Blue roads and glowing signs—how this startup’s tech lets cars see the world

Civil Maps is one of the more exciting companies helping to build mobility infrastructure.

Enlarge (credit: Aurich / Getty)

In the past couple of years, a number of intersecting trends in the automotive and technology worlds have come to be grouped together as mobility. This is not a reference to an IoT-enabled version of those scooters you see people riding at the grocery store but is instead a catch-all covering electric vehicles, self-driving vehicles, and ride-hailing services—either on their own or packaged together. It's shorthand for a vision of the future where traffic jams and traffic deaths are a thing of the past, as are carbon emissions and maybe even car ownership. Some of that stuff is still decades away from widespread deployment, and a lot of infrastructure—both physical and digital—needs to be built to get us there. One company with a particularly fresh approach to doing that is a startup called Civil Maps.

A car needs to be able to do several things in order to be fully autonomous. First, it has to know exactly where it is, where it's supposed to go, and the route it needs to take. It ought to know its location to within a few centimeters, because no one likes it when you drive on the wrong side of the road or park on a sidewalk. So we need very accurate maps, ones much more precise than the trusty road atlas or the turn-by-turn directions we now get from the likes of Google and Apple. What's more, the entire road network—which amounts to more than 2.5 million miles of paved roads in the US—can't just be mapped once or even once a month. The initial base map has to be updated constantly to reflect potholes and road closures and all the other obstacles that a vehicle might encounter.

Next, the car has to be able to perceive its environment. That ability will require each car to carry an array of sensors, the data from which will be fused together. We're more risk-averse when it comes to trusting our lives to machines than we are other humans, so plenty of redundancy is warranted. And fusing the input from a mix of sensor types—lidar, radar, optical cameras, and so on—should give the car a better picture of the world around it than we can get from our eyes and ears.

Read 15 remaining paragraphs | Comments

Studie: Computerspielen kann Lernerfolge bringen

Wer spielt, hat Vorteile beim Verknüpfen von Lerninhalten und bei der Speicherung im Langzeitgedächtnis – das zeigt eine Studie der Universität Bochum. Games könnten auch positive Auswirkungen im Alter haben – allerdings ist dieses Studienergebnis nicht unumstritten. (Games, Studie)

Wer spielt, hat Vorteile beim Verknüpfen von Lerninhalten und bei der Speicherung im Langzeitgedächtnis - das zeigt eine Studie der Universität Bochum. Games könnten auch positive Auswirkungen im Alter haben - allerdings ist dieses Studienergebnis nicht unumstritten. (Games, Studie)

Top 10 Most Pirated Movies of The Week on BitTorrent – 10/09/17

The top 10 most downloaded movies on BitTorrent are in again. ‘Spider-Man: Homecoming’ tops the chart this week, followed by ‘War for the Planet of the Apes’. ‘Baby Driver’ completes the top three.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

This week we have three newcomers in our chart.

Spider-Man: Homecoming is the most downloaded movie for the second week in a row.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This week’s most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (1) Spider-Man: Homecoming 7.8 / trailer
2 (9) War for the Planet of the Apes 7.8 / trailer
3 (2) Baby Driver 8.0 / trailer
4 (3) Pirates of the Caribbean: Dead Men Tell No Tales 6.9 / trailer
5 (4) Transformers: The Last Knight 5.2 / trailer
6 (…) 6 Days 6.1 / trailer
7 (7) Wonder Woman 8.2 / trailer
8 (4) Despicable Me 3 6.4 / trailer
9 (…) The Dark Tower 5.9 / trailer
10 (8) Hitman’s Bodyguard 7.2 / trailer

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Passwortmanager im Vergleich: Das letzte Passwort, das du dir jemals merken musst

Menschen scheinen nicht dafür gemacht, sich sehr viele komplizierte Passwörter zu merken. Abhilfe schaffen Passwortmanager. Wir haben die Lösungen von Keepass, Lastpass, 1Password und Dashlane verglichen – und bei allen Stärken gefunden. Ein Test von Hauke Gierow (Passwort, Paypal)

Menschen scheinen nicht dafür gemacht, sich sehr viele komplizierte Passwörter zu merken. Abhilfe schaffen Passwortmanager. Wir haben die Lösungen von Keepass, Lastpass, 1Password und Dashlane verglichen - und bei allen Stärken gefunden. Ein Test von Hauke Gierow (Passwort, Paypal)

Auto: Renault setzt auf Elektroautos

In fünf Jahren soll die Hälfte der Modelle von Renault einen alternativen Antrieb haben. Der französische Hersteller erwartet, dass vor allem in China seine Elektroautos Erfolg haben werden. (Renault, Elektroauto)

In fünf Jahren soll die Hälfte der Modelle von Renault einen alternativen Antrieb haben. Der französische Hersteller erwartet, dass vor allem in China seine Elektroautos Erfolg haben werden. (Renault, Elektroauto)

Teachable Machine: Googles Beispielprogramm erklärt Machine Learning im Browser

Drei Klassen und eine Webcam: Teachable Machine ist ein kleines Programm von Google, mit dem Nutzer das Konzept von maschinellem Lernen verstehen sollen. Es nutzt dazu die quelloffene Bibliothek Deeplearn.js. Das Besondere: Es funktioniert lokal im Browser statt über die Cloud. (Maschinelles Lernen, Google)

Drei Klassen und eine Webcam: Teachable Machine ist ein kleines Programm von Google, mit dem Nutzer das Konzept von maschinellem Lernen verstehen sollen. Es nutzt dazu die quelloffene Bibliothek Deeplearn.js. Das Besondere: Es funktioniert lokal im Browser statt über die Cloud. (Maschinelles Lernen, Google)

PureVPN Logs Helped FBI Net Alleged Cyberstalker

A Massachusetts man was arrested late last week on suspicion of conducting a cyberstalking campaign against a female former roommate, her friends, and family. Court documents reveal that logs, obtained by the FBI from privacy service PureVPN, helped the prosecution. Until now, PureVPN had always maintained it carried no logs – almost.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Last Thursday, Ryan S. Lin, 24, of Newton, Massachusetts, was arrested on suspicion of conducting “an extensive cyberstalking campaign” against his former roommate, a 24-year-old Massachusetts woman, as well as her family members and friends.

According to the Department of Justice, Lin’s “multi-faceted campaign of computer hacking and cyberstalking” began in April 2016 when he began hacking into the victim’s online accounts, obtaining personal photographs, sensitive information about her medical and sexual histories, and other private details.

It’s alleged that after obtaining the above material, Lin distributed it to hundreds of others. It’s claimed he created fake online profiles showing the victim’s home address while soliciting sexual activity. This caused men to show up at her home.

“Mr. Lin allegedly carried out a relentless cyber stalking campaign against a young woman in a chilling effort to violate her privacy and threaten those around her,” said Acting United States Attorney William D. Weinreb.

“While using anonymizing services and other online tools to avoid attribution, Mr. Lin harassed the victim, her family, friends, co-workers and roommates, and then targeted local schools and institutions in her community. Mr. Lin will now face the consequences of his crimes.”

While Lin awaits his ultimate fate (he appeared in U.S. District Court in Boston Friday), the allegation he used anonymization tools to hide himself online but still managed to get caught raises a number of questions. An affidavit submitted by Special Agent Jeffrey Williams in support of the criminal complaint against Lin provides most of the answers.

Describing Lin’s actions against the victim as “doxing”, Williams begins by noting that while Lin was the initial aggressor, the fact he made the information so widely available raises the possibility that other people got involved with malicious acts later on. Nevertheless, Lin remains the investigation’s prime suspect.

According to the affidavit, Lin is computer savvy having majored in computer science. He allegedly utilized a number of methods to hide his identity and IP address, including TOR, Virtual Private Network (VPN) services and email providers that “do not maintain logs or other records.”

But if that genuinely is the case, how was Lin caught?

First up, it’s worth noting that plenty of Lin’s aggressive and stalking behaviors towards the victim were demonstrated in a physical sense, offline. In that respect, it appears the authorities already had him as the prime suspect and worked back from there.

In one instance, the FBI examined a computer that had been used by Lin at a former workplace. Although Windows had been reinstalled, the FBI managed to find Google Chrome data which indicated Lin had viewed articles about bomb threats he allegedly made. They were also able to determine he’d accessed the victim’s Gmail account and additional data suggested that he’d used a VPN service.

“Artifacts indicated that PureVPN, a VPN service that was used repeatedly in the cyberstalking scheme, was installed on the computer,” the affidavit reads.

From here the Special Agent’s report reveals that the FBI received cooperation from Hong Kong-based PureVPN.

“Significantly, PureVPN was able to determine that their service was accessed by the same customer from two originating IP addresses: the RCN IP address from the home Lin was living in at the time, and the software company where Lin was employed at the time,” the agent’s affidavit reads.

Needless to say, while this information will prove useful to the FBI’s prosecution of Lin, it’s also likely to turn into a huge headache for the VPN provider. The company claims zero-logging, which clearly isn’t the case.

“PureVPN operates a self-managed VPN network that currently stands at 750+ Servers in 141 Countries. But is this enough to ensure complete security?” the company’s marketing statement reads.

“That’s why PureVPN has launched advanced features to add proactive, preventive and complete security. There are no third-parties involved and NO logs of your activities.”

PureVPN privacy graphic

However, if one drills down into the PureVPN privacy policy proper, one sees the following:

Our servers automatically record the time at which you connect to any of our servers. From here on forward, we do not keep any records of anything that could associate any specific activity to a specific user. The time when a successful connection is made with our servers is counted as a ‘connection’ and the total bandwidth used during this connection is called ‘bandwidth’. Connection and bandwidth are kept in record to maintain the quality of our service. This helps us understand the flow of traffic to specific servers so we could optimize them better.

This seems to match what the FBI says – almost. While it says it doesn’t log, PureVPN admits to keeping records of when a user connects to the service and for how long. The FBI clearly states that the service also captures the user’s IP address too. In fact, it appears that PureVPN also logged the IP address belonging to another VPN service (WANSecurity) that was allegedly used by Lin to connect to PureVPN.

That record also helped to complete another circle of evidence. IP addresses used by
Kansas-based WANSecurity and Secure Internet LLC (servers operated by PureVPN) were allegedly used to access Gmail accounts known to be under Lin’s control.

Somewhat ironically, this summer Lin took to Twitter to criticize VPN provider IPVanish (which is not involved in the case) over its no-logging claims.

“There is no such thing as a VPN that doesn’t keep logs,” Lin said. “If they can limit your connections or track bandwidth usage, they keep logs.”

Or, in the case of PureVPN, if they log a connection time and a source IP address, that could be enough to raise the suspicions of the FBI and boost what already appears to be a pretty strong case.

If convicted, Lin faces up to five years in prison and three years of supervised release.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Nintendo: Hack erlaubt Installation eigener ROMs auf SNES Classic Mini

Kurz nach der Veröffentlichung des SNES Classic Mini lassen sich per Hack eigene Spiele auf dem Gerät installieren. Das ist nicht besonders aufwendig – aber wegen des schwierigen Ersatzes im Schadensfall dennoch ein größeres Risiko. (Nintendo, Games)

Kurz nach der Veröffentlichung des SNES Classic Mini lassen sich per Hack eigene Spiele auf dem Gerät installieren. Das ist nicht besonders aufwendig - aber wegen des schwierigen Ersatzes im Schadensfall dennoch ein größeres Risiko. (Nintendo, Games)

Smartphones: Microsoft plant nichts Neues für Windows 10 Mobile

Microsoft wird keine neuen Funktionen mehr für Windows 10 Mobile bringen. Die Plattform wird nur noch mit Sicherheitsupdates und Fehlerkorrekturen versorgt. Privatnutzern empfiehlt Microsoft den Wechsel zu anderen Plattformen. (Windows 10 Mobile, Smartphone)

Microsoft wird keine neuen Funktionen mehr für Windows 10 Mobile bringen. Die Plattform wird nur noch mit Sicherheitsupdates und Fehlerkorrekturen versorgt. Privatnutzern empfiehlt Microsoft den Wechsel zu anderen Plattformen. (Windows 10 Mobile, Smartphone)