By BeauHD from Slashdot's theoretically-possible department
A new study from physicists at Harvard and Stanford says that wormholes can exist but they're not very useful for humans to travel through. "It takes longer to get through these wormholes than to go directly, so they are not very useful for space travel," said the author of the study, Daniel Jafferis. From the report: Despite his pessimism for pan-galactic travel, he said that finding a way to construct a wormhole through which light could travel was a boost in the quest to develop a theory of quantum gravity. The new theory was inspired when Jafferis began thinking about two black holes that were entangled on a quantum level, as formulated in the ER=EPR correspondence by Juan Maldacena from the Institute for Advanced Study and Lenny Susskind from Stanford. Although this means the direct connection between the black holes is shorter than the wormhole connection -- and therefore the wormhole travel is not a shortcut -- the theory gives new insights into quantum mechanics.
"From the outside perspective, travel through the wormhole is equivalent to quantum teleportation using entangled black holes," Jafferis said. Jafferis based his theory on a setup first devised by Einstein and Rosen in 1935, consisting of a connection between two black holes (the term wormhole was coined in 1957). Because the wormhole is traversable, Jafferis said, it was a special case in which information could be extracted from a black hole. "It gives a causal probe of regions that would otherwise have been behind a horizon, a window to the experience of an observer inside a spacetime, that is accessible from the outside," said Jafferis. The physicists presented their results at the 2019 American Physical Society April Meeting in Denver, Colorado.Read Replies (0)
By BeauHD from Slashdot's what-to-expect department
9to5Mac has learned of several new features expected to be included in iOS 13. From the report: Dark Mode: There will be a system-wide Dark Mode that can be enabled in Settings, including a high contrast version, similar to what's already available on macOS. Speaking of macOS, iPad apps that run on the Mac using Marzipan will finally take advantage of the Dark Mode support on both systems.
Multitasking: There are many changes coming to iPad with iOS 13, including the ability for apps to have multiple windows. Each window will also be able to contain sheets that are initially attached to a portion of the screen, but can be detached with a drag gesture, becoming a card that can be moved around freely, similar to what an open-source project called "PanelKit" could do. These cards can also be stacked on top of each other, and use a depth effect to indicate which cards are on top and which are on the bottom. Cards can be flung away to dismiss them.
Undo gesture: With iOS 13, Apple is introducing a new standard undo gesture for text input on the iPad. The gesture starts as a three-finger tap on the keyboard area, sliding left and right allows the user to undo and redo actions interactively.
Safari improvements: Safari on iOS 13 for the iPad will automatically ask for a desktop version of websites when necessary, preventing a common issue where websites will render their iPhone version even when running on an iPad with a big screen. YouTube is notorious for this behavior, forcing users to rely on a 'Request Desktop Site' button.
Font management: Font management is getting a major upgrade on iOS 13. It will not be necessary to install a profile to get new fonts into the system anymore. Instead there will be a new font management panel in Settings. A new standard font picker component will be available for developers and the system will notify the user when they open a document that has missing fonts.
< article continued at Slashdot's what-to-expect department
>Read Replies (0)
By BeauHD from Slashdot's safety-alert department
secwatcher shares a report from Threatpost: A popular smartwatch that allows parents to track their children's whereabouts, TicTocTrack, has been discovered to be riddled with security issues that could allow hackers to track and call children. Researchers at Pen Test Partners revealed vulnerabilities in the watch (sold in Australia) on Monday, which could enable hackers to track children's location, spoof the child's location or view personal data on the victims' accounts. The parent company of the TicTocTrack watch, iStaySafe Pty Ltd., has temporarily restricted access to the watch's service and app while it investigates further. Researchers found that the service's back end does not make any authorization attempt on any request -- besides the user having a valid username and password combination. That means that an attacker who is logged into the service could remotely compromise the app and track other accounts that are based in Australia.
The smartwatch, available in Australia for $149 (USD), is designed for children and uses GPS to track the movement of the wearer every six minutes, and offers voice calling and SMS features. The smartwatch's API can be attacked by changing the FamilyIdentifier number (which identifies the family that the user belongs to), which then could give a bad actor complete access to the user's data -- including the children's location, parent's full names, phone numbers and other personal identifiable information. Researchers with Pen Test Partners collaborated with security researcher Troy Hunt to test the attack. Hunt uploaded a video showing how the smartwatch vulnerability could be exploited to call his daughter -- and how her smartwatch would answer automatically without any interaction needed from her end.Read Replies (0)
By BeauHD from Slashdot's new-and-improved department
John Timmer from Ars Technica got a chance to take a look at Trek's new bicycle helmet that they claim offers "the first major change in helmet technology in years," and is backed up with peer-reviewed science. Here's an excerpt from Timmer's report: WaveCel is the product of orthopedic surgeon Steve Madey and a biomedical engineer named Michael Bottlang. The two had been working on a variety of ideas related to medical issues and protective gear, funded in part by federal grant money. When considering the idea of a lightweight material that could evenly distribute forces, Bottlang told Ars that they first focused on a honeycomb pattern. But they found that it was actually too robust -- the honeycomb wouldn't collapse until a lot of force had been applied, and then it would fail suddenly.
The design they eventually developed has a shape that allows flexing almost immediately when force is applied. "It starts to glide right away," Bottlang said. The manufacturing technique creates a clear point of failure that allows more extensive flexing once a certain level of force is exceeded -- part of the structure will fold over rather than experiencing a complete failure. Then, once folded, the polymer it's made of will allow neighboring cells to glide over each other. This provides some resistance even after the structure has collapsed. For the helmet, a patch of this material is attached to the inside of a more traditional EPS helmet, which provides impact resistance. But the WaveCel mesh is allowed to float within the helmet and can absorb much of the force of off-axis impacts. The thin strips of soft material that cushion the helmet where it rests on the head (also found in more traditional helmets) are attached directly to the WaveCel mesh.
< article continued at Slashdot's new-and-improved department
>Read Replies (0)
By BeauHD from Slashdot's upsetting-updates department
An anonymous reader quotes a report from The Verge: SpaceX successfully landed the center core of its Falcon Heavy rocket on a drone ship last week, but the vehicle accidentally fell into the ocean while in transit to the Florida coast. The company blamed the loss on choppy seas. "Over the weekend, due to rough sea conditions, SpaceX's recovery team was unable to secure the center core booster for its return trip to Port Canaveral," SpaceX said in a statement to The Verge. "As conditions worsened with eight to ten foot swells, the booster began to shift and ultimately was unable to remain upright. While we had hoped to bring the booster back intact, the safety of our team always takes precedence. We do not expect future missions to be impacted."
SpaceX does have ways to secure the rockets it lands in the ocean, including a robot known as the "octagrabber" that latches on to the base of the boosters. But because the center core connects to two side boosters, it has a different design than a normal Falcon 9 booster. So the octagrabber cannot hold on to it in the same way. The center core is a modified Falcon 9 booster -- one of three that make up the Falcon Heavy rocket -- which flew last week during the second flight of the Falcon Heavy. "Following takeoff, all three cores of the rocket successfully landed back on Earth: the two outer cores touched down on dual concrete landing pads at the Cape while the center core touched down on the company's drone ship named Of Course I Still Love You in the Atlantic," reports The Verge.Read Replies (0)
By BeauHD from Slashdot's it-was-fun-while-it-lasted department
As Google Fiber prepares to leave Louisville, Kentucky, Google has agreed to pay the city government $3.84 million to fix damage to city streets. "The payments, to be made over 20 months, will cover removing fiber cables and sealant from roads, milling and paving streets 'where needed' and removing Google's above-ground infrastructure," reports WDRB, citing a news release from Mayor Greg Fischer's office. From the report: Google Fiber also agreed to donate $150,000 to the Community Foundation of Louisville to support Metro's "digital inclusion" efforts, which include "refurbishing used computers for low-income individuals and the enrollment of public housing residents in low-cost internet access through other companies providing service in Louisville," according to the mayor's office. Google Fiber, a unit of the Silicon Valley tech giant, said Feb. 7 that it would abandon the Louisville market after running into too many problems with the micro-trenching technique it used to install its fiber-optic cables as shallow as two inches below the pavement surface of city streets. Louisville, which lobbied for years to get Google Fiber, has the distinction of being the first city to lose the super-fast internet service. The report notes that Google Fiber only reached a small slice of the city, estimating that the service was only available to, at most, about 11,000 households.Read Replies (0)
By msmash from Slashdot's security-woes department
A hacker who spoke with ZDNet in February about wanting to put up for sale the data of over one billion users is getting dangerously close to his goal after releasing another 65.5 million records last week and reaching a grand total of 932 million records overall. From a report: The hacker's name is Gnosticplayers, and he's responsible for the hacks of 44 companies, including last week's revelations. Since mid-February, the hacker has been putting batches of hacked data on Dream Market, a dark web marketplace for selling illegal products, such as guns, drugs, and hacking tools. He's released data from companies like 500px, UnderArmor, ShareThis, GfyCat, and MyHeritage, just to name the bigger names. Releases have been grouped in four rounds -- Round 1 (620 million user records), Round 2 (127 million user records), Round 3 (93 million user records), and Round 4 (26.5 million user records).Read Replies (0)
By msmash from Slashdot's dumb-as-a-rock department
American entertainment giant Starz is continuing to remove tweets that link to a TorrentFreak news report about leaked TV-shows. From a report: Last week we posted a news article documenting how several TV-show episodes had leaked online before their official release. Due to the leaks, complete seasons of unreleased TV-shows such as "The Spanish Princess," "Ramy," and "The Red Line," surfaced on pirate sites. In most cases, there were visible signs revealing that the leaks were sourced from promotional screeners. The leaks also hit Starz, as three then-unreleased episodes from its TV series "American Gods" appeared online as well. The American entertainment company was obviously not happy with that, but its response was rather unconventional.
Soon after the news was published, Starz issued a takedown request through The Social Element Agency, requesting Twitter to remove our tweet to our own article. Twitter was quick to comply and removed the tweet that supposedly infringed Starz copyrights. We disagreed. The article in question never linked to any infringing material. It did include a screenshot from a leaked episode, showing the screener watermarks, but those watermarks were central to the story, as we explained in a follow-up piece. The good news is that many legal scholars, journalists, and lawyers agree with our stance. The Electronic Frontier Foundation (EFF), for example, responded that Starz has no right to silence TorrentFreak and also shared that opinion on Twitter, where many others chimed in as well. That's when things started to spiral out of control. Starz takedown efforts only encouraged more people to share the original story about the leaks, which is a classic example of the 'Streisand Effect'. However, Starz didn't budge and issued takedown notices against those tweets as well.Read Replies (0)
By msmash from Slashdot's done-deal department
The European Commission, the European Union's executive body, has approved a long-gestating major reform to copyright law, which had already been passed by the European Parliament last month. From a report: The overhaul contains two controversial provisions that will make online platforms liable for illegal uploading of copyright-protected content on their sites, as well as force Google, Facebook and other digital companies to pay publishers for press articles they post online. "With today's agreement, we are making copyright rules fit for the digital age. Europe will now have clear rules that guarantee fair remuneration for creators, strong rights for users and responsibility for platforms," said European Commission president Jean-Claude Juncker. According to the French newspaper Le Monde, six countries -- Italy, Finland, Sweden, Luxembourg, Poland and the Netherlands -- voted again the reform.Read Replies (0)
By EditorDavid from Slashdot's recommended-pages department
An anonymous reader quotes a senior investigative researcher at the EFF:
Despite Facebook's repeated warnings that law enforcement is required to use "authentic identities" on the social media platform, cops continue to create fake and impersonator accounts to secretly spy on users. By pretending to be someone else, cops are able to sneak past the privacy walls users put up and bypass legal requirements that might require a warrant to obtain that same information...
EFF is now calling on Facebook to escalate the matter with law enforcement in the United States. Facebook should take the following actions to address the proliferation of fake/impersonator Facebook accounts operated by law enforcement, in addition to suspending the fake accounts.
- As part of its regular transparency reports, Facebook should publish data on the number of fake/impersonator law enforcement accounts identified, what agencies they belonged to, and what action was taken.
- When a fake/impersonator account is identified, Facebook should alert the users and groups that interacted with the account whether directly or indirectly.
The article also suggests updating Facebook's Terms of Service to explicitly prohibit fake/impersonator profiles by law enforcement groups, and updating Facebook pages of law enforcement groups to inform visitors when those groups have a written policy allowing fake/impersonator law enforcement accounts. "These four changes are relatively light lifts that would enhance transparency and establish real consequences for agencies that deliberately violate the rules..."
"Facebook's practice of taking down these individual accounts when they learn about them from the press (or from EFF) is insufficient to deter what we believe is a much larger iceberg beneath the surface."Read Replies (0)
By EditorDavid from Slashdot's power-plays department
An anonymous reader quotes the AP:
Volkswagen is planning to release a fully-electric SUV in China which could compete with Tesla's Model X. The German automaker said Sunday the ID. ROOMZZ will be unveiled at the upcoming Shanghai Auto Show and will be available in 2021. Volkswagen says the zero-emission vehicle can go approximately 450 kilometers (280 miles) before the battery has to be recharged.
Volkswagen also claims it will have "level 4 autonomous driving," Reuters reports, adding that this electric SUV "is the latest move in Volkswagen's aggressive growth strategy in China, where electric cars are given preferential treatment by authorities..." In fact, the company's chief executive says nearly half of VW's engineers are working on products for the China market, though the electric SUV will eventually be shipped to other markets. "We plan to produce more than 22 million electric cars in the next 10 years."
VW's head of e-mobility also tells Reuters that Volkswagen will convert eight of their factories to mass produce electric Volkswagens, and eight more factories to to mass-produce electric cars under a different brand.Read Replies (0)
By EditorDavid from Slashdot's multi-million-dollar-botnet department
Three Romanians ran a complicated online fraud operation -- along with a massive malware botnet -- for nine years, reports ZDNet, netting tens of millions of US dollars, but their crime spree is now over. But now they're all facing long prison sentences.
"The three were arrested in late 2016 after the FBI and Symantec had silently stalked their malware servers for years, patiently waiting for the highly skilled group to make mistakes that would leave enough of a breadcrumb trail to follow back to their real identities."
An anonymous Slashdot reader writes:
The group started from simple eBay scams [involving non-existent cars and even a fake trucking company] to running one of the most widespread keylogger trojans around. They were considered one of the most advanced groups around, using PGP email and OTR encryption when most hackers were defacing sites under the Anonymous moniker, and using multiple proxy layers to protect their infrastructure. The group operated tens of fake websites, including a Yahoo subsidiary clone, conned and stole money from their own money mules, and were of the first groups to deploy Bitcoin crypto-mining malware on desktops, when Bitcoin could still be mined on PCs.
The Bayrob group was led by one of Romania's top IT students, who went to the dark side and helped create a malware operation that took nine years for US authorities and the FBI to track and eventually take down. Before turning hacker, he was the coach of Romania's national computer science team, although he was still a student, and won numerous awards in programming and CS contests.Read Replies (0)