Shared posts

26 Aug 01:24

Stephen Hawking Proposes Black Hole Information-loss Solution

by LaminatorX

AnonTechie writes:

Stuff that falls into a black hole is gone forever, right? Not so, says Stephen Hawking.

“If you feel you are in a black hole, don’t give up,” he told an audience at a public lecture in Stockholm, Sweden, yesterday. He was speaking in advance of a scientific talk today at the Hawking Radiation Conference being held at the KTH Royal Institute of Technology in Stockholm. “There’s a way out.”

You probably know that black holes are stars that have collapsed under their own gravity, producing gravitational forces so strong that even light can’t escape. Anything that falls inside is thought to be ripped apart by the massive gravity, never to been seen or heard from again.

What you may not know is that physicists have been arguing for 40 years about what happens to the information about the physical state of those objects once they fall in. Quantum mechanics says that this information cannot be destroyed, but general relativity says it must be – that’s why this argument is known as the information paradox.

Now Hawking says this information never makes it inside the black hole in the first place. “I propose that the information is stored not in the interior of the black hole as one might expect, but on its boundary, the event horizon,” he said today.

https://www.newscientist.com/article/dn28090-stephen-hawking-says-he-has-a-way-to-escape-from-a-black-hole/


Original Submission

Read more of this story at SoylentNews.

23 Aug 17:45

thysweetpoison: Understanding How Depression Feels (via...

















thysweetpoison:

Understanding How Depression Feels (via buzzfeed)

05 Aug 00:00

Why Bill Gates Is Dumping Another $1 Billion Into Clean Energy

by Soulskill
An anonymous reader writes: A little over a month ago, Bill Gates made headlines when he decided to double down on his investments in renewable energy. Now, he's written an article for Quartz explaining why: "I think this issue is especially important because, of all the people who will be affected by climate change, those in poor countries will suffer the most. Higher temperatures and less-predictable weather would hurt poor farmers, most of whom live on the edge and can be devastated by a single bad crop. Food supplies could decline. Hunger and malnutrition could rise. It would be a terrible injustice to let climate change undo any of the past half-century's progress against poverty and disease — and doubly unfair because the people who will be hurt the most are the ones doing the least to cause the problem." He also says government is not doing enough to fund such research, and that energy markets aren't doing a good enough job of factoring the negative effects of carbon emissions.

Share on Google+

Read more of this story at Slashdot.

29 Apr 19:45

Mankind’s confidence in the strength and versatility of kitchen...

Massa

ISSO É ANTI-HIGIÊNICO



Mankind’s confidence in the strength and versatility of kitchen roll is finally to be tested.

Buy the book now on Amazon.com

Follow on Twitter @BadRealtyPhotos

04 Aug 11:00

Alergia a gente chata: infográfico

by Cristina Moreno de Castro
Massa

Agora sou famoso! Yay! :D
O soco é porque um dos efeitos colaterais de ter uma paciência semi-infinita é que, quando alguém consegue acabar com ela, well... shit got real. Por isso eu tenho inveja das pessoas que conseguem virar pra um chato e falar "vai se f*". Porque eu falo "ok", "tá legal", "eita, você pode estar abusando da minha boa vontade", "ok", "puxa", ... e lá pelo ducentésimo vigésimo segundoabuso eu perco a capacidade de me expressar verbalmente, e de agir como adulto.

O Humberto Massa, leitor das antigas do blog (e que é massa), fez um infográfico para a alergia dele a gente chata. Trocando o socão do fim por uma patadinha de leve, ou minhas manifestações de antipatia, o infográfico ilustra direitinho o post de ontem :D

Vejam só!

chatos

Leia também:

faceblogttblogPague com PagSeguro - é rápido, grátis e seguro!

 


Arquivado em:Divagações Tagged: chatice, chatos, chatura, gentileza, Humberto Massa, infográfico
21 Jul 02:32

Gawker Editors Resign Over Deleted Muckraking Post

by LaminatorX
Massa

pra quem perguntou de que se tratava...

takyon writes:

Tommy Craggs, Gawker Media's executive editor, and Max Read, the website's editor in chief, have resigned from Gawker after the removal of a widely-panned article, a move they say represents an "indefensible breach of the notoriously strong firewall between Gawker's business interests and the independence of its editorial staff":

At issue is a post published July 16 about a media executive who Gawker said sought a nighttime encounter with a gay porn star. The porn star, the site reported, tried to extort the executive, who is married to a woman.

The story was widely criticized because, as some people pointed out, the media executive is a private individual [and] not a public figure. Then on July 17, Gawker's Managing Partnership voted 4-2 to remove the post. Craggs and Heather Dietrick, Gawker's president who serves as the company's chief legal counsel, dissented.

Here's what Glenn Greenwald had to say about Gawker's story:

The story had no purpose other than to reveal that the male, married-to-a-woman Chief Financial Officer of a magazine company – basically an executive accountant – hired a male escort. When the escort discovered the real-life identity of his prospective client – he's the brother of a former top Obama official – he began blackmailing the CFO by threatening to expose him unless he used his political connections to help the escort in a housing discrimination case he had against a former landlord. Gawker completed the final step of the blackmail plot by publishing the text messages between the two and investigating and confirming the identity of the client, all while protecting the identity of the blackmailing escort.

[...] The reasons for regarding the story as deeply repugnant are self-evident. The CFO they outed is not a public figure. Even if he were, the revelation has zero public interest: it's not as though he's preached against gay rights or any form of sexual behavior. It's just humiliating someone and trying to destroy his life for fun, for its own sake. By publishing the article, Gawker aided the escort's blackmail plot, arguably even becoming a partner in it. Even worse, the story (probably unwittingly) reeks of all-too-familiar homophobic shaming: it's supposed to be humiliating at least in part because he's a man hiring a "gay porn star," as Gawker editor-in-chief Max Read put it as he promoted the "scoop." The escort's identity has been confirmed by others and he seems to have a history of serious mental distress, which Gawker is clearly exploiting. Beyond all that, Gawker has an ongoing war with Reddit, owned by the magazine company for which the CFO works, which suggests this is part of some petty, vindictive drive for vengeance, with the CFO as collateral damage.


Original Submission

Read more of this story at SoylentNews.

13 Jul 15:00

The Cure Culture: Our Obsession With Cures That Are 'Just Around the Corner'

by Soulskill
Massa

"The Cure Culture" é o nome da 1980's revival band mais eclética do mundo.

citadrianne writes: Cures for major disease always seem just a few short years away. We constantly read about promising new treatments for cancer, diabetes, HIV, ALS, and more. While the prognosis for these diseases has improved over the years — sometimes greatly — we still focus doggedly on the cure. "The idea of a cure is simpler, it's more appealing as a fantasy." This article takes a look at so-called "Cure Culture" — the focus on reaching for a cure when our scientific efforts may be better expended attacking a disease in other ways. It asks, "Why are we telling our children, our friends, and our family members that we are going to cure them? ... What does it mean to be cured of a disease that is encoded within your DNA from the moment you become a zygote until the moment you are dead? ... And why are we eschewing or overlooking treatments—real, honest-to-god treatments—that can let patients lead longer, more normal lives?

Share on Google+

Read more of this story at Slashdot.

09 Jul 20:24

Hacking Team Complains That its Leaked Zero-Days Will be Misused

by janrinok
Massa

They were already being misused... >:(

takyon writes:

Hacking Team has issued a statement confirming that its code and zero-day software vulnerabilities were leaked:

It is now apparent that a major threat exists because of the posting by cyber criminals of HackingTeam proprietary software on the Internet the night of July 6. HackingTeam's investigation has determined that sufficient code was released to permit anyone to deploy the software against any target of their choice.

Before the attack, HackingTeam could control who had access to the technology which was sold exclusively to governments and government agencies. Now, because of the work of criminals, that ability to control who uses the technology has been lost. Terrorists, extortionists and others can deploy this technology at will if they have the technical ability to do so.

Adobe has patched a security bug in flash, and Microsoft is working on a vulnerable kernel driver. Discussed at The Register and Motherboard.

The Intercept has detailed Hacking Team's demonstration to a Bangladesh "death squad," the use of Hacking Team software by the DEA to spy on all Colombian ISPs from the U.S. embassy in Bogota, and more. In one email, CEO David Vincenzetti unwittingly predicts the current fallout while warning employees not to leak the company's secrets: "Imagine this: a leak on WikiLeaks showing YOU explaining the evilest technology on earth! :-)" he wrote. "You will be demonized by our dearest friends the activists, and normal people will point their fingers at you."

Privacy International's Deputy Director Eric King has called the leaks "the equivalents of the Edward Snowden leaks for the surveillance industry." Nevertheless, Hacking Team plans to continue its operations. PhineasFisher, a hacker who penetrated Hacking Team's competitor Gamma International last year and leaked 40 GB of internal data, has claimed responsibility for this hack.


Original Submission

Read more of this story at SoylentNews.

10 Jul 00:52

AEP : The Servitude Bubble

Quick — what does the stuff below have in common?

A chat app bought for one fifth of the US educational budget. An Uber for dog-walkers. An app to have your trash taken out for you. On-demand butlers. On-demand massages. On-demand pedicures. On-demand private jets. On demand gardeners, plumbers, and private chefs. A fitness tracker that gives you electric shocks. “Concierge” apps to get “VIP service” at restaurants….barsclubs.

WTF? I could go on. And you probably have even better examples of even more ridiculous startups these days. So what’s the deal?

In this essay, I want to offer a competing narrative to the popular but woefully misnamed “sharing economy” (which, of course, isn’t sharing, unless you tell your kids that buying and selling toys from other five year olds is “sharing”).

Here’s my tiny theory. There’s gold in them thar hills. Money’s pouring into the tech industry today. Too much money, chasing too few truly groundbreaking investments. And so a bubble is inflating — but not just any bubble. A bubble of an especially insidious kind. Of stuff that’s beyond eyewateringly, painfully, mind-numbingly trivial.

I’m going to call it a Servitude Bubble. For the simple reason that it is largely based on creating armies of servants. You can call them whatever buzzwords you like — “tech-enabled always-on super-hustling freelance personal brand capitalists”. But the truth is simpler. The stuff of the Servitude Bubble makes a small number of people something like neofeudal masters, lords with a corncucopia of on-demand just-in-time luxury services at their fingertips. But only by making a very large number of people glorified neo-servants…butlers, maids, chauffeurs, waiters, etcetera.

The Servitude Bubble is creating “jobs”, sure — but only of the lowest kind: low-end, deskilled, dead-end, go-nowhere “service” jobs — that don’t only crush your soul, damage your psyche, and break your spirit — but waste your potential. Not “service” as in doctors and therapists— “service” as in pedicurists, trash-pickers, and dog-walkers. And so, on balance, it deskills and impoverishes human potential — it doesn’t expand and enrich it. The Servitude Bubble is made of stuff which, en masse, wastes, decimates, and demolishes the thing which counts most: human potential.

A bubble occurs when things are overvalued. What are ideas like the above really worth? They might — just might — be worth a little bit of change to a very small group of buyers. Google, Amazon, Apple, a hapless, clueless, doddering old media company here and there. But that’s like saying a subprime loan is “worth” it’s face value because a poor aging grandma can’t squint hard enough to read the fine print. Whether or not a handful of frat-bros is willing to fork over millions to one another for these startups like they were chess pieces in their struggles for corporate mid-life-crisis empire is besides the point.

It is in a true and very real economic sense that the appconomy of the Servitude Bubble is overvalued. The simple fact is that while the startups of the Servitude Bubble might hold a kind of dubious strategic value, they do not create much of real worth—largely just imaginary paper gains — but only at the price of what is truly valuable: real human potential. The Servitude Bubble is condemning people who might be doing amazing, wondrous, and miraculous things to be butlers, maids, dog-walkers, neo-servants — or, perhaps worse, code-monkey enforcers who, chasing their own little payday, make people into neo-servants.

The simple fact is that in economic terms, these startups are often barely worth much, if anything at all. Because they don’t enhance human potential, they don’t create much real value for people, let alone society, future generations, their communities, etcetera — maybe they save a trip here and there, but that’s about it. Yes — that can enhance efficiency. But what it doesn’t do is enhance human well being in any meaningful or significant way. And so they surely don’t elevate or expand the human experience, in even the small way that, say, an Apple Store does. They’re as evanescent — pretty, maybe, but vacant — as the soap bubbles they’re so reminiscent of.

Servitude. The suffix “itude” denotes a state of things. Servitude isn’t just “service”. It’s a dead end, a cul-de-sac, a stagnating pond, the end of the line. A state — not a process. Service is a great and noble ideal; it implies a higher purpose, a common goal, a shared benefit, a joint concern. But servitude is very different: it’s bringing another dozen shots of designer vodka to wasted, entitled, super-rich party people…with a frozen rictus smile. Service is responsibility; servitude is subjection. Service is obligation; servitude is obedience. Service is assistance; servitude is indulgence.

And that is a great tragedy, in at least three senses.

First, because a generation of young people are furiously chasing desperate dreams of winning this half-baked thinly-veiled ponzi scheme. But what they are not doing is creating stuff that actually matters, endures, counts, resonates. That changes the world, transforms lives, means anything. They are wasting their lives on the trivial, the futile, the meaningless. On diminishing people’s potential, by limiting them to be neo-servants — not expanding it, by enhancing their capability to be their truest, best selves.

Second, because instead of challenging people (hi, VCs) to create and invest in what is truly innovative, earth-shaking, groundbreaking, the Bullshit Bubble normalizes cynically settling for what’s easy, marginal, incremental. But the truth is that it’s a titanic squandering of resources — money, time, effort, imagination — to spend so much on so little of real value. On investing billions…to making people…neo-technological servants…not their truest and best selves.

And so, third, we are all worse off in the long run. We’re all poorer when the people we entrust to innovate and create don’t lead the way, inspire us, and challenge us — but simply forge shackles of servitude. We’re all a little worse off when society’s resources are misallocated on a vast scale to the Servitude Bubble — to creating armies of servants that can walk the dogs, paint the nails, and drive the cars of the coddled, carefree rich — instead of towards finding solutions to the very real, very urgent problems of education, healthcare, climate change, finance — to name just a few. Instead of solving the world’s glaring problems, we are simply finding more efficient ways to crack the same old whips and tie the same old leashes. But leashes and lashes have never freed a soul — they merely condemn the very people that hold them. Because the great lesson of history is that the master is as much a prisoner as the servant. For the very waste of human potential that he himself demands limits him from finding his own destiny.

What’s the opposite of servitude? Not just freedom — but the thing from which freedom is born.

At it’s best, techne, the Greek root of the word “technology”, which means “skill”, is a miraculous, magical, enchanted thing. Technology, the enlargement and extension of man’s skillfulness, is the closest humanity has come to discovering the sacred amongst the earthly profane: for it gives mankind the power to transfigure the very world. From a place of stasis, into a place of freedom. Through it, man can ascend beyond his natural birthright, and give himself rebirth — from a foul, stinking, starving, powerless beast, to a civilized, enlightened, powerful being. All that is contained in the magic of techne. Techne, skill, endows man with the proficiency, the dexterity, the advantage, the shining chance, to become what he truly is. Not merely a servant of himself, or a servant of another. But himself. Human. Homo sapiens. The mindful being.

So the real servitude in the Servitude Bubble is the definition of “technology”. Once, technology meant stuff that went to the moon…cured fatal diseases…extended the human lifespan…enhanced human agency. Now, “tech” means stuff that…hails taxis…organizes butlers…automatically calls dogwalkers.

“Tech”. Techne. As a simple example, my computer helps me to be a better writer. It enhances my skill, my techne. It is in that sense that it is “technological”. The “tech” of the Servitude Bubble does not enhance skill. At anything. Let alone the stuff that is truly valuable — one’s skill at all that makes one fully, truly alive.

“Tech”, and the “tech” industry that so champions it, has demeaned, denigrated, and diluted the very idea of technology — from miracles of skill that alter human destiny, to being able to browse a billion images of Kardashian-butt per nanosecond. The “tech” industry is aptly named: it’s about “tech”; not techne, technology in it’s true sense. Apps that limit people full of limitless potential…to be…on-demand butlers, maids, or dog-walkers. Those are “tech” — but they’re sure as hell not techne. They do not expand or enlarge human skilfullness in any way.

Technology, techne, is transformative, fundamental, magical — because it is the sudden joyous explosion of skill at mastering yourself. “Tech”, on the other hand, is just a handyman to fix the ennui-laden nuisances of daily life for the overprivileged — and one who pickpockets you slyly while you’re not looking. “Tech” impoverishes all of us by cheating each of us of skill — and so it drains us of potential. If you’re an on-demand dog walker, you’re probably never going to become that great novelist..anesthesiologist…musician…poet..dreamer…artist…programmer…anything.

Techne. “Tech”. The Servitude Bubble says that technology is stuff that makes your day a little easier — but probably crushes your spirit, rots your mind, destroys your soul, and clouds your mind, by asking you to be served — not to master your own destiny. Techne, the true spirit of technology, says precisely the opposite. A tool is only “technological” when it enhances man’s skillfullness. At the limit, at being fully human. At dreaming, imagining, rebelling, defying, creating, loving. At being himself.

That’s the greatest tragedy of the Servitude Bubble. It asks us to waste our lives being people we are not. Posers, performers, hustlers, clowns…making armies of chauffeurs, butlers, maids, servants…on-demand, ever-ready, always-vigilant. To obey nothing more, greater, truer, than idle whims . The Servitude Bubble is made of hundreds of thousands of person-years of wasted human potential.

Let’s reclaim technology from the appholes. Let’s rediscover the spirit of techne, and stop settling for the humdrum profit-maximizing soul-crushing servility of “tech”. For it is through techne, through the enhancement of skill, that humanity has, despite great struggle and suffering, created — and recreated — it’s freedom. Not merely as beings who hold power over one another. All that merely condemns masters to be slaves. But as beings who empower one another to discover our full potential. Because it is in the taking of that voyage that we give one another the greatest gifts of all: lives seared with the sense that they have mattered. For then we have learned the telos of techne, the greatest skill there is: becoming who we were truly meant to be.

06 Jul 17:53

Hacking Team Is Hacked

by schneier
Massa

Essa história fica cada vez mais engraçada.

Someone hacked the cyberweapons arms manufacturer Hacking Team and posted 400 GB of internal company data.

Hacking Team is a pretty sleazy company, selling surveillance software to all sorts of authoritarian governments around the world. Reporters Without Borders calls it one of the enemies of the Internet. Citizen Lab has published many reports about their activities.

It's a huge trove of data, including a spreadsheet listing every government client, when they first bought the surveillance software, and how much money they have paid the company to date. Not surprising, the company has been lying about who its customers are. Chris Soghoian has been going through the data and tweeting about it. More Twitter comments on the data here. Here are articles from Wired and The Guardian.

Here's the torrent, if you want to look at the data yourself. (Here's another mirror.) The source code is up on Github.

I expect we'll be sifting through all the data for a while.

Slashdot thread. Hacker News thread.

EDITED TO ADD: The Hacking Team CEO, David Vincenzetti, doesn't like me:

In another [e-mail], the Hacking Team CEO on 15 May claimed renowned cryptographer Bruce Schneier was "exploiting the Big Brother is Watching You FUD (Fear, Uncertainty and Doubt) phenomenon in order to sell his books, write quite self-promoting essays, give interviews, do consulting etc. and earn his hefty money."

Meanwhile, Hacking Team has told all of its customers to shut down all uses of its software. They are in "full on emergency mode," which is perfectly understandable.

EDITED TO ADD: Hacking Team had no exploits for an un-jail-broken iPhone. Seems like the platform of choice if you want to stay secure.

EDITED TO ADD (7/14): WikiLeaks has published a huge trove of e-mails.

Hacking Team had a signed iOS certificate, which has been revoked.

11 Jun 12:45

Ask Toolbar Now Considered Malware By Microsoft

by timothy
Massa

Demorou.

AmiMoJo writes: Last month Microsoft changed its policy on protecting search settings to include any software that attempts to hijack searches as malware. As a result, this month the Ask Toolbar, which most people will probably recognize as being unwanted crapware bundled with Java, was marked as malware and will now be removed by Microsoft's security software built in to Windows 7 and above.

Share on Google+

Read more of this story at Slashdot.

02 Jun 12:37

TSA Not Detecting Weapons at Security Checkpoints

by schneier
Massa

He, he...

This isn't good:

An internal investigation of the Transportation Security Administration revealed security failures at dozens of the nation's busiest airports, where undercover investigators were able to smuggle mock explosives or banned weapons through checkpoints in 95 percent of trials, ABC News has learned.

The series of tests were conducted by Homeland Security Red Teams who pose as passengers, setting out to beat the system.

According to officials briefed on the results of a recent Homeland Security Inspector General's report, TSA agents failed 67 out of 70 tests, with Red Team members repeatedly able to get potential weapons through checkpoints.

The Acting Director of the TSA has been resassigned:

Homeland Security Secretary Jeh Johnson said in a statement Monday that Melvin Carraway would be moved to the Office of State and Local Law Enforcement at DHS headquarters "effective immediately."

This is bad. I have often made the point that airport security doesn't have to be 100% effective in detecting guns and bombs. Here I am in 2008:

If you're caught at airport security with a bomb or a gun, the screeners aren't just going to take it away from you. They're going to call the police, and you're going to be stuck for a few hours answering a lot of awkward questions. You may be arrested, and you'll almost certainly miss your flight. At best, you're going to have a very unpleasant day.

This is why articles about how screeners don't catch every -- or even a majority -- of guns and bombs that go through the checkpoints don't bother me. The screeners don't have to be perfect; they just have to be good enough. No terrorist is going to base his plot on getting a gun through airport security if there's a decent chance of getting caught, because the consequences of getting caught are too great.

A 95% failure rate is bad, because you can build a plot around sneaking something past the TSA.

I don't know the details, or what failed. Was it the procedures or training? Was it the technology? Was it the PreCheck program? I hope we'll learn details, and this won't be swallowed in the great maw of government secrecy.

EDITED TO ADD: Quip:

David Burge @iowahawkblog

At $8 billion per year, the TSA is the most expensive theatrical production in history.

20 May 00:12

Los Angeles Raises Minimum Wage To $15 an Hour

by Soulskill
HughPickens.com writes: Jennifer Medina reports at the NY Times that the council of the nation's second-largest city voted by a 14-1 margin to increase its minimum wage to $15 an hour by 2020. Los Angeles and its almost 4 million residents represent one of the biggest victories yet for those pushing wage increases across the country. Proponents hope it will start to reverse the earning gap in the city, where the top 7% of households earn more than the bottom 67%. Detractors point out the direct cost increase to businesses, which could total as much as a billion dollars per year. If a business can't handle the increased cost, the employees this measure was designed to help will lose their jobs when it folds. An editorial from the LA Times says it's vital for other cities nearby to increase their minimum wage, too, else businesses will gradually migrate to cheaper locations. They add, "While the minimum wage hike will certainly help the lowest-wage workers in the city, it should not be seen as the centerpiece of a meaningful jobs creation strategy. The fact is that far too many jobs in the city are low-wage jobs — some 37% of workers currently earn less than $13.25 an hour, according to the mayor's estimates — and even after the proposed increase, they would still be living on the edge of poverty."

Share on Google+

Read more of this story at Slashdot.

13 May 14:51

"Get a rat and put it in a cage and give it two water bottles. One is just water, and one is water..."

Massa

Esse trem não é novidade nenhuma; google "Rat Park". Mas mostra como os antidrugs são normalmente idiotas drogados.

Get a rat and put it in a cage and give it two water bottles. One is just water, and one is water laced with either heroin or cocaine. If you do that, the rat will almost always prefer the drugged water and almost always kill itself very quickly, right, within a couple of weeks. So there you go. It’s our theory of addiction.

Bruce comes along in the ’70s and said, “Well, hang on a minute. We’re putting the rat in an empty cage. It’s got nothing to do. Let’s try this a little bit differently.” So Bruce built Rat Park, and Rat Park is like heaven for rats. Everything your rat about town could want, it’s got in Rat Park. It’s got lovely food. It’s got sex. It’s got loads of other rats to be friends with. It’s got loads of colored balls. Everything your rat could want. And they’ve got both the water bottles. They’ve got the drugged water and the normal water. But here’s the fascinating thing. In Rat Park, they don’t like the drugged water. They hardly use any of it. None of them ever overdose. None of them ever use in a way that looks like compulsion or addiction. There’s a really interesting human example I’ll tell you about in a minute, but what Bruce says is that shows that both the right-wing and left-wing theories of addiction are wrong. So the right-wing theory is it’s a moral failing, you’re a hedonist, you party too hard. The left-wing theory is it takes you over, your brain is hijacked. Bruce says it’s not your morality, it’s not your brain; it’s your cage. Addiction is largely an adaptation to your environment.

[…]

We’ve created a society where significant numbers of our fellow citizens cannot bear to be present in their lives without being drugged, right? We’ve created a hyperconsumerist, hyperindividualist, isolated world that is, for a lot of people, much more like that first cage than it is like the bonded, connected cages that we need. 

The opposite of addiction is not sobriety. The opposite of addiction is connection. And our whole society, the engine of our society, is geared towards making us connect with things. If you are not a good consumer capitalist citizen, if you’re spending your time bonding with the people around you and not buying stuff—in fact, we are trained from a very young age to focus our hopes and our dreams and our ambitions on things we can buy and consume. And drug addiction is really a subset of that.



-

Johann Hari,

Does Capitalism Drive Drug Addiction?

(via bigfatsun)

As a recovering addict this is an interesting read. I’m constantly battling right-wingers telling me it’s my fault and always being told by doctors it’s in my nature. But hearing this about my environment makes a lot of sense, I fell into addiction in a very bad time in my life when I was very isolated, and most of the addicts I know are the same. Addiction is definitely related to depression and this is affected by environment. I like this article.

(via soymilkbitch)

Bruce Alexander did the Rat Park experiments in the seventies.  I am kind of horrified and outraged that I’ve heard about the empty-cage rat experiments but never once about his.

(via animatedamerican)

10 May 04:20

Photobucket Hackers Nabbed, Face Serious Charges From US Authorities

by timothy
The U.S. Department of Justice said in a statement released Friday that two men, Brandon Bourret, and Athanasios Andrianakis, of Colorado Springs, Colorado and Sunnyvale, California, respectively, were arrested for their sale of software designed to breach the security of photo-sharing site Photobucket.com; their "Photofucket" app, says the linked Register report, was used "to plunder Photobucket's users' private and password-protected information, images and videos, it has been alleged ... The charge sheet against Bourret and Andrianakis details one count of conspiracy and one count of computer fraud, aid and abet – both of which carry a maximum prison sentence of five years and a fine of up to $250,000. In addition, the men stand accused of two counts of access device fraud, which carries a higher prison sentence of up to 10 years and a fine of up to a quarter of a million dollars, per count." The indictment, filed in Federal District Court in Colorado, is far easier to read than many.

Share on Google+

Read more of this story at Slashdot.

25 Apr 12:17

AEP : Watch Porn, Save Your Life – Fight Against Testicular Cancer

Massa

He, he...

Charlotte_Stokely_teaches_you_to_last_longer_-_Pornhub.com_-_2015-04-21_13.09.08
 
Screen Shot 2015-04-22 at 18.11.30
 

Editor’s Note

Men that visit Pornhub to watch a pornstar interacting with a dildo will make a use of their time.
And maybe save their life.
 
Save_the_balls_-_2015-04-22_18.12.23
 
www.pornhub.com/event/save-the-balls
 

CREDITS

Newsletter

Subscribe to our newsletter to receive the best ads each week

Email Address *

08 Apr 22:10

Phone App That Watches Your Driving Habits Leads To Privacy Concerns

by samzenpus
Toshito writes Desjardins Insurance has launched a smartphone app that tracks driver behaviour in return for the promise of substantial savings on car insurance. Two years ago, Desjardins began offering a telematic device that plugs into a vehicle's diagnostic port, to track acceleration, hard braking and the time of day you were driving, for instance. Now, there's no plug-in device required. With Desjardins's new Ajusto app, all you need is your smartphone. But this comes with great concerns over privacy, and problems have been reported where the device was logging data when the user was riding a bus instead of driving his own car.

Share on Google+

Read more of this story at Slashdot.

31 Dec 13:52

More Data on Attributing the Sony Attack

by schneier

An analysis of the timestamps on some of the leaked documents shows that they were downloaded at USB 2.0 speeds -- which implies an insider.

Our Gotnews.com investigation into the data that has been released by the "hackers" shows that someone at Sony was copying 182GB at minimum the night of the 21st -- the very same day that Sony Pictures' head of corporate communications, Charles Sipkins, publicly resigned from a $600,000 job. This could be a coincidence but it seems unlikely. Sipkins's former client was NewsCorp and Sipkins was officially fired by Pascal's husband over a snub by the Hollywood Reporter.

Two days later a malware bomb occurred.

We are left with several conclusions about the malware incident:

  1. The "hackers" did this leak physically at a Sony LAN workstation. Remember Sony's internal security is hard on the outside squishy in the center and so it wouldn't be difficult for an insider to harm Sony by downloading the material in much the same way Bradley Manning or Edward Snowden did at their respective posts.

  2. If the "hackers" already had copies, then it's possible they made a local copy the night of the 21st to prepare for publishing them as a link in the malware screens on the 24th.

Sony CEO Michael Lynton's released emails go up to November 21, 2014. Lynton got the "God'sApstls" email demand for money on the 21st at 12:44pm.

Other evidence implies insiders as well:

Working on the premise that it would take an insider with detailed knowledge of the Sony systems in order to gain access and navigate the breadth of the network to selectively exfiltrate the most sensitive of data, researchers from Norse Corporation are focusing on this group based in part on leaked human resources documents that included data on a series of layoffs at Sony that took place in the Spring of 2014.

The researchers tracked the activities of the ex-employee on underground forums where individuals in the U.S., Europe and Asia may have communicated prior to the attack.

The investigators believe the disgruntled former employee or employees may have joined forces with pro-piracy hacktivists, who have long resented the Sony's anti-piracy stance, to infiltrate the company's networks.

I have been skeptical of the insider theory. It requires us to postulate the existence of a single person who has both insider knowledge and the requisite hacking skill. And since I don't believe that insider knowledge was required, it seemed unlikely that the hackers had it. But these results point in that direction.

Pointing in a completely different direction, a linguistic analysis of the grammatical errors in the hacker communications implies that they are Russian speakers:

Taia Global, Inc. has examined the written evidence left by the attackers in an attempt to scientifically determine nationality through Native Language Identification (NLI). We tested for Korean, Mandarin Chinese, Russian, and German using an analysis of L1 interference. Our preliminary results show that Sony's attackers were most likely Russian, possibly but not likely Korean and definitely not Mandarin Chinese or German.

The FBI still blames North Korea:

The FBI said Monday it was standing behind its assessment, adding that evidence doesn't support any other explanations.

"The FBI has concluded the government of North Korea is responsible for the theft and destruction of data on the network of Sony Pictures Entertainment. Attribution to North Korea is based on intelligence from the FBI, the U.S. intelligence community, DHS, foreign partners and the private sector," a spokeswoman said in a statement. "There is no credible information to indicate that any other individual is responsible for this cyber incident."

Although it is now thinking that the North Koreans hired outside hackers:

U.S. investigators believe that North Korea likely hired hackers from outside the country to help with last month's massive cyberattack against Sony Pictures, an official close to the investigation said on Monday.

As North Korea lacks the capability to conduct some elements of the sophisticated campaign by itself, the official said, U.S. investigators are looking at the possibility that Pyongyang "contracted out" some of the cyber work.

This is nonsense. North Korea has had extensive offensive cyber capabilities for years. And it has extensive support from China.

Even so, lots of security experts don't believe that it's North Korea. Marc Rogers picks the FBI's evidence apart pretty well.

So in conclusion, there is NOTHING here that directly implicates the North Koreans. In fact, what we have is one single set of evidence that has been stretched out into 3 separate sections, each section being cited as evidence that the other section is clear proof of North Korean involvement. As soon as you discredit one of these pieces of evidence, the whole house of cards will come tumbling down.

But, as I wrote earlier this month:

Tellingly, the FBI's press release says that the bureau's conclusion is only based "in part" on these clues. This leaves open the possibility that the government has classified evidence that North Korea is behind the attack. The NSA has been trying to eavesdrop on North Korea's government communications since the Korean War, and it's reasonable to assume that its analysts are in pretty deep. The agency might have intelligence on the planning process for the hack. It might, say, have phone calls discussing the project, weekly PowerPoint status reports, or even Kim Jong Un's sign-off on the plan.

On the other hand, maybe not. I could have written the same thing about Iraq's weapons of mass destruction program in the run-up to the 2003 invasion of that country, and we all know how wrong the government was about that.

I also wrote that bluffing about this is a smart strategy for the US government:

...from a diplomatic perspective, it's a smart strategy for the US to be overconfident in assigning blame for the cyberattacks. Beyond the politics of this particular attack, the long-term US interest is to discourage other nations from engaging in similar behavior. If the North Korean government continues denying its involvement, no matter what the truth is, and the real attackers have gone underground, then the US decision to claim omnipotent powers of attribution serves as a warning to others that they will get caught if they try something like this.

Of course, this strategy completely backfires if the attackers can be definitely shown to be not from North Korea. Stay tuned for more.

EDITED TO ADD (12/31): Lots of people in the comments are doubting the USB claim.

23 Feb 07:32

maymay: “Repeat Rape: How do they get away with it?”, Part 1 of...

Massa

Porrada.


It turns out that if you ask the right questions in just the right way, some men will actually tell you that they're rapists. They'll just…admit it.


The key is, don't use the word rape. Just ask them what they've done.


Researchers asked 1,882 men: "Have you ever tried to have oral sex with someone by using (or threatening to use) physical force—twisting their arm, holding them down, etc.—if they did not cooperate?"


and: "Have you ever had sexual intercourse with someone, even though they didn't want to, because they were too intoxicated to resist your advances?"


120 answered yes.


(That's rape.)


1,882 men…


120 rapists.


They admitted to a total of 483 rapes and attempted rapes. 483!


Whoa.

maymay:

“Repeat Rape: How do they get away with it?”, Part 1 of 2. (link to Part 2)

Sources:

  1. College Men: Repeat Rape and Multiple Offending Among Undetected Rapists,Lisak and Miller, 2002 [PDF, 12 pages]
  2. Navy Men: Lisak and Miller’s results were essentially duplicated in an even larger study (2,925 men): Reports of Rape Reperpetration by Newly Enlisted Male Navy Personnel, McWhorter, 2009 [PDF, 16 pages]

By dark-side-of-the-room, who writes:

These infogifs are provided RIGHTS-FREE for noncommercial purposes. Repost them anywhere. In fact, repost them EVERYWHERE. No need to credit. Link to the L&M study if possible.

Knowledge is a seed; sow it.

21 Feb 23:11

We Can Avoid a Surveillance State Dystopia

by Soulskill
Massa

Eu não concordo (que dá pra evitar a evasão de privacidade), mas queria a opinião dos amigos...

An anonymous reader writes "After the past year's revelations about NSA spying, it's hard to read any commentary about society without dire warnings of the coming (or already present) surveillance state. Sci-fi author Ramez Naam makes the point that while government surveillance needs to be fought, it's actually not as bad as what we were promised in decades past. 'Aldous Huxley published Brave New World in 1932. And while Brave New World is remembered more for predicting government-controlled biological engineering of the masses, it also features government surveillance, media manipulation, and thought control. This is an old idea. Yet somehow, today, in most of the world, governments have dramatically less control over their people than they did when Huxley and Orwell wrote those words. Indeed, the average person on Earth is more free today, in 2014, than he or she would have been in the actual year 1984. The arc of history has bent towards more freedom.' Naam also explains that the technological advances allowing the bulk collection of personal data also provide us with cheap and easy means to fight government overreach."

Share on Google+

Read more of this story at Slashdot.








14 Feb 18:45

Computer Geeks As Loners? Data Says Otherwise

by Soulskill
Massa

São sempre gregários e geralmente incultos, não sabem distinguir entre uma premissa maior e uma menor e têm escasso domínio do vernáculo.

Computerworld reports on an analysis of census data to compare marriage rates for different professions. They found the rate for tech workers to be similar to that of other white-collar professions, and significantly higher than the rate for the general population. 62.1% of people with IT jobs are married, as are 56.5% of scientists and 65.5% of engineers. This compares well to people in legal professions (62.0%), medical jobs (61.3%), and finance (62.4%). 51% of the adult U.S. population was married as of the 2010 census. Tech workers do have a slightly higher percentage of people who have never married — 26.7% of IT workers and 31.9% of scientists — but they also have slightly fewer divorces.

Share on Google+

Read more of this story at Slashdot.








15 Feb 18:55

Psychologists: Internet Trolls Are Narcissistic, Psychopathic, and Sadistic

by Soulskill
Massa

O instituto O RLY? de pesquisas psicológicas e psiquiátricas informa...

Hugh Pickens DOT Com writes "Chris Mooney reports at Slate that research conducted by Erin Buckels of the University of Manitoba confirmed that people who engage in internet trolling are characterized by personality traits that fall in the so-called Dark Tetrad: Machiavellianism (willingness to manipulate and deceive others), narcissism (egotism and self-obsession), psychopathy (the lack of remorse and empathy), and sadism (pleasure in the suffering of others). In the study, trolls were identified in a variety of ways. One was by simply asking survey participants what they 'enjoyed doing most' when on online comment sites, offering five options: 'debating issues that are important to you,' 'chatting with others,' 'making new friends,' 'trolling others,' and 'other.' The study recruited participants from Amazon's Mechanical Turk website and two measures of sadistic personality were administered (PDF): the Short Sadistic Impulse Scale and the Varieties of Sadistic Tendencies Scale. Only 5.6 percent of survey respondents actually specified that they enjoyed 'trolling.' By contrast, 41.3 percent of Internet users were 'non-commenters,' meaning they didn't like engaging online at all. So trolls are, as has often been suspected, a minority of online commenters, and an even smaller minority of overall Internet users. Overall, the authors found that the relationship between sadism and trolling was the strongest, and that indeed, sadists appear to troll because they find it pleasurable. 'Both trolls and sadists feel sadistic glee at the distress of others. Sadists just want to have fun ... and the Internet is their playground!' The study comes as websites are increasingly weighing steps to rein in trollish behavior but the study authors aren't sure that fix is a realistic one. 'Because the behaviors are intrinsically motivating for sadists, comment moderators will likely have a difficult time curbing trolling with punishments (e.g., banning users),' says Buckels. 'Ultimately, the allure of trolling may be too strong for sadists, who presumably have limited opportunities to express their sadistic interests in a socially-desirable manner.' Perhaps posting rights should only be unlocked if you pass a test."

Share on Google+

Read more of this story at Slashdot.








04 Feb 20:09

MAESTRO-II: NSA Exploit of the Day

by schneier
Massa

ÓIA o tamanho do treco. Com um processador ARM7.

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:

MAESTRO-II

(TS//SI//REL) MAESTRO-II is a miniaturized digital core packaged in a Multi-Chip Module (MCM) to be used in implants with size constraining concealments.

(TS//SI//REL) MAESTRO-II uses the TAO standard implant architecture. The architecture provides a robust, reconfigurable, standard digital platform resulting in a dramatic performance improvement over the obsolete HC12 microcontroller based designs. A development Printed Circuit Board (PCB) using packaged parts has been developed and is available as the standard platform. The MAESTRO-II Multi-Chip-Module (MCM) contain an ARM7 microcontroller, FPGA, Flash and SDRAM memories.

Status: Available -- On The Shelf

Unit Cost: $3-4K

Page, with graphics, is here. General information about TAO and the catalog is here.

Finally -- I think this is obvious, but many people are confused -- I am not the one releasing these documents. Der Spiegel released these documents in December. Every national intelligence service, Internet organized crime syndicate, and clued terrorist organization has already pored over these pages. It's us who haven't really looked at, or talked about, these pages. That's the point of these daily posts.

In the comments, feel free to discuss how the exploit works, how we might detect it, how it has probably been improved since the catalog entry in 2008, and so on.

30 Jan 16:39

Sense the World with the Sensordrone [Deals Hub]

by StackSocial
Massa

Se alguém aqui do Old Reader me amar muito e achar que eu sou sempre um moleque bonzinho e mereço um presente de Natal, Aniversário, Dia das Crianças, ou semelhantes. Bônus= o trem tem um bafômetro embutido. :D

Sense the World with the Sensordrone [Deals Hub]
Your smartphone is capable of all kinds of amazing things, containing impressive computing power in such a little package. It’s not the only little tool that is able to impress, though. Sensordrone is the size of a keychain yet is a fulling functioning sensing computer. It can be yours if you head to the iPhone Hacks Deals Hub today. Continue reading →
31 Jan 08:06

Peanut Allergy Treatment Trial In UK "A Success"

by samzenpus
Massa

Aparentemente é o mesmo princípio das "vacinas para alergia" que eu tomava aos 12 anos de idade, subcutaneamente, por uns seis meses, todos os dias. Funciona muito...

cold fjord writes: "The BBC reports, 'Peanuts are the most common cause of fatal allergic reactions to food. There is no treatment so the only option for patients is to avoid them completely, leading to a lifetime of checking every food label before a meal. The trial ... tried to train the children's immune system to tolerate peanut. Every day they were given a peanut protein powder — starting off on a dose equivalent to a 70th of a peanut. Once a fortnight the dose was increased while the children were in hospital and then they continued taking the higher dose at home. The majority of patients learned to tolerate the peanut. ... Dr Andrew Clark, told the BBC: "It really transformed their lives dramatically, this really comes across during the trial. ... Dr Pamela Ewan added ... further studies would be needed and that people should not try this on their own as this "should only be done by medical professionals in specialist settings."' The story also notes, 'The findings, published in the Lancet, suggest 84% of allergic children could eat the equivalent of five peanuts a day after six months.'"

Share on Google+

Read more of this story at Slashdot.








29 Jan 20:28

GINSU: NSA Exploit of the Day

by schneier
Massa

compartilhado por que o nome é lindo.

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:

GINSU

(TS//SI//REL) GINSU provides software application persistence for the CNE implant, KONGUR, on target systems with the PCI bus hardware implant, BULLDOZER.

(TS//SI//REL) This technique supports any desktop PC system that contains at least one PCI connector (for BULLDOZER installation) and Microsoft Windows 9x, 2000, 20003, XP, or Vista.

(TS//SI//REL) Through interdiction, BULLDOZER is installed in the target system as a PCI bus hardware implant. After fielding, if KONGUR is removed from the system as a result of an operation system upgrade or reinstall, GINSU can be set to trigger on the next reboot of the system to restore the software implant.

Unit Cost: $0

Status: Released / Deployed. Ready for Immediate Delivery

Page, with graphics, is here. General information about TAO and the catalog is here.

In the comments, feel free to discuss how the exploit works, how we might detect it, how it has probably been improved since the catalog entry in 2008, and so on.

29 Jan 13:46

US Forces Coursera To Ban Students From Cuba, Iran, Sudan, and Syria

by Unknown Lamer
Massa

Porque não existem proxies no mundo...

An anonymous reader writes "Coursera is an online website that offers free courses from many of the world's top universities. Now, all students from Syria, Sudan, Iran and Cuba will no longer be able to access Coursera. The official blog provides more info regarding the ban: 'Until now the interpretation of export control regulations as they relate to MOOCs has been unclear and Coursera has been operating under the interpretation that MOOCs would not be restricted. We recently received information that has led to the understanding that the services offered on Coursera are not in compliance with the law as it stands ... United States export control regulations prohibit U.S. businesses, such as MOOC providers like Coursera, from offering services to users in sanctioned countries, including Cuba, Iran, Sudan, and Syria. Under the law, certain aspects of Coursera's course offerings are considered services and are therefore subject to restrictions in sanctioned countries, with the exception of Syria.'"

Share on Google+

Read more of this story at Slashdot.








27 Jan 19:48

Bitcoin Exchange CEO Charlie Shrem Arrested On Money Laundering Charge

by samzenpus
Massa

IOW: bitcoin exchanges são proibidos no Zuza.

An anonymous reader writes "Charlie Shrem, the chief executive officer of bitcoin exchange BitInstant, has been arrested and charged with money laundering. 'In the federal criminal complaint, the Southern District of New York charges Shrem, the 24-year-old CEO of BitInstant, with three counts, including one count operating an unlicensed money transmitting business, one count of money laundering conspiracy and one count willful failure to file suspicious activity report. Robert Faiella, a Silk Road user who operated under the name “BTCKing,” was charged with one count of operating an unlicensed money transmitting business and one count money laundering conspiracy.'"

Share on Google+

Read more of this story at Slashdot.








20 Jan 21:18

More Details About Mars Mystery Rock

by samzenpus
Massa

é um cocô

First time accepted submitter GPS Pilot writes "Previous reports said the rock that suddenly appeared out of nowhere was merely 'the size of a jelly doughnut.' Now, a color image shows additional reasons for this metaphor: 'It's white around the outside, in the middle there's kind of a low spot that's dark red,' said lead scientist Steve Squyres. In the image, the object does stick out like a sore thumb amidst the surrounding orange rocks and soil. Its composition is 'like nothing we've ever seen before. It's very high in sulfur, it's very high in magnesium, it's got twice as much manganese as we've ever seen in anything on Mars.'"

Share on Google+

Read more of this story at Slashdot.








17 Jan 17:05

Meet COS, The Chinese Government's Contender To Battle iOS & Android

by Dave Smith
Massa

1. sempre bom lembrar que na china, até a cauda longa é grossa :D
2. with blackjack and hookers!

The government of China is not too fond of foreign mobile operating systems like iOS and Android, so the country cooked up its own homegrown solution: A Linux-based, open-source operating system called the COS, or China Operating System.

According to People's Daily, a government-run news organization in China, COS is a joint effort between the Institute of Software at the Chinese Academy of Sciences (ISCAS) and a company called Shanghai Liantong, which develops software and communication technology. According to China’s dedicated website, the COS was designed for smartphones, PCs, smart appliances and set-top boxes, and is “intended to break the foreign monopoly in the field of infrastructure software.”

At a launch event Wednesday, the head of the ISCAS took the first steps in denigrating the so-called foreign mobile “monopoly” and promoting China’s own COS. According to Engadget Chinese, the ISCAS chief “criticized iOS for being a closed ecosystem,” mentioned Android’s “infamous fragmentation problem,” and added that both Android and Windows Phone OS are “let down by poor security.” 

Many Chinese consumers are skeptical of COS in its early going. According to Quartz’ Jennifer Chiu, Chinese smartphone users took to Sina Weibo in droves to critique COS after its unveiling this week, poking fun at its name—“What does COS stand for? COPY ANOTHER SYSTEM?”—and sarcastically proposing that Communist Party “members, cadres, and leaders throw away their iPhones [first] and have them replayed by our superb homemade operating system!”

Justifiably Suspicious

Consumers have every right to be skeptical of its own government’s second attempt at a mobile operating system. That's right—second attempt.

China once tried to create its own Linux-based, open mobile ecosystem in the past, but the OPhone or OMS (Open Mobile System), fell flat after its 2009 release. The OPhone, though believed to be discontinued in 2010, is still alive today with a meager 600 available applications.

With COS, China is taking advantage of the recent NSA scandal in the U.S. to push its own product; and yet, a government-approved mobile operating system, especially in China of all places, reeks of its own backdoor exploits for governmental spying.

China, which has notably heavy restrictions against sociopolitical freedoms like access to the Internet, the right to assemble or practice religion, and even the right to bear children, has many times been accused of spying on (and censoring) its own citizens. More recently, Chinese officials have begun wiretapping each other’s bedrooms and showers out of distrust. Even China’s president was wiretapped by a member of the country’s own Communist Party. 

Before it can go mainstream, COS will need to win support from a number of local carriers and handset makers, including ZTE, Lenovo and Huawei Technologies, the largest telecom equipment maker in the world, which was also accused of cyberspying in the U.S. and criticized for its ties to the Chinese military.

Lead image via Shutterstock; right images via China-COS