DNA suggests Crusaders intermarried with local people and their sons also fought.
European soldiers and civilians poured into the Levant from in the 12th and 13th centuries, often killing or displacing local Muslim populations and establishing their own settlements in an effort to seize control of sites sacred to three major religious groups.
But in a new study, DNA from the skeletons of nine soldiers hints that the armies of the Crusades were more diverse and more closely linked with local people in Lebanon than historians previously assumed. The genetic evidence suggests that the Crusaders also recruited from among local populations and European soldiers sometimes married local women and raised children, some of whom may have grown up to fight in later campaigns.
Living and dying side by side
For centuries, the mingled, charred bones of at least 25 soldiers lay buried in two mass graves near the ruins of the Castle of St. Louis, a 12th- to 13th-century Crusader stronghold near Sidon, in south Lebanon. Several of the skeletons (all apparently male) bore the marks of violent death, and the artifacts mingled with the bones—buckles of medieval European design, along with a coin minted in Italy in 1245 to commemorate the Crusades—mark the pit's occupants as dead Crusader soldiers, burned and buried in the aftermath of a battle. From nine of them, geneticist Marc Haber and his colleagues at the Wellcome Sanger Institute obtained usable DNA sequences. They offer a rare look into the ranks of the soldiers who fought on one side of the 200-year series of wars.
DNA suggests Crusaders intermarried with local people and their sons also fought.
European soldiers and civilians poured into the Levant from in the 12th and 13th centuries, often killing or displacing local Muslim populations and establishing their own settlements in an effort to seize control of sites sacred to three major religious groups.
But in a new study, DNA from the skeletons of nine soldiers hints that the armies of the Crusades were more diverse and more closely linked with local people in Lebanon than historians previously assumed. The genetic evidence suggests that the Crusaders also recruited from among local populations and European soldiers sometimes married local women and raised children, some of whom may have grown up to fight in later campaigns.
Living and dying side by side
For centuries, the mingled, charred bones of at least 25 soldiers lay buried in two mass graves near the ruins of the Castle of St. Louis, a 12th- to 13th-century Crusader stronghold near Sidon, in south Lebanon. Several of the skeletons (all apparently male) bore the marks of violent death, and the artifacts mingled with the bones—buckles of medieval European design, along with a coin minted in Italy in 1245 to commemorate the Crusades—mark the pit's occupants as dead Crusader soldiers, burned and buried in the aftermath of a battle. From nine of them, geneticist Marc Haber and his colleagues at the Wellcome Sanger Institute obtained usable DNA sequences. They offer a rare look into the ranks of the soldiers who fought on one side of the 200-year series of wars.
Der Informatiker Joe Armstrong gilt als Erfinder der Programmiersprache Erlang und war Experte für verteilte und fehlertolerante Systeme. Armstrong erlag nun den Folgen einer Lungenerkrankung. (Softwareentwicklung, Internet)
Der Informatiker Joe Armstrong gilt als Erfinder der Programmiersprache Erlang und war Experte für verteilte und fehlertolerante Systeme. Armstrong erlag nun den Folgen einer Lungenerkrankung. (Softwareentwicklung, Internet)
Kurz nach dem Start ist es einem Sicherheitsforscher gelungen, sich unberechtigt bei der Whatsapp-Alternative der französischen Regierung anzumelden. Der Forscher fand weitere vermeintliche Fehler, die laut den Entwicklern der Matrix-Software aber kein…
Kurz nach dem Start ist es einem Sicherheitsforscher gelungen, sich unberechtigt bei der Whatsapp-Alternative der französischen Regierung anzumelden. Der Forscher fand weitere vermeintliche Fehler, die laut den Entwicklern der Matrix-Software aber keine sind. (Matrix, Instant Messenger)
Nach den Anschlägen in Sri Lanka wird in dem Land der Zugriff auf Messenger-Dienste wie Whatsapp oder Social-Media-Plattformen wie Facebook blockiert. Das soll die Verbreitung von Falschinformationen verhindern. (Politik/Recht, Instant Messenger)
Nach den Anschlägen in Sri Lanka wird in dem Land der Zugriff auf Messenger-Dienste wie Whatsapp oder Social-Media-Plattformen wie Facebook blockiert. Das soll die Verbreitung von Falschinformationen verhindern. (Politik/Recht, Instant Messenger)
With website blocking becoming more prevalent around the world, more and more users are turning to VPNs to regain access. However, according to the operator of one of the world’s largest pirate sites, some advertising agencies consider the traffic as worthless.
For more than a decade, copyright holders around the world have pushed Internet service providers to block ‘pirate’ sites.
While users in the United States are yet to experience any blocking on copyright grounds, elsewhere – particularly in Europe – the site blocking phenomenon is in full swing.
Indeed, according to a recent overview by the Motion Picture Association, almost 4,000 websites are blocked by ISPs across 31 countries. The number of domains blocked is more than double that amount, in excess of 8,000 worldwide.
While the action is seen as effective at preventing direct access to sites, plenty of workarounds exist. Alternative ‘pirate’ domains regularly appear, along with mirrors, clones and the rising use of Tor and, of course, VPNs.
Interestingly, however, we received correspondence from the operator of a major ‘pirate’ site this week that indicated that VPN-based traffic is undesirable because it is considered almost worthless by advertising networks.
“Pirate sites need money to operate,” he explained. “Having more VPN users accessing the site doesn’t equal more money.”
According to the operator, ad agencies frown upon such traffic. Instead, they prefer traffic that is easily categorized into geographic regions, with some countries’ traffic being considered more valuable than others.
Users visiting sites from places such as the US, UK, Canada, Japan, New Zealand, and Australia, are considered more valuable than those visiting from India and China, for example.
The site operator says that advertisers pay for his traffic on a geographic basis. An example list of geocodes published by Maxmind shows a sample, with the United States listed as ‘US’, United Kingdom as ‘GB’, and Canada as ‘CA’. However, at the top of the list is A1, which stands for Anonymous Proxy.
“Advertisers pay per [geocode] and do campaigns per [geocode]. VPNs are marked with GEO A1 which is outside the scope of those tiers thus no one gets paid for those,” he explained.
Another site operator working in a similar niche told us that in his experience, payment for VPN traffic is patchy. However, he agreed with the overall sentiment.
“It all depends on the network to be honest. I have worked with a few networks before that don’t even show a popup if you’re using a VPN,” he explained.
Of course, the A1 code isn’t just limited to VPNs. TOR also comes under that category and that traffic is frowned up too.
“No ad agency pays for TOR traffic,” we were told. “There are special flags for TOR , anonymous proxies, VPN, dedicated servers, VPS servers. It’s really easy to monitor those networks and changes to them. Everything is public anyway.”
IP2Location sells access to a database for $799 which claims to be able to detect VPNs, proxies, and bots. It also offers a demo, which allows the user to enter an IP address and discover whether it falls into the above categories. We tested it with a diverse range of VPN servers and the tool identified the VPN every single time.
So while visitors may be able to unblock ‘pirate’ sites with VPNs, TOR, and similar tools, it’s clear that many advertisers aren’t partial to this kind of traffic. There are other more creative ways to monetize these visitors through various schemes but for the large site in question, they’re more of a burden.
“More visits, more server load for 0$,” he concluded.
The latest episode of Game of Thrones has leaked online several hours before its official premiere. The leak comes from the German version of Amazon Prime, where it was put online early. Since then it’s been widely shared on various pirate sites.
Several hours before its official premiere, the second episode of the latest Game of Thrones season is already widely available on torrent and streaming sites.
According to reports from several viewers, the German version of Amazon Prime accidentally made the episode available on the platform a few hours ago.
Apparently, the second episode of the season simply started playing after the first one finished.
After this mistake, it didn’t take long before someone ripped the show, and soon after many links to pirated copies started to appear on the usual torrent and streaming sites.
This isn’t the first time that a Game of Thrones episode has been released early. The popular HBO series has a long history of leaks. The most prominent one dates back to 2015 when the first four episodes leaked from a promotional screener.
In 2017 a Game of Thrones episode leaked with a “Star India” watermark. This eventually led to the arrests of four people.
Today’s leak appears to be a mistake by Amazon, but the result is ultimately the same. Pirates will get an early viewing of the latest episode, before those who pay, and spoilers are being widely shared online.
For several years in a row Game of Thrones has been the most pirated TV-show, and this year the interest is overwhelming once again. Data published by piracy tracking company MUSO earlier this week showed that the first episode of this season was pirated 54 million times in just one day.
Twitter has informed TorrentFreak that another tweet from us has been removed. Apparently, a link to a news article was somehow making pirated software available. Strange, since the request was sent on behalf of movie studio Warner Bros. Apparently, there’s still room to improve the accuracy of these takedown notices
Last week there was quite an uproar when Starz deleted one of our tweets, which linked to a news article about several prominent TV-show leaks.
As reasons for the takedown, the DMCA notice mentioned “images of the unreleased episodes” and “information about their illegal availability,” something that’s generally seen as fair use.
Making matters worse, Starz also sent takedown requests to several people who tweeted links to the article where we complained about the first takedown. This then generated a lot of criticism from journalists, legal scholars, and the public at large.
Starz eventually retracted some of the DMCA notices and apologized for the “misunderstanding” in a public statement. We have yet to hear back from the company directly, despite multiple requests, so we decided to move on. There’s more news to report, after all.
However, a few days after the DMCA notice from Starz, Twitter contacted us with a similar complaint, again from an American media giant. Apparently, Warner Bros. had also asked the social media platform to remove one of our tweets.
The takedown notice, sent by Warner Bros’ anti-piracy partner Marketly, accused us of posting a tweet that made “computer program(s)” available “for copying through downloading,” without permission of the copyright owner.
“We hereby give notice of these activities to you and request that you take expeditious action to remove or disable access to the material described above, and thereby prevent the illegal reproduction and distribution of this software via your company’s network,” the notice added.
At TorrentFreak we simply report news, and looking at the “infringing” tweet in question, we fail to see a link with software piracy. Instead, it’s simply a link to our news article about the previously convicted admins of the movie pirate sites Kinox.to and Movie4k.to.
Still a bit puzzled, we looked back at the DMCA notice again and noticed that it didn’t list any software, but movies and TV-shows instead. That made more sense, but the takedown notice still doesn’t.
We assume that Warner Bros. isn’t happy with Kinox.to and Movie4k.to, which is understandable. However, removing a tweet to a news article that discusses a newsworthy event related to these sites goes too far.
Especially when you consider that our article doesn’t even link to these sites. The tweet does, ironically, but those links are automatically generated by Twitter. We didn’t put those in. Yet, we are punished for it, adding a copyright ‘strike’ to our Twitter account.
We assume that this is yet another misunderstanding and we kindly request Warner Bros., via Marketly, to sort this out. While we’re at it, we will ask about the mysterious pirated software, because we still haven’t located that either.
Incidents like this show that there is surprisingly little attention paid to the context of potentially infringing content. This was also fairly obvious last week with the Starz drama, which hasn’t been completely resolved yet. On the contrary.
Some of the tweets linking to our reporting about the leaked TV shows remain unavailable at the time of writing. This includes a tweet from ‘FCT,’ who complained about the situation repeatedly. We requested clarification from Starz on this issue earlier this week but haven’t heard back.
Starz did remove some of its most recent takedown requests, including one directed at our original tweet. However, at the same time, it also reversed several DMCA notices for content that does appear to be infringing, as shown below.
It looks like they’re not paying much attention at all.
Free and open source racing game SuperTuxKart has been under development for nearly 12 years, and even longer than that if you take into account that it was a fork of the discontinued TuxKart. And for most of that time, it’s been a fun, playable …
Free and open source racing game SuperTuxKart has been under development for nearly 12 years, and even longer than that if you take into account that it was a fork of the discontinued TuxKart. And for most of that time, it’s been a fun, playable game. So it’s a bit surprising that version 1.0 was just […]
Mazda worked with US regulators to ensure this one complies with the rules.
When Mazda invited us to a roundtable discussion about powertrain technology at this year's New York auto show, it was easy to say yes. After all, the company is responsible for a significant recent breakthrough in internal combustion engine technology. So you can imagine my surprise when it turned out the topic on Mazda's mind was the introduction of its Skyactiv-D diesel engine to the North American market, under the hood of the (excellent) CX-5 SUV. Intrigued, I had to find out why the Japanese automaker was taking this step.
Diesel's fall from grace
You can be forgiven for thinking that "diesel" was now a dirty word. For a while, this liquid hydrocarbon fuel looked like it might be an important tool in helping fight climate change. After all, diesel engines are much more efficient than ones that run gasoline, so you can drive further between filling stations and emit less CO2 while doing it. But CO2 isn't the only problematic component of diesel exhaust. A more immediate danger posed by diesel exhaust is the soup of nitrogen oxides (NOx) and particulates that result as combustion products. While CO2 will wreck our climate in the coming decades, NOx damages peoples' lungs today. And it's NOx that's responsible for diesel's fall from grace.
Or, more accurately, it's been the widespread lying by industry to regulators about the exact amounts of NOx emissions from their cars. The most well-known culprit has been Volkswagen Group. In 2015 it got caught lying to federal regulators in the US and the penalties have been stiff. Executives have been prosecuted. Hundreds of thousands of cars have had to be bought back from owners, billions of dollars in fines were levied, and an entirely new business plan had to be created to rapidly electrify one of the three biggest car companies in the world by the middle of the next decade.
You must be logged in to post a comment.