Ahh, summer—ramlibacter season

A catalog of the living things that float through the air.

Image of a tractor sending dust into the air while plowing a field.

Enlarge / Even mundane activities can allow microbes to catch a ride on the wind. (credit: Christopher Griner)

Your gut isn’t the only place that harbors a community of microbes. There are also microbiomes coating your skin and most household, industrial, and commercial surfaces. There's even a community hanging out in the lower atmosphere. Scientists in Spain have monitored this airborne microbiome by taking rain and snow samples every two weeks for seven years at a site in the central Pyrenees. The samples were then run through a DNA sequencer to reveal the airborne microbiome. They found that the bacteria, archaea, protists, and fungi all varied predictably by season.

In the wintertime, microbes frequently had marine origins, coming primarily from the Atlantic, although these were mixed in with bugs from forest and other terrestrial sources. Overall, the winter atmospheric microbiome was the most diverse, and that diversity included the highest levels of pathogens in any season.

In the summer the microbiome was more regional, coming from the Mediterranean as well as fresh water, cropland, and cities. There was more pollution in the summer; the scientists monitored atmospheric levels of chemicals, including nitrates and sulphates, in addition to microbes. One of the most abundant and recurring taxa over the seven summers was Ramlibacter, related to a bacterium first isolated in 2011 from meteorite fragments buried in the sands near Tatouine, in Tunisia. It is specifically adapted to live in hot, dry, desert climes, so the researchers suggested that it could be used as a forensic signature for “summertime in Europe—African dust in the air”.

Read 4 remaining paragraphs | Comments

Datentraffic: Wofür die Telefónica 5G wirklich braucht

Die Telefónica Deutschland benötigt 5G wegen der massiv steigenden Datennutzung in ihrem Mobilfunknetz. Sonst wäre im Jahr 2021 das Netz am Ende seiner Leistungsfähigkeit. (Telefónica, Long Term Evolution)

Die Telefónica Deutschland benötigt 5G wegen der massiv steigenden Datennutzung in ihrem Mobilfunknetz. Sonst wäre im Jahr 2021 das Netz am Ende seiner Leistungsfähigkeit. (Telefónica, Long Term Evolution)

‘Pirate’ Set-Top Boxes Used By 45% of Online Thai Consumers

According to a study commissioned by the Asia Video Industry Association’s Coalition Against Piracy (CAP), 45% of Internet-connected, online consumers in Thailand use a set-top box configured for piracy. CAP, which counts the MPA and other large media companies as members, reports that more than two in three of these consumers cancel paid subscriptions as a result.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

This morning, the Asia Video Industry Association’s (AVIA) Coalition Against Piracy (CAP), which represents the interests of groups including the MPA and other major companies, revealed the results of a commissioned YouGov survey.

“In a recent study of the content viewing behavior of Thai consumers, it was revealed that 45% of consumers use a TV box which can be used to stream pirated television and video content,” CAP writes.

“These TV boxes, also known as Illicit Streaming Devices (ISDs), allow users to access hundreds of pirated television channels and video-on-demand content, usually with a low annual fee.”

In the above paragraph, the precise definition of “consumer” isn’t particularly clear. Also, the use of the phrase “can be used” is open to ambiguity. TorrentFreak spoke with Neil Gane, General Manager of CAP, who was happy to clarify on both fronts.

“The survey focused on Internet-connected/online consumers. [T]he survey also included consumers who are online and yet don’t view video content, as all respondents were given the option to select ‘Not applicable – I don’t watch television and video content’,” Gain explained.

Gane further clarified that the 45% of consumers does not include users who use general “piracy-capable” devices such as computers, laptops, mobile phones, or Firestick/Chromecast dongles etc.

CAP’s General Manager added that while most devices “can be used” to stream pirated content, the survey was “solely focused on TV boxes pre-loaded with infringing app(s), which by definition would make them illicit streaming devices (ISDs).”

Examples of ‘pirate applications’ found on such devices include Mango TV, HD Playbox, and U Play, which provide access to streaming movies and TV shows, mainly on Android.

With the details established, the claims of the effects of piracy-enabled devices are more easily digested. CAP says that of the 45% of consumers who bought such a device, “more than two in three (69%) stated that they canceled all or some of their subscriptions to legal pay TV services.”

The YouGov research also established that younger people are attracted to piracy-configured devices. They are particularly popular among 18 to 24-year-olds, “with more than three in four (77%) canceling legitimate subscription services as a result of owning ISDs, especially international online subscriptions (40%).”

Of course, no recent anti-piracy announcement would be complete without claims about malware running riot.

“The damage that piracy does to the creative industries is without dispute,” Gane explains.

“However, the damage done to consumers themselves, because of the nexus between content piracy and malware, is only beginning to be recognized. Piracy websites and applications typically have a ‘click happy’ user base, and, as such, are being used more and more as clickbait to distribute malware.”

There is little doubt that many users of pirate websites are indeed “click happy” in their quest for free content and that can lead them into trouble. However, we’ve covered malware issues before (specifically in respect of so-called “Kodi Boxes”) and found nothing to suggest that there is a significant risk to consumers.

Of course, that doesn’t mean there isn’t a risk with other software pre-installed on set-top boxes – it’s a computer after all, and all such devices are vulnerable to infection. That means that as a minimum, all users should consider running anti-virus software on all devices capable of doing so.

That being said, set-top boxes are isolated machines that rarely carry much of value to malware distributors. Most people don’t browse on these machines, send email, or enter any personal or banking information. There is always some risk involved, but in the set-top box environment, it’s almost certainly minimized.

Speaking with TF, Neil Gane said that the study wasn’t related to malware but he stands by his references to the “piracy/malware nexus”. He also pointed us to a September 2018 EU report that found that trojans and malware can be found on pirate sites, leading to “not only financial losses, but also theft of personal data and other risks of unwanted access and control.”

While that’s true, the same report also stated that copyright-infringing websites and streaming services are not normally considered to be dominant sources of malware.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

‘Pirate’ Set-Top Boxes Used By 45% of Online Thai Consumers

According to a study commissioned by the Asia Video Industry Association’s Coalition Against Piracy (CAP), 45% of Internet-connected, online consumers in Thailand use a set-top box configured for piracy. CAP, which counts the MPA and other large media companies as members, reports that more than two in three of these consumers cancel paid subscriptions as a result.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

This morning, the Asia Video Industry Association’s (AVIA) Coalition Against Piracy (CAP), which represents the interests of groups including the MPA and other major companies, revealed the results of a commissioned YouGov survey.

“In a recent study of the content viewing behavior of Thai consumers, it was revealed that 45% of consumers use a TV box which can be used to stream pirated television and video content,” CAP writes.

“These TV boxes, also known as Illicit Streaming Devices (ISDs), allow users to access hundreds of pirated television channels and video-on-demand content, usually with a low annual fee.”

In the above paragraph, the precise definition of “consumer” isn’t particularly clear. Also, the use of the phrase “can be used” is open to ambiguity. TorrentFreak spoke with Neil Gane, General Manager of CAP, who was happy to clarify on both fronts.

“The survey focused on Internet-connected/online consumers. [T]he survey also included consumers who are online and yet don’t view video content, as all respondents were given the option to select ‘Not applicable – I don’t watch television and video content’,” Gain explained.

Gane further clarified that the 45% of consumers does not include users who use general “piracy-capable” devices such as computers, laptops, mobile phones, or Firestick/Chromecast dongles etc.

CAP’s General Manager added that while most devices “can be used” to stream pirated content, the survey was “solely focused on TV boxes pre-loaded with infringing app(s), which by definition would make them illicit streaming devices (ISDs).”

Examples of ‘pirate applications’ found on such devices include Mango TV, HD Playbox, and U Play, which provide access to streaming movies and TV shows, mainly on Android.

With the details established, the claims of the effects of piracy-enabled devices are more easily digested. CAP says that of the 45% of consumers who bought such a device, “more than two in three (69%) stated that they canceled all or some of their subscriptions to legal pay TV services.”

The YouGov research also established that younger people are attracted to piracy-configured devices. They are particularly popular among 18 to 24-year-olds, “with more than three in four (77%) canceling legitimate subscription services as a result of owning ISDs, especially international online subscriptions (40%).”

Of course, no recent anti-piracy announcement would be complete without claims about malware running riot.

“The damage that piracy does to the creative industries is without dispute,” Gane explains.

“However, the damage done to consumers themselves, because of the nexus between content piracy and malware, is only beginning to be recognized. Piracy websites and applications typically have a ‘click happy’ user base, and, as such, are being used more and more as clickbait to distribute malware.”

There is little doubt that many users of pirate websites are indeed “click happy” in their quest for free content and that can lead them into trouble. However, we’ve covered malware issues before (specifically in respect of so-called “Kodi Boxes”) and found nothing to suggest that there is a significant risk to consumers.

Of course, that doesn’t mean there isn’t a risk with other software pre-installed on set-top boxes – it’s a computer after all, and all such devices are vulnerable to infection. That means that as a minimum, all users should consider running anti-virus software on all devices capable of doing so.

That being said, set-top boxes are isolated machines that rarely carry much of value to malware distributors. Most people don’t browse on these machines, send email, or enter any personal or banking information. There is always some risk involved, but in the set-top box environment, it’s almost certainly minimized.

Speaking with TF, Neil Gane said that the study wasn’t related to malware but he stands by his references to the “piracy/malware nexus”. He also pointed us to a September 2018 EU report that found that trojans and malware can be found on pirate sites, leading to “not only financial losses, but also theft of personal data and other risks of unwanted access and control.”

While that’s true, the same report also stated that copyright-infringing websites and streaming services are not normally considered to be dominant sources of malware.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

ROG Gaming Phone: Asus’ Gaming-Smartphone kommt für 900 Euro nach Deutschland

Mit dem ROG Gaming Phone hat Asus auf der Computex 2018 ein Smartphone für Mobile-Gamer vorgestellt, das einige interessante Zubehörteile hat. So können Nutzer unter anderem Controller montieren oder das Smartphone in einen echten Handheld verwandeln. …

Mit dem ROG Gaming Phone hat Asus auf der Computex 2018 ein Smartphone für Mobile-Gamer vorgestellt, das einige interessante Zubehörteile hat. So können Nutzer unter anderem Controller montieren oder das Smartphone in einen echten Handheld verwandeln. Das Gerät ist ab sofort in Deutschland verfügbar. (Asus, Smartphone)

Galaxy mergers hide ravenous supermassive black holes

Galaxy mergers create gas cloud that hides glowing supermassive black hole.

Image of two galaxies merging.

Enlarge / When galaxies collide. (credit: NASA, ESA, the Hubble Heritage Team)

Black holes are… um, black. The point of a black hole is that the force of gravity is strong enough to prevent light from escaping its grasp. But the matter that is being sucked into a black hole is not at all happy about its fate. The matter gets hot and bothered and starts to glow very brightly before it reaches the black hole. This produces what are called luminous accreting black holes.

Most black holes are proud of themselves, sucking down matter right before our very eyes. But others are shy and seem to hide their antisocial behavior, raising questions about whether they were actually there. It turns out that these murderous monsters are hiding behind the gas clouds created by galaxy collisions. It took a serious amount of detective work to penetrate the fog.

Introducing the eyewitnesses

Astronomers have long recognized that not everything in the Universe happens slowly. Sure, our Sun will be stable for billions of years, but when things start to go wrong, they go downhill quickly (use your remaining eight minutes wisely). Likewise, when something big gets sucked into a black hole, it sends a last desperate SOS in the form of a bright X-ray flash.

Read 11 remaining paragraphs | Comments

Galaxy mergers hide ravenous supermassive black holes

Galaxy mergers create gas cloud that hides glowing supermassive black hole.

Image of two galaxies merging.

Enlarge / When galaxies collide. (credit: NASA, ESA, the Hubble Heritage Team)

Black holes are… um, black. The point of a black hole is that the force of gravity is strong enough to prevent light from escaping its grasp. But the matter that is being sucked into a black hole is not at all happy about its fate. The matter gets hot and bothered and starts to glow very brightly before it reaches the black hole. This produces what are called luminous accreting black holes.

Most black holes are proud of themselves, sucking down matter right before our very eyes. But others are shy and seem to hide their antisocial behavior, raising questions about whether they were actually there. It turns out that these murderous monsters are hiding behind the gas clouds created by galaxy collisions. It took a serious amount of detective work to penetrate the fog.

Introducing the eyewitnesses

Astronomers have long recognized that not everything in the Universe happens slowly. Sure, our Sun will be stable for billions of years, but when things start to go wrong, they go downhill quickly (use your remaining eight minutes wisely). Likewise, when something big gets sucked into a black hole, it sends a last desperate SOS in the form of a bright X-ray flash.

Read 11 remaining paragraphs | Comments

Skylake-X Refresh: Intels Core i9-9980XE ist kaum schneller

Wer 2.000 Euro für eine Enthuasiasten-CPU zahlt, hat eine neue Option: Der Core i9-9980XE folgt auf den Core i9-7980XE. Die Geschwindigkeit steigt nur wenig, wohl aber die Leistungsaufnahme. (Core i9, Prozessor)

Wer 2.000 Euro für eine Enthuasiasten-CPU zahlt, hat eine neue Option: Der Core i9-9980XE folgt auf den Core i9-7980XE. Die Geschwindigkeit steigt nur wenig, wohl aber die Leistungsaufnahme. (Core i9, Prozessor)

Comcast forced to pay refunds after its hidden fees hurt customers’ credit

AG: Comcast tricked customers into long-term contracts, then raised bills 40%.

Comcast forced to pay refunds after its hidden fees hurt customers’ credit

Enlarge (credit: Aurich / Getty)

Comcast has agreed to pay $700,000 in refunds "and cancel debts for more than 20,000 Massachusetts customers" to settle allegations that it used deceptive advertising to promote long-term cable contracts, Massachusetts Attorney General Maura Healey announced yesterday. "Comcast stuck too many Massachusetts customers with lengthy, expensive contracts that left many in debt and others with damaged credit," Healey said.

The Massachusetts AG alleged that Comcast violated state consumer protection laws by "fail[ing] to adequately disclose the actual monthly price and terms of its long-term contracts for cable services, including failing to disclose to customers that the company could increase the price of certain monthly fees at any point during the long-term contracts."

Comcast advertised a $99 lock-in rate "but did not adequately disclose equipment costs and mandatory monthly fees" that would add to monthly bills, and "failed to adequately disclose that the fees could increase while the customer was locked into the long-term contract," the AG investigation found.

Read 6 remaining paragraphs | Comments

Comcast forced to pay refunds after its hidden fees hurt customers’ credit

AG: Comcast tricked customers into long-term contracts, then raised bills 40%.

Comcast forced to pay refunds after its hidden fees hurt customers’ credit

Enlarge (credit: Aurich / Getty)

Comcast has agreed to pay $700,000 in refunds "and cancel debts for more than 20,000 Massachusetts customers" to settle allegations that it used deceptive advertising to promote long-term cable contracts, Massachusetts Attorney General Maura Healey announced yesterday. "Comcast stuck too many Massachusetts customers with lengthy, expensive contracts that left many in debt and others with damaged credit," Healey said.

The Massachusetts AG alleged that Comcast violated state consumer protection laws by "fail[ing] to adequately disclose the actual monthly price and terms of its long-term contracts for cable services, including failing to disclose to customers that the company could increase the price of certain monthly fees at any point during the long-term contracts."

Comcast advertised a $99 lock-in rate "but did not adequately disclose equipment costs and mandatory monthly fees" that would add to monthly bills, and "failed to adequately disclose that the fees could increase while the customer was locked into the long-term contract," the AG investigation found.

Read 6 remaining paragraphs | Comments