New chip from Texas Instruments to make driving with high-beams on less rude

Adaptive driving beams still need a little regulatory help, though.

Enlarge / “New high-resolution DLP technology brings new capabilities to headlight systems,” Texas Instruments says. (credit: Texas Instruments)

Twice a year or so I drive from Denver to LA, and there's a stretch of highway in Utah that's pretty solitary at night. It's often outside of cell service, and barreling through the dark (no streetlights, of course) in a 2005 Toyota is tricky business. With my brights on, I've been able to see and slow down for elk grazing just 15 feet away from the highway. If one of them had decided to make a leap for the other side of the highway and I hadn't seen them beyond the curtain of darkness, both of us would have quickly been toast.

But that kind of driving requires a lot of vigilance, because you also don't want to blind oncoming truckers for equally serious safety reasons. So, if you do that stretch of highway at night, you end up spending 250 miles with a finger on the headlight post, keeping the brights on when you're alone, and turning them off when any headlights or taillights pop up on the horizon.

There are technological solutions for this problem (well, in new cars, maybe not in a 2005 hatchback). In Europe and Japan, adaptive driving beam (ADP) technology can throw light away from the field of view of oncoming traffic and reduce glare reflected off street signs.

Read 6 remaining paragraphs | Comments

Japan to get latest Aegis ballistic missile interceptors from US

SM-3 Block IIA missiles will be part of a shore-based Aegis missile defense.

Enlarge / An SM-3 interceptor is launched by the guided missile cruiser USS Lake Erie (CG 70) during a ballistic missile intercept test. This was the 27th consecutive kill of a test ICBM by the Aegis system. (credit: US Navy)

The US Defense Department's Defense Security Cooperation Agency (DSCA) announced on December 9 that the US government plans to allow the sale of four Raytheon Standard SM-3 Block IIA missiles and compatible Mk 29 launch canisters from BAE Systems to Japan. The estimated cost will be $133.3 million. The US State Department has approved the sale, and the DSCA has notified Congress of the pending sale.

The SM-3 Block IIA is the latest version of the US Navy's air defense missile, used by ships equipped with the Aegis Ballistic Missile Defense (Aegis BMD) system. The missiles can potentially be used to shoot down ballistic missiles in flight, even outside the Earth's atmosphere. In theory, the new missiles would give Japan a better shot at shooting down a ballistic missile arcing over Japan.

The sale comes on the heels of the Japanese National Diet's approval of a plan to build an Aegis Ashore missile defense system (the National Diet is Japan's parliamentary-style bicameral legislature). That system would be based on the land-based missile defense facilities the US Navy has deployed in Romania and is preparing to activate in Poland. Japan's only current land-based ballistic missile defense is the Patriot system, including Patriot Advanced Capability 3 missiles—and the PAC-3 is more of a point defense system, with much shorter range.

Read 2 remaining paragraphs | Comments

ECS introduces Liva Z2 fanless mini PC

ECS is updating is Liva line of tiny desktop computers with a new passively-cooled (fanless) system called the Liva Z2. It’s powered by an Intel Pentium Silver Gemini Lake processor, has a 2.5 inch drive bay for an SSD or hard drive, and supports…

ECS is updating is Liva line of tiny desktop computers with a new passively-cooled (fanless) system called the Liva Z2. It’s powered by an Intel Pentium Silver Gemini Lake processor, has a 2.5 inch drive bay for an SSD or hard drive, and supports HDMI 2.0. FanlessTech notes that the heat ink has been redesigned […]

ECS introduces Liva Z2 fanless mini PC is a post from: Liliputing

Hands-on with the eOneBook’s new dual-screen E Ink Manga reader

The eOneBook isn’t so much an electronic book reader as it is an electronic book. It opens and closes like a book. When it’s open there are dual E Ink displays, one on the left and another on the right. And it even comes with a book jacket….

The eOneBook isn’t so much an electronic book reader as it is an electronic book. It opens and closes like a book. When it’s open there are dual E Ink displays, one on the left and another on the right. And it even comes with a book jacket. But that’s not where the similarities end, […]

Hands-on with the eOneBook’s new dual-screen E Ink Manga reader is a post from: Liliputing

Hands-on with the eOneBook’s new dual-screen E Ink Manga reader

The eOneBook isn’t so much an electronic book reader as it is an electronic book. It opens and closes like a book. When it’s open there are dual E Ink displays, one on the left and another on the right. And it even comes with a book jacket….

The eOneBook isn’t so much an electronic book reader as it is an electronic book. It opens and closes like a book. When it’s open there are dual E Ink displays, one on the left and another on the right. And it even comes with a book jacket. But that’s not where the similarities end, […]

Hands-on with the eOneBook’s new dual-screen E Ink Manga reader is a post from: Liliputing

Chuwi’s CES 2018 lineup: Windows and Android tablets and GBox Pro mini PC

Chinese computer maker Chuwi is unveiling three new devices during this week’s Consumer Electronics Show. But only one was actually at the company’s booth when I stopped by today. It’s also the one we know the least about, since specs…

Chinese computer maker Chuwi is unveiling three new devices during this week’s Consumer Electronics Show. But only one was actually at the company’s booth when I stopped by today. It’s also the one we know the least about, since specs are still being finalized. That said, the new GBox Pro small form factor desktop computer […]

Chuwi’s CES 2018 lineup: Windows and Android tablets and GBox Pro mini PC is a post from: Liliputing

Chuwi’s CES 2018 lineup: Windows and Android tablets and GBox Pro mini PC

Chinese computer maker Chuwi is unveiling three new devices during this week’s Consumer Electronics Show. But only one was actually at the company’s booth when I stopped by today. It’s also the one we know the least about, since specs…

Chinese computer maker Chuwi is unveiling three new devices during this week’s Consumer Electronics Show. But only one was actually at the company’s booth when I stopped by today. It’s also the one we know the least about, since specs are still being finalized. That said, the new GBox Pro small form factor desktop computer […]

Chuwi’s CES 2018 lineup: Windows and Android tablets and GBox Pro mini PC is a post from: Liliputing

EMC, VMware security bugs throw gasoline on cloud security fire

Backups of virtual machines on some hosts could be accessed or altered by an attacker.

Enlarge (credit: Vladimir Godnik/Getty Images)

While everyone was screaming about Meltdown and Spectre, another urgent security fix was already in progress for many corporate data centers and cloud providers who use products from Dell's EMC and VMware units. A trio of critical, newly reported vulnerabilities in EMC and VMware backup and recovery tools—EMC Avamar, EMC NetWorker, EMC Integrated Data Protection Appliance, and vSphere Data Protection—could allow an attacker to gain root access to the systems or to specific files, or inject malicious files into the server's file system. These problems can only be fixed with upgrades.

The first of the vulnerabilities, designated in MITRE's Common Vulnerabilities and Exposures (CVE) list as CVE-2017-15548, allows an attacker to gain root access to the servers. This would potentially give someone direct access to backups on the server, allowing them to retrieve images of virtual machines, backed-up databases, and other data stored within the affected systems.

The second vulnerability, CVE-2017-15549, makes it possible for an attacker to potentially upload malicious files into "any location on the server file system" without authentication. And the third, CVE-2017-15550, is a privilege escalation bug that could allow someone with low-level authenticated access to access files within the server. The attacker could do this by using a Web request crafted to take advantage of "path traversal"—moving up and down within the directory structure of the file system used by the application.

Read 3 remaining paragraphs | Comments

FCC plan to lower broadband standards is met with “Mobile Only Challenge”

Many say that mobile can’t replace cable or fiber, but FCC may think otherwise.

Enlarge (credit: Getty Images | Maskot)

Broadband consumer advocates have launched a "Mobile Only Challenge" to show US regulators that cellular data should not be considered an adequate replacement for home Internet service.

The awareness campaign comes as the Federal Communications Commission is considering a change to the standard it uses to judge whether broadband is being deployed to all Americans in a reasonable and timely fashion. While FCC Chairman Ajit Pai hasn't released his final plan yet, the FCC may soon declare that America's broadband deployment problem is solved as long as everyone has access to either fast home Internet or cellular Internet service with download speeds of at least 10Mbps. That would be a change from current FCC policy, which says that everyone should have access to both mobile data and fast home Internet services such as fiber or cable.

"The FCC wants to lower broadband standards," organizers of the Mobile Only Challenge say on the campaign's website. "Pledge to spend one day in January 2018 accessing the Internet only on your mobile device to tell them that's not OK."

Read 23 remaining paragraphs | Comments

Judge Issues Devastating Order Against BitTorrent Copyright Troll

A Washington District Court has issued a devastating order against a copyright holder of the film “Once Upon a Time in Venice,” which chases alleged BitTorrent pirates for cash settlements. The Court points out that one of their experts is unqualified, doubts whether declarants even exist, and highlights that IP-address evidence may have been obtained illegally.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons

In recent years, file-sharers around the world have been pressured to pay significant settlement fees, or face legal repercussions.

These so-called “copyright trolling” efforts have been a common occurrence in the United States since the turn of the last decade.

Increasingly, however, courts are growing weary of these cases. Many districts have turned into no-go zones for copyright trolls and the people behind Prenda law were arrested and are being prosecuted in a criminal case.

In the Western District of Washington, the tide also appears to have turned. After Venice PI, a copyright holder of the film “Once Upon a Time in Venice”, sued a man who later passed away, concerns were raised over the validity of the evidence.

Venice PI responded to the concerns with a declaration explaining its data gathering technique and assuring the Court that false positives are out of the question.

That testimony didn’t help much though, as a recently filed minute order shows this week. The order applies to a dozen cases and prohibits the company from reaching out to any defendants until further notice, as there are several alarming issues that have to be resolved first.

One of the problems is that Venice PI declared that it’s owned by a company named Lost Dog Productions, which in turn is owned by Voltage Productions. Interestingly, these companies don’t appear in the usual records.

“A search of the California Secretary of State’s online database, however, reveals no registered entity with the name ‘Lost Dog’ or ‘Lost Dog Productions’,” the Court notes.

“Moreover, although ‘Voltage Pictures, LLC’ is registered with the California Secretary of State, and has the same address as Venice PI, LLC, the parent company named in plaintiff’s corporate disclosure form, ‘Voltage Productions, LLC,’ cannot be found in the California Secretary of State’s online database and does not appear to exist.”

In other words, the company that filed the lawsuit, as well as its parent company, are extremely questionable.

While the above is a reason for concern, it’s just the tip of the iceberg. The Court not only points out administrative errors, but it also has serious doubts about the evidence collection process. This was carried out by the German company MaverickEye, which used the tracking technology of another German company, GuardaLey.

GuardaLey CEO Benjamin Perino, who claims that he coded the tracking software, wrote a declaration explaining that the infringement detection system at issue “cannot yield a false positive.” However, the Court doubts this statement and Perino’s qualifications in general.

“Perino has been proffered as an expert, but his qualifications consist of a technical high school education and work experience unrelated to the peer-to-peer file-sharing technology known as BitTorrent,” the Court writes.

“Perino does not have the qualifications necessary to be considered an expert in the field in question, and his opinion that the surveillance program is incapable of error is both contrary to common sense and inconsistent with plaintiff’s counsel’s conduct in other matters in this district. Plaintiff has not submitted an adequate offer of proof”

It seems like the Court would prefer to see an assessment from a qualified independent expert instead of the person who wrote the software. For now, this means that the IP-address evidence, in these cases, is not good enough. That’s quite a blow for the copyright holder.

If that wasn’t enough the Court also highlights another issue that’s possibly even more problematic. When Venice PI requested the subpoenas to identify alleged pirates, they relied on declarations from Daniel Arheidt, a consultant for MaverickEye.

These declarations fail to mention, however, that MaverickEye has the proper paperwork to collect IP addresses.

“Nowhere in Arheidt’s declarations does he indicate that either he or MaverickEye is licensed in Washington to conduct private investigation work,” the order reads.

This is important, as doing private investigator work without a license is a gross misdemeanor in Washington. The copyright holder was aware of this requirement because it was brought up in related cases in the past.

“Plaintiff’s counsel has apparently been aware since October 2016, when he received a letter concerning LHF Productions, Inc. v. Collins, C16-1017 RSM, that Arheidt might be committing a crime by engaging in unlicensed surveillance of Washington citizens, but he did not disclose this fact to the Court.”

The order is very bad news for Venice PI. The company had hoped to score a few dozen easy settlements but the tables have now been turned. The Court instead asks the company to explain the deficiencies and provide additional details. In the meantime, the copyright holder is urged not to spend or transfer any of the settlement money that has been collected thus far.

The latter indicates that Venice PI might have to hand defendants their money back, which would be pretty unique.

The order suggests that the Judge is very suspicious of these trolling activities. In a footnote there’s a link to a Fight Copyright Trolls article which revealed that the same counsel dismissed several cases, allegedly to avoid having IP-address evidence scrutinized.

Even more bizarrely, in another footnote the Court also doubts if MaverickEye’s aforementioned consultant, Daniel Arheidt, actually exists.

“The Court has recently become aware that Arheidt is the latest in a series of German declarants (Darren M. Griffin, Daniel Macek, Daniel Susac, Tobias Fieser, Michael Patzer) who might be aliases or even fictitious.

“Plaintiff will not be permitted to rely on Arheidt’s declarations or underlying data without explaining to the Court’s satisfaction Arheidt’s relationship to the above-listed declarants and producing proof beyond a reasonable doubt of Arheidt’s existence,” the court adds.

These are serious allegations, to say the least.

If a copyright holder uses non-existent companies and questionable testimony from unqualified experts after obtaining evidence illegally to get a subpoena backed by a fictitious person….something’s not quite right.

A copy of the minute order, which affects a series of cases, is available here (pdf).

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons