New NES controllers headline announcement-filled Nintendo Switch presentation

$60 pack, plus other big Switch news: Animal Crossing, Luigi’s Mansion 3 in 2019.

Nintendo

After a delay in light of a Japanese earthquake, Nintendo's latest Direct video presentation finally went live on Thursday evening, and it included confirmations of long-rumored games and ports for the Nintendo Switch—along with a surprise NES controller pack launching next week.

Coming September 18, the same day as the new paid Nintendo Switch Online service, the NES Controllers two-pack will be sold exclusively at Nintendo.com for $59.99—and you'll need to be a paying Switch Online subscriber to place an order. These controllers connect wirelessly to Switch consoles, and they also include latches to hook to the sides of a Switch console, but Nintendo advertises this solely as a controller-charging feature. Meaning, you won't be able to use these NES controllers in traditional Switch games—particularly when you might prefer a traditional D-pad over the Joy-Cons' clicky buttons.

Read 10 remaining paragraphs | Comments

Here are your 2018 Ig Nobel Prize winners

The 2018 awards honor research on cursing while driving and cannibalistic calories.

Article intro image

Enlarge / A "Moment of Science" from the 2017 Ig Nobel ceremony featured a demonstration of wave phenomena. (credit: Alexey Eliseev/Improbable Research)

Ever wondered why so many people don't read instruction manuals, or how how many calories are in the human body? Or whether stabbing a voodoo doll representing your horrible boss with pins could help reduce workplace tension? The winners of this year's Ig Nobel Prizes have got you covered. These and other unusual research topics were honored tonight in a ceremony at Harvard University's Sanders Theater.

Established in 1991, the Ig Nobels are a good-natured parody of the Nobel Prizes, honoring "achievements that first make people laugh, and then make them think." The prizes have always been perceived as a celebration of scientific silliness, an impression strengthened by the unapologetically campy awards ceremony. The festivities feature mini-operas, scientific demos, and the 24/7 lectures, whereby experts must explain their work twice: once in 24 seconds, and the second in just seven words. Acceptance speeches are limited to 60 seconds, strictly enforced by an eight-year-old girl nicknamed "Miss Sweetie-Poo," who will interrupt those who exceed the time limit by repeating, "Please stop. I'm bored." Until they stop.

It's all in good dorky fun. But there's also a serious side to the Ig Nobels. The research being honored might seem ridiculous at first glance, but that doesn't mean it is devoid of scientific merit. Take the 2006 Ig Nobel for physics, awarded to French researchers for investigating why dry spaghetti often breaks into more than two pieces when it is bent. That work led to a new bendy paintbrush in Adobe Illustrator 5. More importantly, studying how cracks form and spread in various kinds of materials is critical to detecting imminent failure in, say, bridge spans or human bones. Just last month MIT physicists published a follow-up paper. But more people are likely to read about breaking spaghetti than peruse an academic paper entitled "Controlling fracture cascades through twisting and quenching."

Read 25 remaining paragraphs | Comments

Trump’s solar tariff isn’t hurting the industry as much as everyone expected

Utilities are trying to add tons of solar before a key tax credit phases out.

A row of solar panels in a grassy field.

Enlarge / Solar panels, Ferrisburgh, Vermont, June 15, 2016. (credit: Robert Nickelsberg/Getty Images)

On Thursday, the Solar Energy Industries Association (SEIA) published a quarterly report that offered surprising results. Despite a 30-percent tariff on solar cells and modules imported to the US, solar installations only fell by about nine percent, year over year.

At the same time, during the first half of 2018, utilities signed more than 8.5 gigawatts' worth of procurement deals for projects that will be completed before 2020. The effect is that US solar installment growth in 2018 and 2019 will likely remain flat year over year compared to 2017. That's better than most analysts expected.

There are a few reasons that President Trump's tariffs haven't had as much of an effect as they could have. According to Abigail Ross Hopper, SEIA's president and CEO, "the solar industry is simply too strong to be kept down." That's perhaps an overly rosy way of looking at it. The report itself notes that a lot of this growth comes from the fact that the US offers a 30-percent investment tax credit on solar installations that are completed before 2020. Tariffs or no, companies wanting to build panels stand to save a significant amount of money if they start building before the end of 2019 and snag that tax credit.

Read 3 remaining paragraphs | Comments

Sperm donor #2757 sired at least 45 kids—now they’re connecting online

DNA testing, online registries highlight complexity of lax sperm-donor regulations.

Little white swimmers against a black background.

Enlarge (credit: Getty | Sciepro)

Half-siblings conceived with donated sperm and eggs are connecting online using DNA testing and online registries, forming extraordinarily large genetic families with dozens to hundreds of children linked to one parent, The Washington Post reports.

The modern family ties and genetic sleuthing are making it easier for donor-conceived children to learn about their backgrounds—and harder for anonymous donors to maintain anonymity. That has clearly been proven in tragic cases in which fertility doctors misled patients about their donor’s identity, even using their own sperm to sire dozens of children. But in legal, less-scandalous cases, the online connections are also highlighting the complex consequences of America’s lax regulations of the fertility industry, particularly on sperm and egg donations.

Many other countries have set legal limits on the number of children, families, or pregnancies to which one donor can contribute. Sperm donors in Taiwan can only sire one child, for instance. In Britain, they can donate to 10 families, and in China they can provide starter material for five pregnancies. But in the US, no such limits exist.

Read 6 remaining paragraphs | Comments

Kodi Addons Linked to Malicious Cryptomining Campaign

XvBMC-NL, a Kodi addon repository recently shut down by BREIN, has been implicated in the spread of a malicious cryptocurrency miner. A report from security firm ESET says that the repo was probably unwittingly involved after the malware spread from third-party add-on repositories Bubbles and Gaia. Windows and Linux-based Kodi users are affected.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Last month it was reported that a Netherlands-based repository, which contained several popular Kodi addons, had been shut down by anti-piracy group BREIN.

The Dutch developer and administrator of XvBMC-NL was visited by bailiffs in July and soon after the repository shut down. BREIN offered to settle the matter for 2,500 euros as long as the admin known as ‘Z’ signed an abstention agreement.

Months earlier, however, the XvBMC-NL repo was an unwitting participant in a campaign to infect Kodi users with cryptocurrency-mining malware, security firm ESET reports.

“According to our research, the malware we found in the XvBMC repository was first added to the popular third-party add-on repositories Bubbles and Gaia (a fork of Bubbles), in December 2017 and January 2018, respectively,” ESET writes.

“From these two sources, and through update routines of unsuspecting owners of other third-party add-on repositories and ready-made Kodi builds, the malware spread further across the Kodi ecosystem.”

ESET reports that the malware has a multi-stage architecture and uses techniques to hide the fact that the cryptominer came from a malicious addon. The miner, which is Monero-based, runs on Windows and Linux only, a relief to Android and macOS users who appear to be unaffected.

The three potential infection routes appear to be fairly cunning, ESET notes.

1. [Users] add the URL of a malicious repository to their Kodi installation so as to download some add-ons. The malicious add-on is then installed whenever they update their Kodi add-ons.

2. [Users] install a ready-made Kodi build that includes the URL of a malicious repository. The malicious add-on is then installed whenever they update their Kodi add-ons.

3. [Users] install a ready-made Kodi build that contains a malicious add-on but no link to a repository for updates. They are initially compromised, though receive no further updates to the malicious add-on. However, if the cryptominer is installed, it will persist and receive updates.

Further analysis by ESET shows that the top five countries affected by the threat are the United States, Israel, Greece, the United Kingdom and the Netherlands.

With the Bubbles repo now down, that is no longer a source for the malware. Gaia, ESET reports, is no longer serving the malicious code either. However, Kodi users who were infected could still have the malware on their machines and there’s a risk that other repos and Kodi builds could be distributing the code, “most likely” without their knowledge.

Timeline of the attack, as per ESET

A very detailed technical analysis of the attack has been published by ESET along with instructions on how users can discover if they’re affected.

“To check if your device has been compromised, scan it with a reliable anti-malware solution. ESET products detect and block these threats as Win64/CoinMiner.II and Win64/CoinMiner.MK on Windows and Linux/CoinMiner.BC, Linux/CoinMiner.BJ, Linux/CoinMiner.BK, and Linux/CoinMiner.CU on Linux,” the company reports.

“On Windows you can use the ESET Free Online Scanner, and on Linux the free trial of ESET NOD32 Antivirus for Linux Desktop, to check your computer for the presence of these threats and remove anything that is detected. Existing ESET customers are protected automatically.”

While the attack is undoubtedly serious, at the time of writing its reach appears to be limited. By examing the malware authors’ Monero wallet, ESET estimates that a minimum of 4,774 users are infected. Between them they have unwittingly generated around 5,700 euros or $6,700 for the attackers.

As ESET notes, Kodi malware is very rare. Aside from the case detailed above and the DDoS attack carried out briefly by an addon and reported here on TF, no other evidence of malware being distributed via Kodi addons has been reported.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

New modification of the old cold boot attack leaves most systems vulnerable

The defenses put in place to thwart the 2008 attack turn out to be very weak.

Footprints in the snow.

Enlarge (credit: rabiem22 / Flickr)

Cold boot attacks, used to extract sensitive data such as encryption keys and passwords from system memory, have been given new blood by researchers from F-Secure. First documented in 2008, cold boot attacks depend on the ability of RAM to remember values even across system reboots. In response, systems were modified to wipe their memory early during the boot process—but F-Secure found that, in many PCs, tampering with the firmware settings can force the memory wipe to be skipped, once again making the cold boot attacks possible.

The RAM in any commodity PC is more specifically called Dynamic RAM (DRAM). The "dynamic" here is in contrast to the other kind of RAM (used for caches in the processor), static RAM (SRAM). SRAM retains its stored values for as long as the chip is powered on; once the value is stored, it remains that way until a new value is stored or power is removed. It doesn't change, hence "static." Each bit of SRAM typically needs six or eight transistors; it's very fast, but the high transistor count makes it bulky, which is why it's only used for small caches.

DRAM, on the other hand, has a much smaller size per bit, using only a single transistor paired with a capacitor. These capacitors lose their stored charge over time; when they're depleted, the DRAM no longer retains the value it was supposed to remember. To handle this, the DRAM is refreshed multiple times per second to top up the capacitors and rewrite the values being stored. This rewriting is what makes DRAM "dynamic." It's not just the power that needs to be maintained for DRAM; the refreshes also need to occur.

Read 11 remaining paragraphs | Comments

Niantic rolls out suggestion system for new Pokémon Go locations

Historic points of interest are good nominees, porno stores are not.

Article intro image

Enlarge (credit: Jim Watson/AFP/Getty Images)

For over two years now, Pokémon Go's in-game Pokéstops and Gyms have been placed in real-world locations derived from Niantic's previous GPS-based game, Ingress. Now, the developer is slowly rolling out the ability for Pokémon Go players to nominate their own places of interest to be integrated into the game.

The suggestion system is currently only available to players in Brazil and South Korea who have played enough to reach level 40 (no easy feat), and it is limited to seven suggestions per person per week. For those users, suggesting a new in-game location is as simple as taking a picture, writing a brief description, and uploading your location to Niantic.

It seems inevitable that the suggestion system will eventually roll out to the rest of the game's playerbase, which has been seeing a significant uptick during the warmer summer months. In the meantime, Niantic has posted a couple of FAQs detailing what makes for a good Pokéstop suggestion.

Read 2 remaining paragraphs | Comments

“Bulk interception” by GCHQ (and NSA) violated human rights charter, European court rules

Privacy was violated at moment of collection, not when humans viewed data, ECHR rules.

Ultramodern public building.

Enlarge / The European Court of Human Rights (ECHR) in Strasbourg, France, ruled that UK bulk data collection and mass surveillance regimes violated the European Charter of Human Rights. (credit: Violetta Kuhn/picture alliance via Getty Images)

In a set of rulings today, the European Court of Human Rights found that the mass surveillance scheme used by the GCHQ—the United Kingdom's signals intelligence agency—violated the European Convention on Human Rights (ECHR), unlawfully intruding on the private and family life and freedom of expression of British and European citizens. And the case included consideration of intelligence collected by the US National Security Agency shared with GCHQ.

The Court found that sharing intelligence information gathered from bulk surveillance—as GCHQ does with the NSA and other members of the "Five Eyes" intelligence and security alliance—does not violate the human rights charter. But the judges did warn that using such intelligence sharing to bypass restrictions on surveillance of a member state's own citizens would be a violation of the charter.

In the ruling, the judges found that there was insufficient oversight through the UK's Investigatory Powers Tribunal (the UK equivalent of the US' Foreign Intelligence Surveillance Court) over the UK's bulk interception, filtering, and search of communications by the GCHQ. The judges also found that there were insufficient safeguards put in place to govern access to communications data. While the case has no direct impact on US intelligence gathering, the case could have a ripple effect because of the close connections between US and UK intelligence and law enforcement organizations.

Read 7 remaining paragraphs | Comments

AT&T and Verizon want to manage your identity across websites and apps

Carriers’ “Project Verify” would use your phone as authentication device.

A smartphone app showing an option to confirm or deny a login attempt.

Enlarge / Project Verify would let you confirm or deny logins for other apps and websites. (credit: Project Verify)

The four major US mobile carriers have unveiled a system that would let them manage your logins across any third-party website or app that hooks into it.

"Project Verify" from a consortium of AT&T, Verizon Wireless, T-Mobile US, and Sprint, was unveiled in a demo yesterday. It works similarly to other multi-factor authentication systems by letting users approve or deny login requests from other websites and apps, reducing the number of times users must enter passwords. The carriers' consortium is putting the call out to developers of third-party apps and websites, who can contact the consortium for information on linking to the new authentication system.

"The Project Verify app can be preloaded or downloaded to the user's mobile device," a video describing the technology says. "And then when they face a login screen on their favorite sites and apps, they select the verify option. That's it—Project Verify does the rest."

Read 12 remaining paragraphs | Comments

Moto Z keyboard mod canceled, team shifts focus to upcoming smartphone with slider keyboard

If you’re looking for an Android smartphone with a built-in keyboard, right now your only options are BlackBerry devices. But the folks behind the crowdfunded sliding keyboard mod for the Moto Z smartphone family plan to launch a new phone with a…

If you’re looking for an Android smartphone with a built-in keyboard, right now your only options are BlackBerry devices. But the folks behind the crowdfunded sliding keyboard mod for the Moto Z smartphone family plan to launch a new phone with a landscape-style slide-out keyboard. That’s the good news for keyboard fans. The bad news […]

The post Moto Z keyboard mod canceled, team shifts focus to upcoming smartphone with slider keyboard appeared first on Liliputing.