(g+) Spieleklassiker: Snake programmieren mit Lua und Löve

Mit der Open-Source-Sprache Lua und der Bibliothek Löve lassen sich einfach 2D-Spiele programmieren. Wir haben das mit dem Spieleklassiker Snake gemacht. Von Julian Thome und Sören Leonardy (Programmiersprachen, Softwareentwicklung)

Mit der Open-Source-Sprache Lua und der Bibliothek Löve lassen sich einfach 2D-Spiele programmieren. Wir haben das mit dem Spieleklassiker Snake gemacht. Von Julian Thome und Sören Leonardy (Programmiersprachen, Softwareentwicklung)

Akkutechnik: Wie Gotion viel Energie ohne Nickel und Kobalt speichert

Die VW-Partnerfirma Gotion hat Akkupacks mit LMFP-Zellen entwickelt: für hohe Reichweiten mit weniger Lithium, ohne Nickel und Kobalt. Von Frank Wunderlich-Pfeiffer (Akku, Energie & Klima)

Die VW-Partnerfirma Gotion hat Akkupacks mit LMFP-Zellen entwickelt: für hohe Reichweiten mit weniger Lithium, ohne Nickel und Kobalt. Von Frank Wunderlich-Pfeiffer (Akku, Energie & Klima)

2.5 Billion Visits: ACE Targets 9anime Among Several Pirate Anime Sites

Despite offering only one type of content, 9anime is one of the most-visited sites in the world, period. Since that amounts to over 2.5 billion visits per year, it was no surprise to see anti-piracy coalition ACE back in court this week hoping to obtain information on the site’s operators. Other anime piracy sites are under the spotlight too, including some that appear to have no traffic at all.

From: TF, for the latest news on copyright battles, piracy and more.

gotchaIn the face of legislation designed to thwart its growth, seizures, prosecutions, dozens of arrests and countless prison sentences have done little to prevent piracy.

Anti-piracy enforcement actions, including dozens by the Alliance for Creativity and Entertainment, have taken hundreds of sites out of the game. That’s a solid base for arguing that piracy volumes could’ve been much worse without so much enforcement.

The reality is that sites continue to emerge with some notable examples generating extraordinary levels of traffic, at a scale never seen before. History tells us that won’t continue indefinitely; pirate sites may come and go but Hollywood is in for the long haul – and then some.

9anime: Huge, Successful, and a Prime Target

One of the current batch of piracy behemoths is 9anime, a free streaming platform dedicated to Japanese cartoons. It currently receives in excess of 214 million visits per month, an incredible 2.5+ billion per year.

9anime

A DMCA subpoena application filed at a California court on Thursday shows that ACE has not given up on its plan to reduce 9anime’s traffic to zero. Like many times before, ACE – via the MPA – wants Cloudflare to give up information on its customers, 9anime included.

This information typically includes names, physical addresses, IP addresses,
telephone numbers, email addresses, and payment information. However, ACE also seeks additional information relating to account updates and histories, which could help to fill in some crucial blanks when combined with intelligence obtained elsewhere.

9animetv-to-traffic April23

There’s no doubt that 9anime will remain a priority enforcement target. At the time of writing the 9animetv.to domain is ranked #164 globally and with over 30% of that traffic coming from inside the United States, it represents one of the squeakiest wheels in the entire online piracy market.

Sites Under The Spotlight

Also mentioned in Thursday’s applications is allanime.to, a site offering anime, manga (Japanese comics) and associated music. The domain became popular in February and since then traffic has increased considerably, to a current level of around 4.7 million visits per month. In common with 9anime, over a third of allanime’s traffic comes from the United States, assisted by social media referrals, the majority on YouTube.

Two other anime-focused domains – animefreak.site and animet.site – also get a mention. The former receives under half a million visits per month according to SimilarWeb, with the latter apparently receiving just a couple of thousand.

With no obvious public web presence and a domain that won’t resolve, Anifastcdn.info receives no traffic at all by most accounts, but that’s certainly not the case. While the platform uses Cloudflare in the United States, its servers appear to be on the other side of the Atlantic and not that difficult to find either, certainly for an operation like ACE.

Cloud Storage

Two other platforms attracting ACE interest have more visible levels of traffic. Ninjashare.to heads the list as a growing platform; after pulling in 11.8m monthly visits in February, the cloud storage platform received 15.8 million in April.

rapid-cloud-co

Also mentioned in the DMCA subpoena application is rapid-cloud.co, a storage platform sporting Vidcloud branding and around 4.5 million monthly visits. According to ACE, specific content accessed via rapid-cloud actually came from betterstream.cc, which also has no obvious public web presence but does have significant traffic.

When Cloudflare hands over information to ACE, it may prove informative but there’s a reasonable chance the data won’t amount to some big reveal. But it might eventually, so as long as these and similar sites are in business, ACE can return to court again and again to obtain subpoenas just like this one, for less than $50 a pop.

It will probably continue to do that, for as long as it takes.

Image Credit: Pixabay/geralt

From: TF, for the latest news on copyright battles, piracy and more.

Inner workings revealed for “Predator,” the Android malware that exploited 5 0-days

Spyware is sold to countries including Egypt, Indonesia, Oman, Saudi Arabia, and Serbia.

An image illustrating a phone infected with malware

Enlarge

Smartphone malware sold to governments around the world can surreptitiously record voice calls and nearby audio, collect data from apps such as Signal and WhatsApp, and hide apps or prevent them from running upon device reboots, researchers from Cisco’s Talos security team have found.

An analysis Talos published on Thursday provides the most detailed look yet at Predator, a piece of advanced spyware that can be used against Android and iOS mobile devices. Predator is developed by Cytrox, a company that Citizen Lab has said is part of an alliance called Intellexa, “a marketing label for a range of mercenary surveillance vendors that emerged in 2019.” Other companies belonging to the consortium include Nexa Technologies (formerly Amesys), WiSpear/Passitora Ltd., and Senpai.

Last year, researchers with Google’s Threat Analysis Group, which tracks cyberattacks carried out or funded by nation-states, reported that Predator had bundled five separate zero-day exploits in a single package and sold it to various government-backed actors. These buyers went on to use the package in three distinct campaigns. The researchers said Predator worked closely with a component known as Alien, which “lives inside multiple privileged processes and receives commands from Predator.” The commands included recording audio, adding digital certificates, and hiding apps.

Read 10 remaining paragraphs | Comments

No A/C? No problem, if buildings copy networked tunnels of termite mounds

“For the first time, it may be possible to design a true living, breathing building.”

Part of the egress complex of a mound of Macrotermes michaelseni termites from Namibia

Enlarge / Part of the system of reticulated tunnels (egress complex) of a mound of Macrotermes michaelseni termites from Namibia. (credit: D. Andréen)

The mounds that certain species of termites build above their nests have long been considered to be a kind of built-in natural climate control—an approach that has intrigued architects and engineers keen to design greener, more energy-efficient buildings mimicking those principles. There have been decades of research devoted to modeling just how these nests function. A new paper published in the journal Frontiers in Materials offers new evidence favoring an integrated-system model in which the mound, the nest, and its tunnels function together much like a lung.

Perhaps the most famous example of the influence of termite mounds in architecture is the Eastgate Building in Harare, Zimbabwe. It is the country’s largest commercial and shopping complex, and yet it uses less than 10 percent of the energy consumed by a conventional building of its size because there is no central air conditioning and only a minimal heating system. Architect Mick Pearce famously based his design in the 1990s on the cooling and heating principles used in the region’s termite mounds, which serve as fungus farms for the termites. Fungus is their primary food source.

Conditions have to be just right for the fungus to flourish. So the termites must maintain a constant temperature of 87° F in an environment where the outdoor temperatures range from 35° F at night to 104° F during the day. Biologists have long suggested that they do this by constructing a series of heating and cooling vents throughout their mounds, which can be opened and closed during the day to keep the temperature inside constant. The Eastgate Building relies on a similar system of well-placed vents and solar panels.

Read 14 remaining paragraphs | Comments

Daily Deals (5-26-2023)

Liliputing is a website focused on small computers, so I don’t spend a lot of time writing about laptops with 17 inch screens, as they’ve historically been big, heavy desktop replacements rather than truly mobile devices. But the LG Gram 1…

Liliputing is a website focused on small computers, so I don’t spend a lot of time writing about laptops with 17 inch screens, as they’ve historically been big, heavy desktop replacements rather than truly mobile devices. But the LG Gram 17 breaks the mold by offering big screens in lightweight designs. While they’ve gotten mixed […]

The post Daily Deals (5-26-2023) appeared first on Liliputing.

HP printers should have EPEAT ecolabels revoked, trade group demands

Complaint to EPEAT organizers spells out why Dynamic Security, HP+ suck.

The Hewlett-Packard logo is seen on printer printer ink boxes on display

Enlarge / HP sometimes bricks third-party ink and toner that's over 90 percent full, Imaging Technology Council claims. (credit: Getty)

HP printers have received a lot of flak historically and recently for invasive firmware updates that end up preventing customers from using ink with their printers. HP also encourages printer customers to sign up for HP+, a program that includes a free ink-subscription trial and irremovable firmware that allows HP to brick the ink when it sees fit.

Despite this, HP markets dozens of its printers with Dynamic Security and the optional HP+ feature as being in the Electronic Product Environmental Assessment Tool (EPEAT) registry, suggesting that these printers are built with the environment in mind and, more specifically, do not block third-party ink cartridges. Considering Dynamic Security and HP+ printers do exactly that, the International Imaging Technology Council (IITC) wants the General Electronics Council (GEC), which is in charge of the EPEAT registry, to revoke at least 101 HP printer models from the EPEAT registry, which HP has "made a mockery of."

Before we get into the IITC complaint sent May 22 to  GEC Senior Manager Katherine Larocque, we should note the IITC's obvious stakes in this. The nonprofit trade association was founded in 2000 and says it represents "toner and inkjet cartridge remanufacturers, component suppliers, and cartridge collectors in North America." So its members stand to lose a lot of money from tactics like Dynamic Security. The IITC already filed a complaint to the GEC about HP in 2019 for firmware blocking non-HP ink, but there didn't seem to be any noticeable results.

Read 25 remaining paragraphs | Comments

Study narrows long COVID’s 200+ symptoms to core list of 12

Loss of taste/smell and post-exertional malaise were the top two symptoms.

A long COVID patient sits with her daughter in her wheelchair while receiving a saline infusion at her Maryland home on Friday, May 27, 2022.

Enlarge / A long COVID patient sits with her daughter in her wheelchair while receiving a saline infusion at her Maryland home on Friday, May 27, 2022. (credit: Getty | The Washington Post)

Tens of millions of people worldwide are thought to have developed long-term symptoms and conditions in the wake of a SARS-CoV-2 infection. But this sometimes-debilitating phenomenon, often called long COVID, remains a puzzle to researchers. What causes it? Who gets it? And, perhaps, the most maddening one: What is it?

Long COVID patients have reported a wide spectrum of more than 200 symptoms. Some are common, like loss of smell, while others are rarer, like tremors. Some patients have familiar constellations of symptoms, others seem to have idiosyncratic assortments.

Researchers hypothesize that long COVID may simply be an umbrella term for a collection of variable—and potentially overlapping—post-COVID conditions that may have different causes. Those causes might include autoimmunity, immune system dysregulation, organ injury, viral persistence, and intestinal microbiome imbalances (dysbiosis).

Read 5 remaining paragraphs | Comments