Toggle light / dark theme

Two instruments as concrete alternatives to social networks taking advantage of our privacy

Keeping up with Meta’s scandals could easily be a part-time job. All joking aside, the development of its worldwide network ramifications helped decrease communication distances between individuals with an average of three and a half degrees of separation between its members in 2016.

As a reminder, this network and its numerous variations, which certainly don’t need to be named anymor, have enabled us to:
· reach our friends, family members, business collaborators, or partners;
· create and join discussion groups;
· organize events;promote icons and content in very different formats.

The downside is that all of this became possible the moment we agreed to join the online club for free. The benefit of accessing brand new and efficient communication tools has left us with no choice but to keep returning to a highly segmented network (comprising both acquaintances and close friends). Such a network, which includes more and more of our “friends,” convinces us to never really read the terms and conditions (boring, right?).
Yet, they clearly involve the real-time sale of our personal profiles and predictable behaviors the moment we tick the boxes just to get in.

Using a free service is very different from being the unwitting provider of a value stream (via analytics data and advertising marketplaces). We act in good faith, as we would in real life, but often accept advertising as the only way to endorse our cultural preferences regarding this or that innovative trend (even when there is little innovation and mostly an unsustainable waste of our limited resources, namely time and attention).

Today, privacy advocates are also thrilled by the broad variety of initiatives enabling us to stop dissipating our shared moments between our interlocutors AND third parties interfering with our conversations. How do we progressively upgrade the software without requiring everybody (who feels like it could be a good idea, of course) to get on board? We’re facing quite a pickle here, perhaps not as hard as gluing back together large blocks of melting ice, but still not trivial when considered at scale.

Here are two technological ways to connect with your peers outside of the “normative ways”,
plus one relying on one of the oldest networks, email. Here are their respective slogans:
· Delta Chat — Chat over email with encryption,
like Telegram or messaging apps owned by Meta but without the tracking or central control — https://delta.chat/en/
· Element — Own your conversations — https://element.io
(Its underlying protocols are now used by the French state for some of its administration services)
· Signal — Privacy is the default — https://signal.org

I invite you to try them out, share your insights, and support their contributors. Social challenges won’t be solved solely by switching communication tools.
However, conversations remain conversations; the better the host, the more comfortable and safe we feel in preserving a discussion that is as open, honest, and respectful as possible.

Fungus provides powerful medicine in fighting honey bee viruses

In field trials, colonies fed mycelium extract from amadou and reishi fungi showed a 79-fold reduction in deformed wing virus and a 45,000-fold reduction in Lake Sinai virus compared to control colonies.

Though it’s in the early stages of development, the researchers see great potential in this research.

“Our greatest hope is that these extracts have such an impact on viruses that they may help varroa mites become an annoyance for bees, rather than causing huge devastation,” said Steve Sheppard, a WSU entomology professor and one of the paper’s authors. “We’re excited to see where this research leads us. Time is running out for bee populations and the safety and security of the world’s food supply hinges on our ability to find means to improve pollinator health.”

IBM researchers develop a technique to virtually patch vulnerabilities ahead of threat

Researchers at IBM have recently devised a new technique to virtually patch security vulnerabilities before they are found. Their approach, presented at the International Workshop on Information and Operational Technology, co-located with RAID18, leverages testing techniques for supervised learning-based data generation.

“While researching a solution to find security vulnerabilities in popular software, we paused to think about the following problem: We know practically and theoretically that it is impossible to find all vulnerabilities in an application, and the security community is in a constant race to discover those vulnerabilities in the hope of finding them before the bad guys do,” Fady Copty, lead researcher of the study, told TechXplore. “This means enforcing regulations and constantly deploying to systems.”

Deploying a on an application is a tedious and time-consuming task, which entails a series of steps: identifying the vulnerable version of the application, managing this , delivering the , deploying it and then restarting the application. Often, patches are deployed over long periods of time, hence can remain vulnerable for a period after a vulnerability has been discovered. To speed up this process, researchers have recently introduced virtual patches, which are enforced using intrusion detection and prevention systems.

Producing biofuels from algae

Microalgae are showing huge potential as a sustainable source of biofuels.

Producing biofuels from renewable sources.

Due to concerns about peak oil, energy security, fuel diversity and sustainability, there is great interest around the world in renewable sources of biofuels.

Microalgae are great candidates for sustainable production of biofuels and associated bioproducts:

Electromagnetic Pulse (EMP) Attack: A Preventable Homeland Security Catastrophe

A major threat to America has been largely ignored by those who could prevent it. An electromagnetic pulse (EMP) attack could wreak havoc on the nation’s electronic systems-shutting down power grids, sources, and supply mechanisms. An EMP attack on the United States could irreparably cripple the country. It could simultaneously inflict large-scale damage and critically limit our recovery abilities. Congress and the new Administration must recognize the significance of the EMP threat and take the necessary steps to protect against it.

Systems Gone Haywire

An EMP is a high-intensity burst of electromagnetic energy caused by the rapid acceleration of charged particles. In an attack, these particles interact and send electrical systems into chaos in three ways: First, the electromagnetic shock disrupts electronics, such as sensors, communications systems, protective systems, computers, and other similar devices. The second component has a slightly smaller range and is similar in effect to lightning. Although protective measures have long been established for lightning strikes, the potential for damage to critical infrastructure from this component exists because it rapidly follows and compounds the first component. The final component is slower than the previous two, but has a longer duration. It is a pulse that flows through electricity transmission lines-damaging distribution centers and fusing power lines. The combination of the three components can easily cause irreversible damage to many electronic systems.

Microsoft, Google Use Artificial Intelligence to Fight Hackers

Last year, Microsoft Corp.’s Azure security team detected suspicious activity in the cloud computing usage of a large retailer: One of the company’s administrators, who usually logs on from New York, was trying to gain entry from Romania. And no, the admin wasn’t on vacation. A hacker had broken in.

Microsoft quickly alerted its customer, and the attack was foiled before the intruder got too far.

Chalk one up to a new generation of artificially intelligent software that adapts to hackers’ constantly evolving tactics. Microsoft, Alphabet Inc.’s Google, Amazon.com Inc. and various startups are moving away from solely using older “rules-based” technology designed to respond to specific kinds of intrusion and deploying machine-learning algorithms that crunch massive amounts of data on logins, behavior and previous attacks to ferret out and stop hackers.

​Filipino IT experts hope NASA announces Space Challenge winners as U.S. government operations resume

This is the first time that an entry from the Philippines has made it to the global finalists. http://verafiles.org/articles/filipino-it-experts-hope-nasa-…lenge-winn #SpaceApps #SpaceAppsPH


Filipino Information Technology enthusiasts are hoping that the temporary reopening of U.S. government operations after a 35-day shutdown would pave the way for the announcement of the winners in the NASA Space Apps Challenge, where one of the finalists is an app developed by a group of Filipino IT experts.

The announcement of the winners in the global competition was supposed to have been made in mid-January but has suffered a delay due to the federal government shutdown caused by a standoff over border security.

The shutdown, which began last Dec. 21, ended on Friday after U.S. President Donald Trump signed into law a funding measure that will allow the reopening of government operations until Feb. 15.

/* */