By EditorDavid from Slashdot's from-flush-to-flushed department
An anonymous reader quotes The Wall Street Journal:
Eighteen months ago, Beepi Inc. was rapidly expanding its online used-car business to 16 U.S. cities where people could buy cut-rate vehicles adorned with giant shiny bows. Beepi doesn't exist anymore. After burning through more than $120 million in capital, the startup failed to raise more cash and shut down in February. Its roughly 270 employees cleared out of the cavernous Mountain View, California headquarters, leaving behind the ping-pong table and putting green.
Beepi's rapid demise offers a glimpse into the changing fortunes of Silicon Valley startups, many of which have struggled to adjust since a two-year investment frenzy came to an end. In 2014 and 2015, mutual funds, hedge funds and other investors pumped billions into companies that they now see as overvalued, and unlikely to pull off an initial public offering. As venture capitalists became more discerning, investment in U.S. tech startups plummeted by 30% in dollar terms last year from a year earlier.
The article also points out that "much of the money still being invested is pouring into the upper echelon of highly valued start-ups like Airbnb and WeWork or younger ones with clear paths to profit," leaving "scores" of previously well-funded startups now struggling to survive.Read Replies (0)
By EditorDavid from Slashdot's no-more-secrets department
Bruce66423 brings word that a terrorist's WhatsApp message has been decrypted "using techniques that 'cannot be disclosed for security reasons', though 'sources said they now have the technical expertise to repeat the process in future.'" The Economic Times reports:
U.K. security services have managed to decode the last message sent out by Khalid Masood before he rammed his high-speed car into pedestrians on Westminster Bridge and stabbed to death a police officer at the gates of Parliament on March 22. The access to Masood's message was achieved by what has been described by security sources as a use of "human and technical intelligence"...
The issue of WhatsApp's encrypted service, which is closed to anyone besides the sender and recipient, had come under criticism soon after the attack. "It's completely unacceptable. There should be no place for terrorists to hide. We need to make sure that organisations like WhatsApp, and there are plenty of others like that, don't provide a secret place for terrorists to communicate with each other," U.K. home secretary Amber Rudd had said.
Security sources say the message showed the victim's motive was military action in Muslim countries, while the article adds that though ISIS claimed responsibility for the attack, "no evidence has emerged to back this up."Read Replies (0)
By EditorDavid from Slashdot's revision-history department
Nine hours ago, Ilgaz wrote:
The Turkey Blocks monitoring network has verified restrictions affecting the Wikipedia online encyclopedia in Turkey. A block affecting all language editions of the website [was] detected at 8:00AM local time Saturday 29 April. The loss of availability is consistent with internet filters used to censor content in the country.
Access to Wikipedia has been blocked in Turkey as a result of "a provisional administrative order" imposed by the Turkish Telecommunications Authority (BTK)... Turkey Blocks said an administrative blocking order is usually expected to precede a full court blocking order in coming days. While the reason for the order was unknown early on Saturday, a statement on the BTK's website said: "After technical analysis and legal consideration based on the Law Nr. 5651, ADMINISTRATION MEASURE has been taken for this website (wikipedia.org) according to Decision Nr. 490.05.01.2017.-182198 dated 29/04/2017 implemented by Information and Communication Technologies Authority."
The BBC adds reports from Turkish media that authorities "had asked Wikipedia to remove content by writers 'supporting terror.'"Read Replies (0)
By BeauHD from Slashdot's unintended-consequences department
sciencehabit quotes a report from Science Magazine: Your wireless router may be giving you away in a manner you never dreamed of. For the first time, physicists have used radio waves from a Wi-Fi transmitter to encode a 3D image of a real object in a hologram similar to the image of Princess Leia projected by R2D2 in the movie Star Wars. In principle, the technique could enable outsiders to "see" the inside of a room using only the Wi-Fi signals leaking out of it, although some researchers say such spying may be easier said than done. Their experiment relies on none of the billions of digital bits of information encoded in Wi-Fi signals, just the fact that the signals are clean, "coherent" waves. However, instead of recording the key interference pattern on a photographic plate, the researchers record it with a Wi-Fi receiver and reconstruct the object in a computer. They placed a Wi-Fi transmitter in a room, 0.9 meters behind the cross. Then they placed a standard Wi-Fi receiver 1.4 meters in front of the cross and moved it slowly back and forth to map out a "virtual screen" that substituted for the photographic plate. Also, instead of having a separate reference beam coming straight to the screen, they placed a second, stationary receiver a few meters away, where it had a direct view of the emitter. For each point on the virtual screen, the researchers compared the signals arriving simultaneously at both receivers, and made a hologram by mapping the delays caused by the aluminum cross. The virtual hologram isn't exactly like a traditional one, as researchers can't recover the image of the object by shining more radio waves on it. Instead, the scientists used the computer to run the radio waves backward in time from the screen to the distance where wave fronts hit the object. The cross then popped out.Read Replies (0)
By BeauHD from Slashdot's straight-out-of-science-fiction-novel department
Sergio Canavero, the Italian surgeon who plans to perform the world's first human head transplant within the next year, says he is preparing to reawaken cryogenically frozen brains and transplant them into someone else's skull. "In an interview with a German-language magazine, Canavero says he will attempt to bring the first brains frozen in liquid nitrogen at an Arizona-based cryogenics bank back to life 'not in 100 years,' but three years at the latest," reports National Post. From the report: Transplanting a brain only -- and not an entire head -- gets around formidable rejection issues, Canavero said, since there will be no need to reconnect and stitch up severed vessels, nerves, tendons and muscles as there is when a new head is fused onto a brain-dead donor body. Canavero allows that one "problematic" issue with brain transplants, however, would be that "no aspect of your original external body remains the same." "Your head is no longer there, your brain is transplanted into an entirely different skull," he told OOOM magazine, published by the same company that handles the Italian brain surgeon's public relations. The flamboyant neuroscientist who some ethicists have decried as "nuts" rattled the transplant world when he first outlined his plans for a human head transplant two years ago in the journal, Surgical Neurology International. Bioethicist Arthur Caplan called Canavero's latest proposal to merge head transplants with "resurrecting" the frozen dead beyond ridiculous. "People have their own doubts about whether anything can be salvaged from these frozen heads or bodies because of the damage freezing does," said Caplan, head of ethics at NYU Langone Medical Centre in New York City. "Then saying that he has some technique for making this happen, that has never been demonstrated in frozen animals, is absurd."Read Replies (0)
By BeauHD from Slashdot's be-afraid-be-very-afraid department
An anonymous reader writes: "Mobile applications that open ports on Android smartphones are opening those devices to remote hacking, claims a team of researchers from the University of Michigan," reports Bleeping Computer. Researchers say they've identified 410 popular mobile apps that open ports on people's smartphones. They claim that an attacker could connect to these ports, which in turn grant access to various phone features, such as photos, contacts, the camera, and more. This access could be leveraged to steal photos, contacts, or execute commands on the target's phone. Researchers recorded various demos to prove their attacks. Of these 410 apps, there were many that had between 10 and 50 million downloads on the official Google Play Store and even an app that came pre-installed on an OEMs smartphones. "Research on the mobile open port problem started after researchers read a Trend Micro report from 2015 about a vulnerability in the Baidu SDK, which opened a port on user devices, providing an attacker with a way to access the phone of a user who installed an app that used the Baidu SDK," reports Bleeping Computer. "That particular vulnerability affected over 100 million smartphones, but Baidu moved quickly to release an update. The paper detailing the team's work is entitled Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications, and was presented Wednesday, April 26, at the 2nd IEEE European Symposium on Security and Privacy that took place this week in Paris, France."Read Replies (0)
By BeauHD from Slashdot's time-is-ticking department
An anonymous reader quotes a report from Seattle Times: Harvesting Washington state's vast fruit orchards each year requires thousands of farmworkers, and many of them work illegally in the United States. That system eventually could change dramatically as at least two companies are rushing to get robotic fruit-picking machines to market. The robotic pickers don't get tired and can work 24 hours a day. FFRobotics and Abundant Robotics, of Hayward, California, are racing to get their mechanical pickers to market within the next couple of years. Members of the $7.5 billion annual Washington agriculture industry have long grappled with labor shortages, and depend on workers coming up from Mexico each year to harvest many crops. While financial details are not available, the builders say the robotic pickers should pay for themselves in two years. That puts the likely cost of the machines in the hundreds of thousands of dollars each. FFRobotics is developing a machine that has three-fingered grips to grab fruit and twist or clip it from a branch. The machine would have between four and 12 robotic arms, and can pick up to 10,000 apples an hour, Gad Kober, a co-founder of Israel-based FFRobotics, said. One machine would be able to harvest a variety of crops, taking 85 to 90 percent of the crop off the trees, Kober said. Humans could pick the rest. Abundant Robotics is working on a picker that uses suction to vacuum apples off trees.Read Replies (0)
By BeauHD from Slashdot's rules-of-the-road department
Tesla and Apple have asked the state of California to change its proposed policies on self-driving cars to allow companies to test vehicles without traditional steering wheels and controls or human back-up drivers, among other things. Reuters reports: In a letter made public Friday, Apple made a series of suggested changes to the policy that is under development and said it looks forward to working with California and others "so that rapid technology development may be realized while ensuring the safety of the traveling public." Waymo, the self-driving car unit of Google parent company Alphabet Inc, Ford Motor Co, Uber Technologies Inc, Toyota Motor Corp, Tesla Motors Inc and others also filed comments suggesting changes. Apple said California should revise how companies report self-driving system "disengagements." California currently requires companies to report how many times the self-driving system was deactivated and control handed back to humans because of a system failure or a traffic, weather or road situation that required human intervention. Apple said California's rules for development vehicles used only in testing could "restrict both the design and equipment that can be used in test vehicles." Tesla said California should not bar testing of autonomous vehicles that are 10,000 pounds (4,535 kg) or more. Tesla also said California should not prohibit the sale of non-self-driving vehicles previously used for autonomous vehicle testing.Read Replies (0)
By BeauHD from Slashdot's steady-as-we-go department
An anonymous reader quotes a report from The Verge: Amazon is trying to make its Alexa voice assistant sound more humanlike. Up until now, the female-sounding voice maintained an even, monotone cadence whenever speaking, but with Amazon's new Speech Synthesis Markup Language that the company introduced this week, Alexa can whisper, vary its speaking speed, and bleep out words. Developers can also add pauses, change the pronunciation of a word, spell a word out, add audio snippets, and insert special words and phrases into their skill. The Verge notes that "the language markups are [only] available to developers in the U.S., U.K. and Germany." Amazon will also be hosting a webinar on May 18th on the new code.Read Replies (0)
By msmash from Slashdot's security-woes department
A US online pet store has exposed the details of more than 110,400 credit cards used to make purchases through its website, researchers have found. From a report on ZDNet: In a stunning show of poor security, the Austin, TX-based company FuturePets.com exposed its entire customer database, including names, postal and email addresses, phone numbers, credit card information, and plain-text passwords. Several customers that we reached out to confirmed some of their information when it was provided by ZDNet, but did not want to be named. The database was exposed because of the company's own insecure server and use of "rsync," a common protocol used for synchronizing copies of files between two different computers, which wasn't protected with a username or password.Read Replies (0)