and the imposition of a search engine Code of Practice. In the event, however, all pressure on search engines was removed from the legislation after a separate voluntary agreement was reached.

All parties agreed that the voluntary code should come into effect two weeks ago on June 1 so it seems likely that some effects should be noticeable in the near future. But the BPI says it’s still early days and there’s more work to be done.

“BPI has been working productively with search engines since the voluntary code was agreed to understand how search engines approach the problem, but also what changes can and have been made and how results can be improved,” the group explains.

“The first stage is to benchmark where we are and to assess the impact of the changes search engines have made so far. This will hopefully be completed soon, then we will have better information of the current picture and from that we hope to work together to continue to improve search for rights owners and consumers.”

With more takedown notices in the pipeline not yet publicly reported by Google, the BPI informs TF that it has now notified the search giant of 315 million links to illegal content.

“That’s an astonishing number. More than 1 in 10 of the entire world’s notices to Google come from BPI. This year alone, one in every three notices sent to Google from BPI is for independent record label repertoire,” BPI concludes.

While it’s clear that groups like BPI have developed systems to cope with the huge numbers of takedown notices required in today’s environment, it’s clear that few rightsholders are happy with the status quo. With that in mind, the fight will continue, until search engines are forced into compromise. Considering the implications, that could only appear on a very distant horizon.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Disney Asks Google to Remove Its Own (Invisible) Takedown Notices

Post Syndicated from Ernesto original https://torrentfreak.com/disney-asks-google-to-remove-its-own-invisible-takedown-notices-170618/

Pretty much every major copyright holder regularly reports infringing links to Google, hoping to decrease the visibility of pirated files.

Over the past several years, the search engine has had to remove more than two billion links and most of these requests have been neatly archived in the Lumen database.

Walt Disney Company is no stranger to these takedown efforts. The company has sent over 20 million takedown requests to the search engine, covering a wide variety of content. All of these notices are listed in Google’s transparency report, and copies are available at Lumen.

While this is nothing new, we recently noticed that Disney doesn’t stop at reporting direct links to traditional “pirate” sites. In fact, they recently targeted one of their own takedown notices in the Lumen database, which was sent on behalf of its daughter company Lucasfilm.

In the notice below, the media giant wants Google to remove a links to a copy of its own takedown notice, claiming that it infringes the copyright of the blockbuster “Star Wars: The Force Awakens.”

Disney vs. Disney?

This is not the first time that a company has engaged in this type of meta-censorship, it appears.

However, it’s all the more relevant this week after a German court decided that Google can be ordered to stop linking to its own takedown notices. While that suggests that Disney was right to ask for its own link to be removed, the reality is a bit more complex.

When it was still known as ChillingEffects, the Lumen Database instructed Google not to index any takedown notices. And indeed, searching for copies of takedown notices yields no result. This means that Disney asked Google to remove a search result that doesn’t exist.

Perhaps things are different in a galaxy far, far away, but Disney’s takedown notice is not only self-censorship but also entirely pointless.

Disney might be better off focusing on content that Google has actually indexed, instead of going after imaginary threats. Or put in the words of Gold Five: “Stay on Target,” Disney..

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

snitch – Information Gathering Tool Via Dorks

Post Syndicated from Darknet original http://feedproxy.google.com/~r/darknethackers/~3/i9qgH9CxYJ0/

Snitch is an information gathering tool which automates the process for a specified domain. Using built-in dork categories, this tool helps gather specified information domains which can be found using web search engines. It can be quite useful in early phases of penetration tests (commonly called the Information Gathering phase). snitch can…

Read the full post at darknet.org.uk

NSA Links WannaCry to North Korea

Post Syndicated from Bruce Schneier original https://www.schneier.com/blog/archives/2017/06/nsa_links_wanna.html

There’s evidence:

Though the assessment is not conclusive, the preponderance of the evidence points to Pyongyang. It includes the range of computer Internet protocol addresses in China historically used by the RGB, and the assessment is consistent with intelligence gathered recently by other Western spy agencies. It states that the hackers behind WannaCry are also called “the Lazarus Group,” a name used by private-sector researchers.

One of the agencies reported that a prototype of WannaCry ransomware was found this spring in a non-Western bank. That data point was a “building block” for the North Korea assessment, the individual said.

Honestly, I don’t know what to think. I am skeptical, but I am willing to be convinced. (Here’s the grugq, also trying to figure it out.) What I would like to see is the NSA evidence in more detail than they’re probably comfortable releasing.

More commentary. Slashdot thread.

Visualize and Monitor Amazon EC2 Events with Amazon CloudWatch Events and Amazon Kinesis Firehose

Post Syndicated from Karan Desai original https://aws.amazon.com/blogs/big-data/visualize-and-monitor-amazon-ec2-events-with-amazon-cloudwatch-events-and-amazon-kinesis-firehose/

Monitoring your AWS environment is important for security, performance, and cost control purposes. For example, by monitoring and analyzing API calls made to your Amazon EC2 instances, you can trace security incidents and gain insights into administrative behaviors and access patterns. The kinds of events you might monitor include console logins, Amazon EBS snapshot creation/deletion/modification, VPC creation/deletion/modification, and instance reboots, etc.

In this post, I show you how to build a near real-time API monitoring solution for EC2 events using Amazon CloudWatch Events and Amazon Kinesis Firehose. Please be sure to have Amazon CloudTrail enabled in your account.

  • CloudWatch Events offers a near real-time stream of system events that describe changes in AWS resources. CloudWatch Events now supports Kinesis Firehose as a target.
  • Kinesis Firehose is a fully managed service for continuously capturing, transforming, and delivering data in minutes to storage and analytics destinations such as Amazon S3, Amazon Kinesis Analytics, Amazon Redshift, and Amazon Elasticsearch Service.

Walkthrough

For this walkthrough, you create a CloudWatch event rule that matches specific EC2 events such as:

  • Starting, stopping, and terminating an instance
  • Creating and deleting VPC route tables
  • Creating and deleting a security group
  • Creating, deleting, and modifying instance volumes and snapshots

Your CloudWatch event target is a Kinesis Firehose delivery stream that delivers this data to an Elasticsearch cluster, where you set up Kibana for visualization. Using this solution, you can easily load and visualize EC2 events in minutes without setting up complicated data pipelines.

Set up the Elasticsearch cluster

Create the Amazon ES domain in the Amazon ES console, or by using the create-elasticsearch-domain command in the AWS CLI.

This example uses the following configuration:

  • Domain Name: esLogSearch
  • Elasticsearch Version: 1
  • Instance Count: 2
  • Instance type:elasticsearch
  • Enable dedicated master: true
  • Enable zone awareness: true
  • Restrict Amazon ES to an IP-based access policy

Other settings are left as the defaults.

Create a Kinesis Firehose delivery stream

In the Kinesis Firehose console, create a new delivery stream with Amazon ES as the destination. For detailed steps, see Create a Kinesis Firehose Delivery Stream to Amazon Elasticsearch Service.

Set up CloudWatch Events

Create a rule, and configure the event source and target. You can choose to configure multiple event sources with several AWS resources, along with options to specify specific or multiple event types.

In the CloudWatch console, choose Events.

For Service Name, choose EC2.

In Event Pattern Preview, choose Edit and copy the pattern below. For this walkthrough, I selected events that are specific to the EC2 API, but you can modify it to include events for any of your AWS resources.

 

{
	"source": [
		"aws.ec2"
	],
	"detail-type": [
		"AWS API Call via CloudTrail"
	],
	"detail": {
		"eventSource": [
			"ec2.amazonaws.com"
		],
		"eventName": [
			"RunInstances",
			"StopInstances",
			"StartInstances",
			"CreateFlowLogs",
			"CreateImage",
			"CreateNatGateway",
			"CreateVpc",
			"DeleteKeyPair",
			"DeleteNatGateway",
			"DeleteRoute",
			"DeleteRouteTable",
"CreateSnapshot",
"DeleteSnapshot",
			"DeleteVpc",
			"DeleteVpcEndpoints",
			"DeleteSecurityGroup",
			"ModifyVolume",
			"ModifyVpcEndpoint",
			"TerminateInstances"
		]
	}
}

The following screenshot shows what your event looks like in the console.

Next, choose Add target and select the delivery stream that you just created.

Set up Kibana on the Elasticsearch cluster

Amazon ES provides a default installation of Kibana with every Amazon ES domain. You can find the Kibana endpoint on your domain dashboard in the Amazon ES console. You can restrict Amazon ES access to an IP-based access policy.

In the Kibana console, for Index name or pattern, type log. This is the name of the Elasticsearch index.

For Time-field name, choose @time.

To view the events, choose Discover.

The following chart demonstrates the API operations and the number of times that they have been triggered in the past 12 hours.

Summary

In this post, you created a continuous, near real-time solution to monitor various EC2 events such as starting and shutting down instances, creating VPCs, etc. Likewise, you can build a continuous monitoring solution for all the API operations that are relevant to your daily AWS operations and resources.

With Kinesis Firehose as a new target for CloudWatch Events, you can retrieve, transform, and load system events to the storage and analytics destination of your choice in minutes, without setting up complicated data pipelines.

If you have any questions or suggestions, please comment below.


Additional Reading

Learn how to build a serverless architecture to analyze Amazon CloudFront access logs using AWS Lambda, Amazon Athena, and Amazon Kinesis Analytics

 

 

 

Ryabitsev:Travel (Linux) laptop setup

Post Syndicated from jake original https://lwn.net/Articles/725596/rss

On his blog, Linux Foundation Director of IT Infrastructure Security Konstantin Ryabitsev has some advice for laptop security when traveling overseas. Some attendees of LinuxCon China in Beijing June 19-20 have asked for his thoughts, so he put together the post, which is good advice, if perhaps overly paranoid for some, no matter what country you might be visiting. “China is not signatory to the “Personal Use Exemption” when it comes to encrypted devices, so bringing a laptop with encrypted hard drive with you is not technically legal. If the border officer does not like you for some reason and has grounds to suspect you are not being truthful about your stated reasons for entering China, you may be asked to decrypt your devices for a search. Failure to do so may result in unpleasantness, and you may be detained or fined merely on the grounds of having an encrypted device when entering the country. (As opposed to, for example, entering a country that is signatory to the personal use exemption, where just having an encrypted device is not grounds for any action. That said, it is never in your interest to make the border officer not like you for some reason. Until you are admitted to the country as a legal alien, the Geneva Convention and the Universal Declaration of Human Rights are pretty much the only legal frameworks protecting you as a person against foreign government action.)

It is important to point out that you are extremely unlikely to be penalized for bringing in an encrypted laptop with you to China, as any kind of widespread zealous application of such practice would quickly shut down any business travel to China — and this is definitely not in the government’s interest.”

Court Orders Google to Remove Links to Takedown Notice

Post Syndicated from Ernesto original https://torrentfreak.com/court-orders-google-to-remove-links-to-takedown-notice-170616/

On an average day Google processes more than three million takedown notices from copyright holders, and that’s for its search engine alone.

Thanks to Google’s transparency report, the public is able to see where these notices come from and what content they’re targeting. In addition, Google partners with Lumen to post copies of most notices online.

Founded by Harvard’s Berkman Center, Lumen is one of the few tools that helps to keep copyright holders accountable, while offering an invaluable database for researchers and the public in general.

However, not everyone is pleased with the service. Many copyright holders find it unfair that Google still indirectly links to the infringing URLs, because the search results point people to the takedown notice on Lumen, where these are listed in public.

Google linking to a standard DMCA notice

In Germany, a similar complaint was at the center of a lawsuit. A local company found that when people entered its name into the search engine combined with the term ‘suspected fraud’ (Betrugsverdacht), several search results would appear suggesting that the two were linked.

Since making false claims against companies is not allowed in Germany, the company wanted the results removed. The court agreed with this assessment and ordered Google to take action, which it did. However, after removing the results, Google added a mention at the bottom of the results pointing users to the takedown request on Lumen.

“As a reaction to a legal request that was sent to Google, we have removed one search result. You can find further information at LumenDatabase.org,” Google noted, with a link.

The company wasn’t happy with this and wanted Google to remove this mention, since it indirectly linked to the offensive URLs. After a lower court first sided with Google, the Higher Regional Court of Munich has now ordered (pdf) the search engine to remove the link to the Lumen notice.

Mirko Brüß, a lawyer and expert on German copyright law, wrote a detailed overview of the case in question on IPKAT explaining the court’s reasoning.

“By presenting its users an explanation about the deleted search result, combined with a hyperlink to the Lumen website where the deleted search result could be clicked, Google (still) enabled users to find and read the infringing statements, even after being ordered by a court to discontinue doing so,” he notes.

“The court found that it made no difference whether one or two clicks are needed to get to the result,” Brüß adds.

Lumen

While the order only refers to the link at the bottom of the search results, it may also apply to the transparency report itself, Brüß informs TorrentFreak.

It will be interesting to see if copyright holders will use similar means to ensure that Google stops linking to copies of their takedown notices. That would seriously obstruct Google’s well-intentioned transparency efforts, but thus far this hasn’t happened.

Finally, it is worth noting that Google doesn’t index the takedown notices from Lumen itself. Links to takedown notices are only added to search results where content has been removed, either by court order or following a DMCA request.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Fake News As A Service (FNaaS?) – $400k To Rig An Election

Post Syndicated from Darknet original http://feedproxy.google.com/~r/darknethackers/~3/UqEqmi9y3oY/

This is pretty interesting, the prices for Fake News as a Service have come out after some research by Trend Micro, imagine that you can create a fake celebrity with 300,000 followers for only $2,600. Now we all know this Fake News thing has been going on for a while, and of course, if it’s […]

The post Fake News As A Service (FNaaS?)…

Read the full post at darknet.org.uk

UK Police Claim Success in Keeping Gambling Ads off Pirate Sites

Post Syndicated from Andy original https://torrentfreak.com/uk-police-claim-success-in-keeping-gambling-ads-off-pirate-sites-170614/

Over the past several years, there has been a major effort by entertainment industry groups to cut off revenue streams to ‘pirate’ sites. The theory is that if sites cannot generate funds, their operators will eventually lose interest.

Since advertising is a key money earner for any website, significant resources have been expended trying to keep ads off sites that directly or indirectly profit from infringement. It’s been a multi-pronged affair, with agencies being encouraged to do the right thing and brands warned that their ads appearing on pirate sites does nothing for their image.

One sector that has trailed behind most is the gambling industry. Up until fairly recently, ads for some of the UK’s largest bookmakers have been a regular feature on many large pirate sites, either embedded in pages or more often than not, appearing via popup or pop-under spreads. Now, however, a significant change is being reported.

According to the City of London Police’s Intellectual Property Crime Unit (PIPCU), over the past 12 months there has been an 87% drop in adverts for licensed gambling operators being displayed on infringing websites.

The research was carried out by whiteBULLET, a brand safety and advertising solutions company which helps advertisers to assess whether placing an advert on a particular URL will cause it to appear on a pirate site.

PIPCU says that licensed gambling operators have an obligation to “keep crime out of gambling” due to their commitments under the Gambling Act 2005. However, the Gambling Commission, the UK’s gambling regulatory body, has recently been taking additional steps to tackle the problem.

In September 2015, the Commission consulted on amendments (pdf) to licensing conditions that would compel licensees to ensure that advertisements “placed by themselves and others” do not appear on websites providing unauthorized access to copyrighted content.

After the consultation was published in May 2016 (pdf), all respondents agreed in principle that gambling operators should not advertise on pirate sites. A month later, the Commission said it would ban the placement of gambling ads on such platforms.

When the new rules came into play last October, 40 gambling companies (including Bet365, Coral and Sky Bet, who had previously been called out for displaying ads on pirate sites) were making use of PIPCU’s ‘Infringing Website List‘, a database of sites that police claim are actively involved in piracy.

Speaking yesterday, acting Detective Superintendent Peter Ratcliffe, Head of the Police Intellectual Property Crime Unit (PIPCU), welcomed the ensuing reduction in ad placement on ‘pirate’ domains.

“The success of a strong relationship built between PIPCU and The Gambling Commission can be seen by these figures. This is a fantastic example of a joint working initiative between police and an industry regulator,” Ratcliffe said.

“We commend the 40 gambling companies who are already using the Infringing Website List and encourage others to sign up. We will continue to encourage all UK advertisers to become a member of the Infringing Website List to ensure they’re not inadvertently funding criminal websites.”

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Introducing the Self-Service Business Associate Addendum

Post Syndicated from Chad Woolf original https://aws.amazon.com/blogs/security/introducing-the-self-service-business-associate-addendum/

HIPAA logo

Today, we made available a new feature in AWS Artifact (our auditing and compliance portal) that enables you to review, accept, and track the status of your Business Associate Addendum (BAA). With this new feature, you can accept the terms of a BAA online, and instantly designate an AWS account as a “HIPAA Account” for use with protected health information (PHI) under the U.S. Health Insurance Portability and Accountability Act (HIPAA). In addition, you can sign in to AWS Artifact to confirm that your account is designated as a HIPAA Account, and review the terms of the BAA for that account. If you are no longer using a designated HIPAA Account in connection with PHI, you can remove that designation using the AWS Artifact interface.

Today’s release addresses two key customer needs in particular: (1) the need to enter into a BAA quickly, and (2) the need to easily track and control whether an AWS account is designated as a HIPAA Account under a BAA.

The BAA is the first specialized industry agreement that AWS is making available online. We chose to launch with the BAA as a commitment to AWS customer organizations who are reinventing the way healthcare is researched and delivered with the cloud. Many AWS customers have great stories to tell as we work together to use technology to advance the healthcare industry.

If you already have a BAA with AWS, or if you are considering designing or migrating a new solution that will create, receive, maintain, or transmit PHI on AWS, you can use AWS Artifact to manage your HIPAA Accounts today. As with all AWS Artifact features, there are no additional fees for using AWS Artifact to review, accept, and manage BAAs online.

– Chad

Security Flaws in 4G VoLTE

Post Syndicated from Bruce Schneier original https://www.schneier.com/blog/archives/2017/06/security_flaws_1.html

Research paper: “Subscribers remote geolocation and tracking using 4G VoLTE enabled Android phone,” by Patrick Ventuzelo, Olivier Le Moal, and Thomas Coudray.

Abstract: VoLTE (Voice over LTE) is a technology implemented by many operators over the world. Unlike previous 2G/3G technologies, VoLTE offers the possibility to use the end-to-end IP networks to handle voice communications. This technology uses VoIP (Voice over IP) standards over IMS (IP Multimedia Subsystem) networks. In this paper, we will first introduce the basics of VoLTE technology. We will then demonstrate how to use an Android phone to communicate with VoLTE networks and what normal VoLTE communications look like. Finally, we will describe different issues and implementations’ problems. We will present vulnerabilities, both passive and active, and attacks that can be done using VoLTE Android smartphones to attack subscribers and operators’ infrastructures. Some of these vulnerabilities are new and not previously disclosed: they may allow an attacker to silently retrieve private pieces of information on targeted subscribers, such as their geolocation.

News article. Slashdot thread.

Healthcare Industry Cybersecurity Report

Post Syndicated from Bruce Schneier original https://www.schneier.com/blog/archives/2017/06/healthcare_indu.html

New US government report: “Report on Improving Cybersecurity in the Health Care Industry.” It’s pretty scathing, but nothing in it will surprise regular readers of this blog.

It’s worth reading the executive summary, and then skimming the recommendations. Recommendations are in six areas.

The Task Force identified six high-level imperatives by which to organize its recommendations and action items. The imperatives are:

  1. Define and streamline leadership, governance, and expectations for health care industry cybersecurity.
  2. Increase the security and resilience of medical devices and health IT.

  3. Develop the health care workforce capacity necessary to prioritize and ensure cybersecurity awareness and technical capabilities.

  4. Increase health care industry readiness through improved cybersecurity awareness and education.

  5. Identify mechanisms to protect research and development efforts and intellectual property from attacks or exposure.

  6. Improve information sharing of industry threats, weaknesses, and mitigations.

News article.

Slashdot thread.

A rather dandy Pi-assisted Draisine

Post Syndicated from Alex Bate original https://www.raspberrypi.org/blog/dandy-draisine/

It’s time to swap pedal power for relaxed strides with the Raspberry Pi-assisted Draisine from bicyle-modding pro Prof. Holger Hermanns.

Raspberry PI-powered Dandy Horse Draisine

So dandy…

A Draisine…

If you have children yourself or have seen them in the wild on occasion, you may be aware of how much they like balance bikes – bicycle frames without pedals, propelled by striding while sitting on the seat. It’s a nice way for children to take the first steps (bah-dum tss) towards learning to ride a bicycle. However, between 1817, when the balance bike (also known as a draisine or Dandy Horse) was invented by Karl von Drais, and the introduction of the pedal bike around 1860, this vehicle was the new, fun, and exciting way to travel for everyone.

Raspberry PI-powered Dandy Horse Draisine

We can’t wait for the inevitable IKEA flatpack release

Having previously worked on wireless braking systems for bicycles, Prof. Hermanns is experienced in adding tech to two wheels. Now, he and his team of computer scientists at Germany’s Saarland University have updated the balance bike for the 21st century: they built the Draisine 200.0 to explore pedal-free, power-assisted movement as part of the European Research Council-funded POWVER project.

With this draisine, his team have created a beautiful, fully functional final build that would look rather fetching here on the bicycle-flooded streets of Cambridge.

The frame of the bike, except for the wheel bearings and the various screws, is made of Okoumé wood, which looks somewhat rose, has fine nerves (which means that it is easy to mill) and seems to have excellent weather resistance.

Draisine 200.0

Uploaded by ecomento.tv on 2017-06-08.

…with added Pi!

Within the wooden body of the draisine lies a array of electrical components, including a 200-watt rear hub motor, a battery, an accelerometer, a magnetic sensor, and a Raspberry Pi. Checking the accelerometer and reading wheel-embedded sensors 150 times per second (wow!), the Pi activates the hub motor to assist the draisine, which allows it to reach speeds of up to 16mph (25km/h – wow again!).

Raspberry PI-powered Dandy Horse Draisine

The inner workings of the Draisine 200.0

More detailed information on the Draisine 200.0 build can be found here. Hermanns’s team also plan to release the code for the project once confirmation of no licence infringement has been given.

Take to the road

We’ve seen a variety of bicycle-oriented Pi builds that improve safety and help with navigation. But as for electricity-assisted Pi bikes, this one may be the first, and it’s such a snazzy one at that!

If you’d like to see more cycle-based projects using the Raspberry Pi, check out Matt’s Smart Bike Light, David’s bike computer, and, for the fun of it, the Pi-powered bicycle beer dispenser we covered last month.

The Pi Towers hive mind is constantly discussing fun new ways for its active cycling community to use the Raspberry Pi, and we’d love to hear your ideas as well! So please do share them in the comments below.

The post A rather dandy Pi-assisted Draisine appeared first on Raspberry Pi.

Copyright Holders Keep Targeting Dead Torrent Sites

Post Syndicated from Ernesto original https://torrentfreak.com/copyright-holders-keep-targeting-dead-torrent-sites-170611/

Over the past year several major torrent sites have shut down, causing quite an uproar among file-sharers.

Interestingly, however, several copyright holders still appear to think that these sites are alive and kicking. That is, judging from the takedown notices they send to Google.

Publisher Penguin Random House is particularly forgetful. Through its anti-piracy partner Digimarc, the company has reported hundreds of ‘infringing’ KickassTorrents URLs. Not only was KAT shut down last summer, the reported URLs are no longer listed in Google’s search results either.

Penguin is not alone though. Other rightsholders such as Sony Music, Dreamroom Productions, Taylor & Francis Group, The University of Chicago Press and many others have made the same mistakes recently.

Over the past month alone Google has received 1,340 takedown notices for Kat.cr URLs and an additional 775 for the Kat.ph domain name.

The problem is not limited to KAT either. Torrentz.eu, another major torrent site that went offline last summer, is still being targeted at well.

For example, earlier this week Sony Pictures asked Google to remove a Torrentz.eu URL that linked to the series Community, even though it is no longer indexed. In just one month copyright holders sent Google 4,960 takedown requests for “dead” Torrentz URLs.

Recent takedown requests for Torrentz.eu

Apparently, the reporting outfits have failed to adjust their piracy monitoring bots for the changing torrent landscape.

The mistakes are likely due to automated keyword filters that scour sites and forums for links to hosting services. These bots don’t bother to check whether Google actually indexes the content, nor do they remove dead sites from their system.

While targeting dead KAT and Torrentz links is bad enough, things can get worse.

The iconic torrent search isoHunt.com shut down following a MPAA lawsuit in 2013, well over three years ago. Nonetheless, rightsholders still sent Google takedown notices for the site, more than a dozen a month actually.

Or what about BTJunkie. This torrent indexer closed its doors voluntarily more than half a decade ago. Dead or not, some copyright holders still manage to find infringing links in some of the darkest corners of the Internet.

Apparently, torrent users are far quicker to adapt to the changing landscape than the monitoring outfits of some copyright holders…

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Bill to Ban VPNs & Unmask Operators Submitted to Russia’s Parliament

Post Syndicated from Andy original https://torrentfreak.com/bill-to-ban-vpns-unmask-operators-submitted-to-russias-parliament-170609/

Website blocking in Russia is becoming a pretty big deal. Hundreds of domains are now blocked at the ISP level for a range of issues from copyright infringement through to prevention of access to extremist material.

In common with all countries that deploy blocking measures, there is a high demand in Russia for services and software that can circumvent blockades. As a result, VPNs, proxies, mirror sites and dedicated services such as Tor are growing in popularity.

Russian authorities view these services as a form of defiance, so for some time moves have been underway to limit their effectiveness. Earlier this year draft legislation was developed to crack down on systems and software that allow Internet users to bypass website blockades approved by telecoms watchdog Roskomnadzor.

This week the draft bill was submitted to the State Duma, the lower house of the Russian parliament. If passed, it will effectively make it illegal for services to circumvent web blockades by “routing traffic of Russian Internet users through foreign servers, anonymous proxy servers, virtual private networks and other means.”

As it stands, the bill requires local telecoms watchdog Rozcomnadzor to keep a list of banned domains while identifying sites, services, and software that provide access to them. Once the bypassing services are identified, Rozcomnadzor will send a notice to their hosts, giving them a 72-hour deadline to reveal the identities of their operators.

After this stage is complete, the host will be given another three days to order the people running the circumvention-capable service to stop providing access to banned domains. If the service operator fails to comply within 30 days, all Internet service providers will be required to block access to the service and its web presence, if it has one.

This raises the prospect of VPN providers and proxies being forced to filter out traffic to banned domains to stay online. How this will affect users of Tor will remain to be seen, since there is no way to block domains. Furthermore, sites offering the software could also be blocked, if they continue to offer the tool.

Also tackled in the bill are search engines such as Google and Yandex that provide links in their indexes to banned resources. The proposed legislation will force them to remove all links to sites on Rozcomnadzor’s list, with the aim of making them harder to find.

However, Yandex believes that if sites are already blocked by ISPs, the appearance of their links in search results is moot.

“We believe that the laying of responsibilities on search engines is superfluous,” a spokesperson said.

“Even if the reference to a [banned] resource does appear in search results, it does not mean that by clicking on it the user will get access, if it was already blocked by ISPs or in any other ways.”

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Encased in amber: meet the epoxy-embedded Pi

Post Syndicated from Janina Ander original https://www.raspberrypi.org/blog/epoxy-pi-resin-io/

The maker of one of our favourite projects from this year’s Maker Faire Bay Area took the idea of an ’embedded device’ and ran with it: Ronald McCollam has created a wireless, completely epoxy-encased Pi build – screen included!

Resin.io in resin epoxy-encased Raspberry Pi

*cue epic music theme* “Welcome…to resin in resin.”

Just encase…

Of course, this build is not meant to be a museum piece: Ronald embedded a Raspberry Pi 3 with built-in wireless LAN and Bluetooth to create a hands-on demonstration of the resin.io platform, for which he is a Solution Architect. Resin.io is useful for remotely controlling groups of Linux-based IoT devices. In this case, Ronald used it to connect to the encased Pi. And yes, he named his make Resin-in-resin – we salute you, sir!

resin.io in resin epoxy-encased Raspberry Pi

“Life uh…finds a way.”

Before he started the practical part of his project, he did his research to find a suitable resin. He found that epoxy types specifically designed for encasing electronics are very expensive. In the end, Ronald tried out a cheap type, usually employed to coat furniture, by encasing an LED. It worked perfectly, and he went ahead to use this resin for embedding the Pi.

Bubbleshooting epoxy

This was the first time Ronald had worked with resin, so he learned some essential things about casting. He advises other makers to mix the epoxy very, very slowly to minimize the formation of bubbles; to try their hands on some small-scale casting attempts first; and to make sure they’re using a large enough mold for casting. Another thing to keep in mind is that some components of the make will heat up and expand while the device is running.

His first version of an encased Pi was still connected to the outside world by its USB cable:

Ronald McCollam on Twitter

Updates don’t get more “hands off” than a Raspberry Pi encased in epoxy — @resin_io inside resin! Come ask me about it at @DockerCon!

Not satisfied with this, he went on to incorporate an inductive charging coil as a power source, so that the Pi could be totally insulated in epoxy. The Raspberry Pi Foundation’s Matt Richardson got a look the finished project at Maker Faire Bay Area:

MattRichardson🏳️‍🌈 on Twitter

If you’re at @makerfaire, you must check out what @resin_io is showing. A @Raspberry_Pi completely enclosed in resin. Completely wireless. https://t.co/djVjoLz3hI

MAGNETS!

The charging coil delivers enough power to keep the Pi running for several hours, but it doesn’t allow secure booting. After some head-scratching, Ronald came up with a cool solution to this problem: he added a battery and a magnetic reed switch. He explains:

[The] boot process is to use the magnetic switch to turn off the Pi, put it on the charger for a few minutes to allow the battery to charge up, then remove the magnet so the Pi boots.

Pi in resin controlled by resin.io

“God help us, we’re in the hands of engineers.”

He talks about his build on the resin.io blog, and has provided a detailed project log on Hackaday. For those of you who want to recreate this project at home, Ronald has even put together an Adafruit wishlist of the necessary components.

Does this resin-ate with you?

What’s especially great about Ronald’s posts is that they’re full of helpful tips about getting started with using epoxy resin in your digital making projects. So whether you’re keen to build your own wireless Pi, or just generally interested in embedding electronic components in resin, you’ll find his write-ups useful.

If you have experience in working with epoxy and electronic devices and want to share what you’ve learned, please do so in the comments!

The post Encased in amber: meet the epoxy-embedded Pi appeared first on Raspberry Pi.