By Unknown Lamer from Slashdot's perfect-for-space-exploration department
writes "Last week, the US Alcohol and Tobacco Tax and Trade Bureau approved Palcohol, a powdered alcohol product that you can either use to turn water into a presumably not-that-delicious marg or to snort if you don't care too much about your brain cells. It's the first time a powdered alcohol product has been approved for sale in the US, but not the first time someone has devised one, and such products have been available in parts of Europe for a few years now. Now you may be wondering, as I was, how the heck do you go about powdering alcohol? As you might expect, there's quite a bit of chemistry involved, but the process doesn't seem overly difficult; we've known how to do it since the early 1970s, when researchers at the General Foods Corporation (now a subsidiary of Kraft) applied for a patent for an 'alcohol-containing powder.'"
It turns out the labels were issued in error, so don't expect it to be available soon
. But it does appear to be a real thing that someone is trying to have approved.Read Replies (0)
By Unknown Lamer from Slashdot's insecurity-through-idiocy department
New submitter janoc (699997)
writes about a backdoor that was fixed only not "Eloi Vanderbeken from Synacktiv has identified an intentional backdoor in a module by Sercomm used by major router manufacturers (Cisco, Linksys, Netgear, etc.). The backdoor was ostensibly fixed — by obfuscating it and making it harder to access. The original report (PDF). And yeah, there is an exploit available ..."
Rather than actually closing the backdoor, they just altered it so that the service was not enabled until you knocked the portal with a specially crafted Ethernet packet. Quoting Ars Technica: "The nature of the change, which leverages the same code as was used in the old firmware to provide administrative access over the concealed port, suggests that the backdoor is an intentional feature of the firmware ... Because of the format of the packets—raw Ethernet packets, not Internet Protocol packets—they would need to be sent from within the local wireless LAN, or from the Internet service provider’s equipment. But they could be sent out from an ISP as a broadcast, essentially re-opening the backdoor on any customer’s router that had been patched."Read Replies (0)
By Unknown Lamer from Slashdot's wait'll-it's-drone-enabled department
:Advocatus Diaboli (1627651)
writes with some concerning news from the Atlantic
. From the article: "In a secret test of mass surveillance technology, the Los Angeles County Sheriff's Department sent a civilian aircraft over Compton, California, capturing high-resolution video of everything that happened inside that 10-square-mile municipality. Compton residents weren't told about the spying, which happened in 2012. 'We literally watched all of Compton during the times that we were flying, so we could zoom in anywhere within the city of Compton and follow cars and see people,' Ross McNutt of Persistence Surveillance Systems told the Center for Investigative Reporting, which unearthed and did the first reporting on this important story. The technology he's trying to sell to police departments all over America can stay aloft for up to six hours. Like Google Earth, it enables police to zoom in on certain areas. And like TiVo, it permits them to rewind, so that they can look back and see what happened anywhere they weren't watching in real time."Read Replies (0)
By samzenpus from Slashdot's what-do-the-number-say? department
An anonymous reader writes "In his new book, Social Physics, MIT data scientist Alex 'Sandy' Pentland argues that by analyzing data from smartphones, social media, and credit-card systems, we'll soon be able to have a mathematical understanding of 'the basic mechanisms of social interactions.' Social scientists will be able to understand and predict the interactions of people the way physicists understand and predict the interactions of objects. That will, in turn, enable governments and businesses to create incentive systems to 'tune' people's behavior, making society more productive and creative. In a review of Pentland's book in Technology Review, Nicholas Carr argues that such data-based social engineering 'will tend to perpetuate existing social structures and dynamics' and 'encourage us to optimize the status quo rather than challenge it.' Carr writes, 'Defining social relations as a pattern of stimulus and response makes the math easier, but it ignores the deep, structural sources of social ills. Pentland may be right that our behavior is determined largely by social norms and the influences of our peers, but what he fails to see is that those norms and influences are themselves shaped by history, politics, and economics, not to mention power and prejudice.'"Read Replies (0)