May 12 11:21

All Wi-Fi devices impacted by new FragAttacks vulnerabilities

Newly discovered Wi-Fi security vulnerabilities collectively known as FragAttacks (fragmentation and aggregation attacks) are impacting all Wi-Fi devices (including computers, smartphones, and smart devices) going back as far as 1997.

Three of these bugs are Wi-Fi 802.11 standard design flaws in the frame aggregation and frame fragmentation functionalities affecting most devices, while others are programing mistakes in Wi-Fi products.

"Experiments indicate that every Wi-Fi product is affected by at least one vulnerability and that most products are affected by several vulnerabilities," security researcher Mathy Vanhoef (New York University Abu Dhabi), who discovered the FragAttacks bugs, said.

May 12 11:13

Billions of devices vulnerable to Wi-Fi 'FragAttacks' — what to do

Up to a dozen serious security flaws affect almost all Wi-Fi-enabled devices, including PCs, Mac, iPhones, Android phones, most routers and smart-home devices, says a Belgian security researcher. You'll want to update Windows straight away; most other devices will have to wait for patches.

Mathy Vanhoef, who in 2017 co-discovered the widespread KRACK flaws in Wi-Fi, groups these 12 new flaws under the name "FragAttacks." He's put an impressive amount of documentation online to explain the flaws, including a dedicated FragAttacks website, an academic research paper, a presentation slideshow, two YouTube videos and a software tool to detect vulnerable devices.

Simply put, the FragAttacks, some of which date back to the first version of Wi-Fi in 1997, let nearby devices "within radio range" attack your Wi-Fi network to steal information and send devices to bad places online.

May 12 10:35

Did The NSA Create Bitcoin?

Op-Ed by Insight History

The mysterious origins of Bitcoin have led to endless theories pertaining to who Satoshi Nakamoto actually is. One prominent theory, which is sometimes circulated in the liberty movement, is that Bitcoin is nothing more than a trojan horse of the establishment, designed to move people away from cash and gold, and towards digital currencies.

The basis for this argument tends to lean heavily on a paper written by three employees of the National Security Agency (NSA) Office of Information Security Research and Technology, Cryptology Division, in June 1996. The paper was titled: How to Make a Mint: The Cryptography of Anonymous Electronic Cash...

May 12 08:20

China sentences bank computer hackers to death

China has sentenced two computer hackers to death to deter the growth of computer crime.

The sentence was imposed on the brothers Hao Jinlong and Hao Jingwen, who hacked their way into a state-owned bank and transferred money into secret accounts. One of the brothers was a bank accountant.

The judge in Zhenjian, Jiangsu province, said that hacking was a new form of crime and should not be treated lightly, according to a report in the Legal Daily.

The total sum they obtained was 260,000 Renminbi (£21,500). Although a large sum by Chinese standards, the sentence is unusually severe.

China has shown increasing concern about loopholes in its computer systems, which are being exploited both by political dissidents and for financial fraud.

Webmaster's Commentary: 

Sounds reasonable!

May 12 08:00

WhatsApp Explains What Will Happen if You Reject Its New Privacy Policy

It's been all over the news recently. WhatsApp is making a controversial change to its privacy policy, and many people aren't happy about it. However, WhatsApp has now explained what will happen to your account if you don't accept the new privacy policy.

How WhatsApp Will Limit Accounts That Don't Accept Its New Privacy Policy

WhatsApp recently updated its FAQ page with an entry regarding what will happen to users who don't accept the new privacy policy. After a period of several weeks from the acceptance date, May 15, users will see the notification to accept the new privacy policy become persistent.

Once the notification becomes persistent, users will lose access to their chat list on the app. Essentially this means you'll lose most of the app's functionality. You will only be able to accept voice and video calls, call back, and reply to messages from the notifications. This means you won't be able to start conversations or make calls.

May 12 07:36

Head of US 'SWAT Team of Nerds' Steps Down After Mysterious IP Address Decision

The head of the Defence Digital Service (dubbed "SWAT Team of Nerds" by its own members) has succeeded in expanding the scope of his department's operations beyond simply solving IT problems for the Pentagon. However, this required him to cut through a tangle of red tape put in place by the department's bureaucracy.

The chief of the Pentagon's Defence Digital Service (DDS), Brett Goldstein, said in an interview with Politico that he will be stepping down in July 2021 after two years in the post.

Goldstein's term expires this year, but it is not unheard-of for the DDS chief's contract to be extended. However, for reasons unknown, Goldstein's contract has not been prolonged despite his achievements in the post. His replacement has also not been announced so far, but his deputy, Katie Olson, who focused on counter-drone operations and assembling the Department of Defence's collection of pathology specimens, will serve as acting chief.

May 12 07:27

Huawei’s ability to eavesdrop on Dutch mobile users is a wake-up call for the telecoms industry

Chinese technology provider Huawei was recently accused of being able to monitor all calls made using Dutch mobile operator KPN. The revelations are from a secret 2010 report made by consultancy firm Capgemini, which KPN commissioned to evaluate the risks of working with Huawei infrastructure.

While the full report on the issue has not been made public, journalists reporting on the story have outlined specific concerns that Huawei personnel in the Netherlands and China had access to security-essential parts of KPN’s network – including the call data of millions of Dutch citizens – and that a lack of records meant KPN couldn’t establish how often this happened.

Both KPN and Huawei have denied any impropriety, though in the years since the 2010 report, Huawei has increasingly found itself labelled a high-risk vendor for telecoms companies to work with, including by the UK’s National Cyber Security Centre.

May 12 07:19

The American Cyber Stasi Will Suppress All Digital Dissent In Biden's Dystopia

CNN's recent report that the US' security services are considering contracting the services of so-called “researchers” as a legal workaround for spying on average Americans confirms that Biden's dystopian hellhole is rapidly moving in the direction of establishing a “Cyber Stasi” for suppressing all digital dissent against the Democrats as they continuing consolidating their de facto one-party rule of the country.

May 12 06:34

How AI Will Soon Change Special Operations

When Gen. Richard D. Clarke was leading special operations forces in Afghanistan years ago, he spent 90 percent of his time thinking about moving and shooting — “the raid, the mission, the kill-capture mission, the destruction of enemy forces,” Clarke said last week at the annual SOFIC conference. But when he returned to Afghanistan last year as the commander of U.S. Special Operations Command, he found that U.S. leaders were focusing most of their mental energy on information.

Commanders now spend about 60 percent of their time mulling what the Taliban and the Afghan population are thinking, and how U.S. actions might influence that, Clarke said. “As we look at the info space and in our fight for competition...working in the information space can have the greatest impact in the coming years.”

May 12 06:31

Multiple states declare emergency, 1,000+ pumps run out of gas, as White House insists there’s NO ‘shortage’ & blames ‘hoarders’

Motorists and even airlines struggled to find fuel across the southeastern US due to the Colonial Pipeline cyberattack, but the Biden administration denied there was a “shortage” and blamed “hoarders” for the “supply crunch.”

Virginia and Florida declared a state of emergency on Tuesday, following North Carolina’s declaration the day before, as the disruption in pipeline operations led to over 1,000 gas stations across a dozen states running out of fuel, according to S&P’s Oil Price Information Service.

May 12 06:21

Florida, Virginia, Georgia and North Carolina declare states of emergency over gas shortages after Colonial Pipeline hack as 1,000 fuel stations run dry in Southeast as people panic buy

The governors of Florida, Virginia and Georgia all declared states of emergency Tuesday in a bid to protect fuel supplies, with some gas pumps already dry in Atlanta and other cities, as the impact from the Colonial Pipeline ransomware attack continues to ripple across the country - hitting the Southeast especially hard.

Panic buyers streamed into gas stations across the Southeast as the key pipeline that supplies the area was threatened by the attack.

More than 1,000 gas stations in the Southeast are now running out of fuel, according to S&P's Oil Price Information Service.

May 12 05:54

Prepping for a cyber pandemic: Cyber Polygon 2021 to stage supply chain attack simulation

The World Economic Forum (WEF) will stage another cyber attack exercise as it continues to prep for a potential cyber pandemic that founder Klaus Schwab says will be worse than the current global crisis.

The SolarWinds hack served as a wake-up call to the supply chain attack vulnerabilities still present in public and private organizations, and it served as a warning that the next breach could be exponentially worse in spreading through any device connected to the internet.

Following up on last year’s Cyber Polygon cyber attack exercise and event aimed at preventing a digital pandemic, the WEF has announced that the 2021 edition will be taking place on July 9.

“A cyber attack with COVID-like characteristics would spread faster and farther than any biological virus” — World Economic Forum

May 12 05:48

Ransomware gang says D.C. police won’t pay $4 million demand, begins leaking files

A group of cybercriminals have begun leaking what it claims to be internal law enforcement files after Washington, D.C.’s Metropolitan Police Department was targeted with ransomware last month.

In a post on the dark web Tuesday, the Babuk ransomware gang alleged that negotiations had “reached a dead end” after declining a payment offer made by police.

May 11 19:08

U.S. Legislators Concerned about China’s Efforts to Genetically Engineer “Super Soldiers”

By B.N. Frank

Americans have had various concerns about the Chinese government for decades. Earlier this week, Full Measure aired a segment that reveals more disturbing details about all of that and more. Of course, it’s not just the Chinese government that Americans have to worry about – this research is being explored in the West as well. Will we see a super soldier arms race? Just what the world needs…

May 11 12:47

Can you hack an AirTag? Absolutely, and this guy shows how

German hacker pulls apart AirTag, gets it to do bad things

Apple's new AirTags have been hacked — but not in any way that you need to worry about.

German hardware hacker Thomas Roth, aka GhidraNinja, posted on Twitter Saturday (May 8) that he had managed to extract, alter and reload an AirTag's firmware

When he put the AirTag in "Lost Mode" and pointed his iPhone at it, the phone's browser was sent to Roth's own website instead of Apple's Find My website.

Later, Roth changed it so that the hacked AirTag Rickrolled him:

What are the dangers of this AirTag hack?
There aren't many.

A criminal could possibly distribute "lost" AirTags that would send the iPhone browsers of random people who come across it to malicious websites, as SlashGear pointed out.

May 11 12:40

5 Reasons Why I’m Not On WhatsApp (and Why You Should Also Consider A Return To SMS)

I’ll admit it. Being off WhatsApp isn’t easy in 2021. I can imagine many readers are wondering how it’s even possible – especially given the fact that so many have experienced the entirity of their human interaction being mediated through a pane of handheld glass since the start of this decade. But for those of you who are curious as to whether it’s possible to live a fully functioning life off WhatsApp – I can assure you it is indeed – and there are some important reasons why it even might be a good idea.
What follows is my list of 5 principled reasons why it’s best to say ‘what’s up?’ anywhere but on WhatsApp:

1. Closed Protocol

My pet hate isn’t something that’s specific to WhatApp, and in many ways is the key contributor to it’s success – but the number 1 problem with so many apps is that they are protocols disguised as platforms.

May 11 09:21

Millions Of Public Transit “Touch ‘N Go” Smartphone Users Can Be Tracked By Law Enforcement

By MassPrivateI

As more and more people use their smartphones to pay for everyday items, public transit agencies are encouraging millions of Americans to use their phones as their primary means of paying their fares.

In New York City and elsewhere, police can use ‘touch ‘n go’ or ‘touchless fares’ to track millions of public transit users’ movements.

New York’s Metropolitan Transit Authority’s OMNY Executive Director Al Putre said that as of December 2020 there have been over 34 million taps...

May 11 08:21

Colonial Says Pipeline Segments Being "Brought Back Online", Goal Is For Service To Be "Substantially Restored" By End Of Week

With fears growing that the Colonial shutdown could last for much longer than initially expected, with some analysts warning that a 5-day shutdown could lead to sharply higher prices, and the Biden admin activating a state of emergency to make sure that critical gasoline supplies continue to flow up the eastern seaboard, moments ago Colonial Pipeline issued an update on its attempts to restore operations, saying that "segments of our pipeline are being brought back online in a stepwise fashion" and that the goal now is to "substantially" restore operational service by the end of the week.

Just out from the company:

Monday, May 10, 12:25 p.m.

May 11 07:50

Colonial Pipeline says one fuel line operating under manual control after cyber attack

Colonial Pipeline said its Line 4 fuel line, which runs from Greensboro, North Carolina, to Woodbine, Maryland, has been restarted and is operating under manual control for a limited time after a cyber attack shut the pipeline system Friday.

Line 4 will be operating for a limited period of time while existing inventory is available, the company said in a notice to shippers.

Colonial’s main gasoline and distillate lines continue to be offline after a ransomware cyberattack shut down the pipeline system, which carries nearly half the fuel consumed along the U.S. East Coast.

May 11 07:05

Newt Gingrich: Pipeline cyber attackers should be 'subject to death penalty'

May 11 06:53

RISC-V is trying to launch an open-hardware revolution

May 11 06:52

Gas Stations Run Dry as Pipeline Races to Recover From Hacking

Gas stations along the U.S. East Coast are beginning to run out of fuel as North America’s biggest petroleum pipeline races to recover from a paralyzing cyberattack that has kept it shut for days.

From Virginia to Florida and Alabama, stations are reporting that they’ve sold out of gasoline as supplies in the region dwindle and panic buying sets in. An estimated 7% of gas stations in Virginia were out of fuel as of late Monday, according to GasBuddy analyst Patrick DeHaan.

The White House said in a statement it is monitoring the situation and directing government agencies to help alleviate any shortages. Colonial Pipeline Co. said it’s manually operating a segment of the pipeline running from North Carolina to Maryland and expects to substantially restore all service by the weekend.

May 11 06:25


The dystopian hellhole that I predicted would become a fait accompli following Biden’s confirmation as President by the Electoral College is quickly becoming a reality after CNN’s recent report that the US security services are considering contracting the services of so-called “researchers” as a legal workaround for spying on average Americans. CNN’s recent report that the US’ security services are considering contracting the services of so-called “researchers” as a legal workaround for spying on average Americans confirms that Biden’s dystopian hellhole is rapidly moving in the direction of establishing a “Cyber Stasi” for suppressing all digital dissent against the Democrats as they continuing consolidating their de facto one-party rule of the country.

According to the outlet, these ostensibly independent contractors would be charged with infiltrating the social media circles of white supremacists and other supposedly terrorist-inclined domestic forces within the country.

May 11 06:11

Biden says no evidence Russian government was involved in pipeline hack

Biden said that Putin still bears "some responsibility" to respond since DarkSide, a cybercrime gang the FBI says is responsible for the attack on a U.S. gasoline line.

May 11 06:08

FBI confirms cyberattack on US pipeline carried out by DarkSide

The cyberextortion attempt that has forced the shutdown of a vital United States pipeline was carried out by a criminal gang known as DarkSide, the Federal Bureau of Investigation (FBI) confirmed on Monday.

“The FBI confirms that the Darkside ransomware is responsible for the compromise of the Colonial Pipeline networks,” said a statement issued by the bureau. “We continue to work with the company and our government partners on the investigation.”

May 10 19:12

FDA: “Operation Quack Hack”: Medical Mafia vs. Medical Health Freedom Fighters

By Maryam Henein

“The past was erased, the erasure was forgotten, the lie became truth.” 1984, George Orwell

IRONY ALERT! “No form of human misery can be allowed to go unexploited, and the coronavirus pandemic is no exception.” WebMD

Under the guise of safety (read: control) and fueled by a narrative that COVID-19 is a pandemic devastating the world, the U.S. government has issued a veritable witch hunt against online health professionals and natural ancient remedies like silver, vitamin C, magnesium, and mineral salts (MMS).

Headed by the Food and Drug Administration (FDA), Operation Quack Hack is cyberstalking and softly terrorizing hundreds of doctors and health professionals who actually care about bolstering people’s health. And yes, “Operation Quack Hack” is the actual name the FDA has given this operation...

May 10 12:19

AAA on pipeline attack: gas price hikes, fuel shortages possible for these states

The national average for gas prices jumped 6 cents on the week to $2.96 and is poised to rise even higher in some areas due to Friday's cyberattack against Colonial Pipeline Co., according to the American Automobile Association.

Colonial Pipeline operates a 5,500-mile system taking fuel from the refineries of the Gulf Coast to the New York metro area.

The pipeline transports more than 100 million gallons a day, or roughly 45% of fuel consumed on the East Coast, according to the company's website. It delivers gasoline, diesel, jet fuel and heating oil and serves U.S. military facilities.

May 10 12:08

F.B.I. confirms group behind the hack of a top U.S. pipeline.

The F.B.I. on Monday confirmed that DarkSide, a hacking group, was responsible for the ransomware attack that closed a U.S. pipeline that provides the East Coast with nearly half of its gasoline and jet fuel.

The confirmation of the hack, which prompted emergency White House meetings over the weekend, comes as the Biden administration in the coming days is expected to announce an executive order to strengthen America’s cyberdefense infrastructure.

President Biden said on Monday that the government has mitigated any impact the pipeline hack might have on the U.S. fuel supply. He added that his administration has efforts underway to “disrupt and prosecute ransomware criminals.”

May 10 10:46

USDOT Declares Emergency Over Colonial Pipeline Shutdown - Waives Trucker Hours of Service Rules

The United States Department of Transportation, (DOT) and the Federal Motor Carrier Safety Administration have declared an emergency over the shut down of the Colonial Pipeline and waived trucker hours-of-service rules to transport fuel in 17 states.

May 10 10:45

DHS launches warning system to find domestic terrorism threats on public social media

The Department of Homeland Security has begun implementing a strategy to gather and analyze intelligence about security threats from public social media posts, DHS officials said.

The goal is to build a warning system to detect the sort of posts that appeared to predict an attack on the U.S. Capitol on Jan. 6 but were missed or ignored by law enforcement and intelligence agencies, the officials said.

The focus is not on the identity of the posters but rather on gleaning insights about potential security threats based on emerging narratives and grievances. So far, DHS is using human beings, not computer algorithms, to make sense of the data, the officials said.

"We're not looking at who are the individual posters," said a senior official involved in the effort. "We are looking at what narratives are resonating and spreading across platforms. From there you may be able to determine what are the potential targets you need to protect."

May 10 09:49


The billionaire’s role in perpetuating vaccine apartheid in the name of protecting intellectual property rights has begun to draw criticism.

May 10 08:13

Colonial Pipeline hack 'painful' for US: Gas analyst

May 10 07:42

Turn Over Routers Or Face Subpoenas, Arizona Lawmakers Tell Maricopa County

Legislators in Arizona and officials in the state’s largest county clashed anew this week over election audit subpoenas, with county officials refusing to hand over routers and claiming they do not have passwords to access administrative control functions of election machines.

Arizona’s Senate told Maricopa County on Friday that it would issue subpoenas for live testimony from the county’s Board of Supervisors unless it received the materials that are being withheld. “We’ve been asked to relay that the Senate views the County’s explanations on the router and passwords issues as inadequate and potentially incorrect,” a lawyer for the Senate said in an email to county officials.

The Arizona Senate subpoenaed a slew of election materials, such as ballots, following the 2020 election. Lawmakers also issued subpoenas for election machines, passwords, and other technology.

May 10 06:42

Maricopa County Elections Witness Testifies that Dominion Ran Entire Election – County Officials and Observers NEVER HAD Access or Passwords! (Video)

Back on November 30, 2020, Maricopa County elections witness Jan Bryant testified before the Arizona legislature.

Jan has a strong project management background. She could not believe what she witnessed during the 2020 election in Maricopa County, Arizona.

Jan said back on November 30, 2020, that Maricopa County officials DID NOT RUN THE ELECTION! Dominion employees John and Bruce did.

Jan’s testimony might explain why Maricopa County officials do not have Admin passwords or access to the Dominion voting machines.

May 10 06:05

US Declares State Of Emergency To Keep Gasoline Flowing After Colonial Fails To Restart Hacked Pipeline

Update 9:00pm ET: The US government declared a state of emergency late on Sunday, lifting limits on the transport of fuels by road in a bid to keep gas supply lines open as fears of shortages spiked after the continued shutdown of the Colonial Pipeline.

“This Declaration addresses the emergency conditions creating a need for immediate transportation of gasoline, diesel, jet fuel, and other refined petroleum products and provides necessary relief,” the Department of Transportation said. White House Press Sec Jen Psaki added that "as the Administration works to mitigate potential disruptions to supply as a result of the Colonial Pipeline incident, @USDOT is taking action today to allow flexibility for truckers in 17 states."

May 10 05:51

Clocks Ticking On Colonial Pipeline Restart: "After 72 Hours... It Gets Really Tough"

While cyber-attacks have disrupted the operations of other energy assets in the U.S. in recent years. this weekend's theft of Colonial’s data, coupled with the detonation of ransomware on the company’s computers, is by far the largest and most impactful.

As we detailed earlier, the hackers who caused Colonial Pipeline to shut down the biggest U.S. gasoline pipeline on Friday began their blitz against the company a day earlier, stealing a large amount of data before locking computers with ransomware and demanding payment, according to people familiar with the matter.

Bloomberg reports that the intruders are part of a cybercrime gang called DarkSide, took nearly 100 gigabytes of data out of the Alpharetta, Georgia-based company’s network in just two hours on Thursday, two people involved in Colonial’s investigation said.

May 10 05:29

Fears of gas price surge after 'DarkSide' cyber attack shuts Colonial Pipeline between Texas and NJ that carries 45% of East Coast fuel: Experts call it 'most significant assault on infrastructure to date in the US'

The largest gasoline pipeline in the country was shut down on Friday after a sophisticated ransomware attack, which experts are calling the most dramatic cyberattack on U.S. soil to date.

In a Saturday statement, Colonial Pipeline said that it 'proactively took certain systems offline to contain the threat, which has temporarily halted all pipeline operations, and affected some of our IT systems.'

The hackers are likely a professional cybercriminal group, and a group dubbed 'DarkSide' was among the potential suspects, two U.S. government officials told Reuters.

May 08 18:07

Emails Entered into Lawsuit Reveal Apple Management Decided NOT to Notify 128 Million iPhone Users of Hack

By B.N. Frank

Since 2019, Apple has known that its AirDrop feature has been leaking user information. Thanks to a lawsuit, millions of iPhone users are now learning their devices have also been compromised...

May 08 08:47

Your old phone number is a hacker's dream — what you need to know

If you've ever changed your mobile phone number, especially in the past few years, then you may have created a huge security and privacy risk for yourself.

That's because your old phone number creates a gateway for hackers, crooks and stalkers to take over your Google, Facebook, Amazon or Yahoo accounts, break into your online bank accounts and even stalk or blackmail you, Princeton researchers detailed in a new academic paper and related website.

This happens because many websites let you log in with a phone number instead of a user name, then let you reset the password by sending a text to the phone number.

In other cases, banks or other financial services send two-factor-authentication (2FA) codes to the mobile number, letting crooks who've obtained your email address and password from data breaches get into the account.

May 08 07:02

A Simple Experiment Demonstrates How Every Electronic Form of Communication Is Monitored and Weaponized by AI Against Americans

The sooner that most Americans stop denying reality, they will soon realize that we all are being tagged in order that most of us will be bagged. This story is provides examples of how this is the most true statement that you will read today. This article contains proof that all of are like cattle that are put on the scales which will eventually decide whether we live or die and on what day and in what order.

I always try to give credit where credit is due. Therefore, the credit goes to Bob Griswold of In an early morning lengthy conversation with Bob, he told me to type ANY 3 numbers, along with the words, “NEW Cases” into my computer’s search engine. Please note, I chose the search engine that is most friendly to patriots, which is duck-duck-go.

May 07 09:47

Windows Defender bug fills Windows 10 boot drive with thousands of files

A Windows Defender bug creates thousands of small files that waste gigabytes of storage space on Windows 10 hard drives.

The bug started with Windows Defender antivirus engine 1.1.18100.5 and will cause the C:\ProgramData\Microsoft\Windows Defender\Scans\History\Store folder to be filled up with thousands of files with names that appear to be MD5 hashes.

May 07 09:46

Qualcomm vulnerability impacts nearly 40% of all mobile phones

A high severity security vulnerability found in Qualcomm's Mobile Station Modem (MSM) chips (including the latest 5G-capable versions) could enable attackers to access mobile phone users' text messages, call history, and listen in on their conversations.

Qualcomm MSM is a series of 2G, 3G, 4G, and 5G capable system on chips (SoCs) used in roughly 40% of mobile phones by multiple vendors, including Samsung, Google, LG, OnePlus, and Xiaomi.

"If exploited, the vulnerability would have allowed an attacker to use Android OS itself as an entry point to inject malicious and invisible code into phones," according to Check Point researchers who found the vulnerability tracked as CVE-2020-11292.

The security flaw could also enable attackers to unlock the subscriber identification module (SIM) used by mobile devices to store network authentication info and contact information securely.

May 07 09:43

Microsoft Edge crashes when watching full screen YouTube videos

A Microsoft Edge bug is causing the browser to become unresponsive and crash while watching YouTube videos or reading comments.

BleepingComputer has confirmed the bug on our machines, and it only takes a few seconds to trigger after a video starts.

In our tests, Microsoft Edge would become unresponsive when watching a video, and a circular loading graphic would appear. Eventually, the circular loading graphic will freeze, and the browser crashes, as shown below.

According to TechDows, who first reported on this issue, the crashes began after users upgraded to Microsoft Edge 90. In our tests, we are using Microsoft Edge 90.0.818.56.

May 07 08:05

Police Agencies Use Cars as Backdoors to Break Into Phones

Law enforcement has been struggling for years to find a way to unlock mobile devices used by suspects believed to be involved in criminal activities, with several officials, including FBI representatives, repeatedly calling for tech giants to step in and help break into password-protected devices.
The most famous case is the iPhone of the San Bernardino attacker, with the FBI publicly requesting Apple to unlock the device and help the investigators get past the passcode screen.

Apple refused to do so on national security claims, explaining that building such a backdoor would eventually compromise all of its devices, as the company said it would have been only a matter of time until such a solution landed in the wrong hands.

Since then, the police have been looking into all kinds of ways to access private data, and according to a report from The Intercept, the Customs and Border Protection officers have discovered one easy method to do the whole thing.

May 07 08:02

Google To Suddenly Flip The Security Switch On Millions Of Gmail Accounts

While the annual World Password Day event is quickly forgotten (it was May 6 if you missed it), it had one memorable moment courtesy of a seemingly unassuming Google blog post. Mark Risher, Google’s director of product management, identity and user security, wrote about password management. However, he also revealed a move that will suddenly make millions of Gmail accounts way more secur

This is where Google has stepped up to the plate this year and announced that it would “start automatically enrolling users in 2SV” or two-step verification which, in the cause of simplicity, can be thought of as the same thing as 2FA here. Although some of the 1.5 billion Gmail users will already have enabled 2FA, Google will make it the default for millions more.

May 07 06:50

Apple just issued this urgent warning to iPhone users and you need to read it

When Apple typically issues mid-cycle iOS updates, I don’t always update my iPhone immediately. Especially if the new update doesn’t address any serious security issues or have any compelling new features, I’ve never been in a rush to update my phone if things are already running smoothly. The recent release of iOS 14.5.1, however, is an exception and an update you’ll probably want to download as soon as possible.

Apple first released iOS 14.5 just about a week ago with a host of new features, including the company’s new App Tracking Transparency framework, new Siri voices, a multitude of new emojis, support for AirTags, and more. Just a few days later, Apple rolled out an iOS 14.5.1 update that it said addressed a bug associated with its App Tracking Transparency feature. An Apple support document, however, reveals that the new iOS update also addresses two serious security issues.

May 07 06:03

FACT CHECK: Bitcoin Mining is BAD For The Climate!?

May 07 05:57

Biggest ISPs paid for 8.5 million fake FCC comments opposing net neutrality

The largest Internet providers in the US funded a campaign that generated "8.5 million fake comments" to the Federal Communications Commission as part of the ISPs' fight against net neutrality rules during the Trump administration, according to a report issued today by New York State Attorney General Letitia James.

Nearly 18 million out of 22 million comments were fabricated, including both pro- and anti-net neutrality submissions, the report said. One 19-year-old submitted 7.7 million pro-net neutrality comments under fake, randomly generated names. But the astroturfing effort funded by the broadband industry stood out because it used real people's names without their consent, with third-party firms hired by the industry faking consent records, the report said.

Webmaster's Commentary: 

Cheaters apparently DO prosper! (Just ask Joe Biden.)

May 07 04:58


A “new” proposal by the Biden administration to create a health-focused federal agency modeled after DARPA is not what it appears to be. Promoted as a way to “end cancer,” this resuscitated “health DARPA” conceals a dangerous agenda.

Last Wednesday, President Biden was widely praised in mainstream and health-care–focused media for his call to create a “new biomedical research agency” modeled after the US military’s “high-risk, high-reward” Defense Advanced Research Projects Agency, or DARPA. As touted by the president, the agency would seek to develop “innovative” and “breakthrough” treatments for cancer, Alzheimer’s disease, and diabetes, with a call to “end cancer as we know it.”

Webmaster's Commentary: 


May 07 04:55



As someone once said, “the Founders did not fight a revolution to gain the right to government agency protocols.” Well it was not just someone, it was Chief Justice John Roberts. He flatly rejected the government’s claim that agency protocols could solve the Fourth Amendment violations created by police searches of our communications stored in the cloud and accessible through our phones.

Webmaster's Commentary: 

I am a Christian Pacifist Activist, who consistently asks her government to resolve all issues through pragmatic, reasoned negotiations which take a long-term and moral approach to both foreign and domestic policies, and never advocates violence; how in the name of heaven, does that make the "the enemy" in the eyes of the Deep State? And yet, I know, in my heart of hearts, that is how this country's "shadow government" sees me.

And folks, I will be honest; as someone who cares about the future of this country, and the futures of all the kids around us, both of family and friends, that hurts.

May 07 03:57

Slap On The Wrist: Honeywell Fined For Sharing F-35, Other Secrets To China

Via South Front,

On May 5th, the US State Department announced that it had reached a $13 million settlement with defense contractor Honeywell.

The settlement is over allegations it exported technical drawings of parts for the F-35 fighters and other weapons platforms to China, Taiwan, Canada and Ireland, according to the Bureau of Political-Military Affairs’ charging document.

“Honeywell voluntarily disclosed to the Department the alleged violations that are resolved under this settlement. Honeywell also acknowledged the serious nature of the alleged violations, cooperated with the Department’s review, and instituted a number of compliance program improvements during the course of the Department’s review. For these reasons, the Department has determined that it is not appropriate to administratively debar Honeywell at this time.”

Webmaster's Commentary: 

Forgive me, but given the magnitude of this breach, why is no one going to jail over this?!?

Is it because of the "contributions" , overt and covert, that Honywell has made, over the years, to both sides of the aisle?!?

This is absolutely mind-blowing, that no one of their executive staff, has been made to take responsibility for this!!

May 06 13:43

RSA Is Dead — We Just Haven’t Accepted It Yet

One of the biggest features of the internet is that it’s constantly evolving at an unbelievable pace. You can’t keep track of time in decades, or even years sometimes, when it comes to the web. The friendly AOL voice that used to greet us with, “You’ve got mail,” now feels like an ancient relic. Nobody has seen Jeeves in years.

So why is the internet still overleveraging a cryptosystem that is coming up on 45 years old?

In the mid-1970s, as computer scientists and mathematicians rushed to find a viable public key cryptosystem, two emerged: Diffie-Hellman and RSA. The internet equivalents of the Beatles and the Stones. While Diffie-Hellman bowed out like the Beatles and has now found new life in a new generation of elliptic curve approaches that were inspired by it, RSA is like the Stones, still touring well past its prime and begging the question, “Should we still let them be going out there?”

May 06 13:40

Roko's Basilisk : The Thought Experiment That Could Enslave The Human Race

(Note to the reader: This article discusses a philosophical inquiry that many people find deeply, emotionally disturbing. Truly, and in all sincerity: If you're susceptible to existential dread, stop reading.)

Much has been said in recent years of the purported dangers and lethalities of artificial intelligence (AI). Technologists such as Elon Musk have said that AI is "far more dangerous than nukes," as CNBC says, and that a lack of regulations mediating the relationship between man and machine is "insane." The difference, he cites, is between case-specific AI — algorithms that control, say, what ads are pushed your way on Facebook — and AI with an open-ended utility function, which basically teach and write themselves. Era-defining physicist Stephen Hawking said the same before he passed away, as Vox recounts, as have AI researchers at Berkeley and Oxford.

May 06 13:33

IBM Creates World’s First 2nm CPU Using Nanosheets

IBM has claimed a world-first for its own labs, with “2nm” silicon now in production. All nanometer references in foundry press releases are essentially made-up numbers when used in this fashion. There is no single, defining feature in the chip that matches 2nm and is used for tracking progress in this fashion. Node names are defined by each foundry individually. This is how Intel can define a 10nm node with approximately the same transistor density as TSMC’s 7nm. This gap in numbers can create the illusion that one company is more advanced than the other purely based on a marketing metri

May 06 09:25

This old programming language is suddenly hot again. But its future is still far from certain

Fortran is the oldest commercial programming language, designed at IBM in the 1950s. And even though, for years, programmers have been predicting its demise, 64 years later it's still kicking, with users including top scientists from NASA and the Department of Energy using it on the world's most powerful supercomputers.

It even recently – and very unexpectedly – popped up again in a ranking of the most popular programming languages, albeit in 20th place. This resurgence has been explained by the huge need for scientific number crunching; something that Fortran is very good at.

May 06 06:35

Data leak makes Peloton’s Horrible, No-Good, Really Bad Day even worse

Peloton is having a rough day. First, the company recalled two treadmill models following the death of a 6-year-old child who was pulled under one of the devices. Now comes word Peloton exposed sensitive user data, even after the company knew about the leak. No wonder the company’s stock price closed down 15 percent on Wednesday.

Peloton provides a line of network-connected stationary bikes and treadmills. The company also offers an online service that allows users to join classes, work with trainers, or do workouts with other users. In October, Peloton told investors it had a community of 3 million members. Members can set accounts to be public so friends can view details such as classes attended and workout stats, or users can choose for profiles to be private.

May 06 06:34

Researchers Create Free-Floating Animated Holograms That Bring Us One Step Closer to Star Trek's Holodecks

Back in 2018, researchers from Brigham Young University demonstrated a device called an Optical Trap Display that used lasers to create free-floating holographic images that don’t need a display. That same team is now demonstrating a new technique that allows those holographic images to be animated: goodbye TVs, hello holodecks.

Most 3D holograms require a special screen to be displayed, and even then the 3D effect is limited to a small field of view. Images genuinely look like they exist in 3D space, but step to the side and suddenly you see nothing at all. The approach taken by the researchers at Brigham Young University is radically different. Screens are replaced by lasers: an invisible one that manipulates a tiny opaque particle floating in the air, and a visible one that illuminates the particle with different colors as it travels through a pre-defined path, creating what appears to a floating image to a human observer.

May 06 06:33

Scammers Score $2 Million from the WallStreetBets Crowd With Fictional Crypto Launch

A cryptocurrency scam recently pilfered at least $2 million from WallStreetBets enthusiasts, convincing them that they were buying into a new crypto coin connected to the popular memestock, according to a report from Bloomberg News.

For weeks, moderators of the notorious Reddit forum have warned users to avoid fraudulent scams based around the good WSB name. A post, tethered to the top of the group’s page, asks community members to be wary of offers related to WSB products:


People keep posting a press release about an “official” WallStreetBets distributed app. (Aka, a crypto pyramid scheme)

Nothing could be further from the truth. We are strongly anti-monetization. This scam has nothing to do with us.

May 06 06:24

I tracked my kid with Apple's Airtags to test its privacy features

I clipped a keychain with one of Apple's tiny new Bluetooth trackers, AirTags, onto my son's book bag and waved goodbye to him on the school bus. I watched on my iPhone's Find My app as the bus stopped at a light a few blocks down from our street.

But then the tiny "key" icon on the app stopped moving. The item was "last detected" seven minutes ago at a busy intersection less than a mile away. Traffic, maybe? Five more minutes passed with no update. Is there an issue with the app? After another 10 minutes, my heart started to race; still nothing.
Finally, the tracker was detected four miles away in front of his school. Relieved, I decided more information in this case was worse; I'd go back to just tracking my keys. Apple later told me the delay was due to the tracker needing to communicate with Bluetooth on other iOS devices in the Find My network along the bus route before the AirTag's location could be updated to iCloud and the app.

May 06 05:59

Beware: This dangerous new malware can steal your passwords and your cryptocurrency

Phishing attacks have spawned a slew of new malware threats in recent days, according to researchers who’ve identified a serious threat actor behind three new connected malware families — which have been labeled as Doubledrag, Doubledrop, and Doubleback — and another unrelated threat called Panda Stealer, which is a variant of a cryptocurrency stealer and is mostly being spread via global email spam.

Here’s a rundown on these new malware discoveries, including what researchers have found and the implications herein: Let’s start with a report from FireEye’s Mandiant cybersecurity team, which revealed malware strains that have never been seen before, with “professionally coded sophistication,” and that came in two waves of phishing attacks globally. These attacks hit some 50 organizations at the end of 2020, with the first wave reported on December 2 and the second wave coming between December 11 and December 18.

May 06 05:52

Glitterbomb Trap Catches Phone Scammer (who gets arrested)

May 06 05:52

New Bill Would Ban Bitcoin Mining Across New York State for Three Years

A new bill that hit the New York state senate on Monday is aiming to put a multi-year pause on crypto mining operations across the state until authorities can fully suss out what that mining is doing to the climate and local environment. Bill 6486 is being spearheaded by state Sen. Kevin Parker, who had previously sponsored other bills to help the state meet its climate goals.

Bitcoin mining has come under increasing scrutiny for the staggering carbon footprint tied to electricity use to keep operations running 24/7. An analysis by Digiconomist puts the global mining footprint at around 53 megatons of carbon dioxide annually, equivalent to all of Sweden’s emissions. Upstate New York has recently become a hotbed of mining activity, and there could be more mines in the works.

May 06 05:48

AirTag review: They work great—maybe a little too great

Apple's AirTag is not a revolutionary new product. Rather, it's a significant refinement of an idea that, up until now, has been fairly niche. It works very, very well, but it works so well it seems to undermine Apple's attempts to focus its products on privacy and security.

We spent several days testing AirTags in different situations, and we found that they work stunningly well—at least in a dense urban environment with iPhones all around.

I can't imagine recommending any of the preceding attempts at this concept over AirTags if you have an iPhone. (Sadly, Android users are quite literally left to their own devices—in more ways than usual, as you'll see later in this review.)

AirTags are easy to use, well designed, and relatively affordable. If you're in the market for something like this, they're easy to recommend. But we're a little more worried about what these AirTags mean for the people who don't buy one. Stick around and we'll explain.

May 06 05:45

Forensic Evidence in Michigan Prove Voting Machines Had Unauthorized Implant to Circumvent Security

May 06 05:12


After weeks of wonder by the networking community, the Pentagon has now provided a very terse explanation for what it’s doing. But it has not answered many basic questions, beginning with why it chose to entrust management of the address space to a company that seems not to have existed until September.

The military hopes to “assess, evaluate and prevent unauthorized use of DoD IP address space,” said a statement issued Friday by Brett Goldstein, chief of the Pentagon’s Defense Digital Service, which is running the project. It also hopes to “identify potential vulnerabilities” as part of efforts to defend against cyber-intrusions by global adversaries, who are consistently infiltrating U.S. networks, sometimes operating from unused internet address blocks.

May 05 09:56

This massive DDoS attack took large sections of a country's internet offline

A massive distributed denial of service (DDoS) attack took down the websites of more than 200 organisations across Belgium, including government, parliament, universities and research institutes.

The DDoS attack started at 11am on Tuesday 4 May and overwhelmed the web sites with traffic, rendering their public-facing sites unusable for visitors, while the attack overwhelmed internal systems, cutting them off from the internet.

The attack targeted Belnet, the government-funded ISP provider for the county's educational institutions, research centres, scientific institutes and government services – including government ministries and the Belgian parliament. Some debates and committee meetings had to be postponed as users couldn't access the virtual services required to take part.

May 05 07:22

Cyber Command shifts counterterrorism task force to focus on higher-priority threats

U.S. Cyber Command is shifting the majority of its special task force aimed at targeting the Islamic State group to focus more on nation-state actors, particularly in the Indo-Pacific region, which the command and the Department of Defense are prioritizing.

Joint Task Force-Ares was created in 2016 to combat the militant organization online as a compliment to the global coalition fighting against the group’s grip on power in Iraq and Syria. The task force has since undergone several changes. The Army’s cyber component was originally tasked to lead the joint cyber effort, but in 2018, responsibility shifted to Marine Corps Forces Cyberspace Command, which allowed the team to focus not just on the Islamic State group, but more broadly on counterterrorism efforts globally.

May 05 06:08


The emergence of the internet was met with hope and enthusiasm by people who understood that the plutocrat-controlled mainstream media were manipulating public opinion to manufacture consent for the status quo. The democratization of information-sharing was going to give rise to a public consciousness that is emancipated from the domination of plutocratic narrative control, thereby opening up the possibility of revolutionary change to our society’s corrupt systems.

But it never happened. Internet use has become commonplace around the world and humanity is able to network and share information like never before, yet we remain firmly under the thumb of the same power structures we’ve been ruled by for generations, both politically and psychologically. Even the dominant media institutions are somehow still the same.

May 05 05:16

Chinese TV maker: Yes, our Android TVs spied on customers [updated]

Skyworth blames collection of sensitive data on third-party app
Updated with comment from Skyworth USA.

A top Chinese TV maker that's made inroads into the North American market admits that its TVs have been spying on users, or at least users in China.

Skyworth, which made a big splash at CES 2020 in Las Vegas and sells at least six TV models in the U.S., said in a statement posted online last week that a third-party application called Gozen Service on its Android TVs had been collecting more data than it was supposed to.

According to an unnamed Skyworth TV owner who posted about it on a Chinese software-development forum, the Gozen Service app is developed by a company called Gozen Data. The app collects data about all of the internet-connected gadgets on the home wireless network, as well as the names of nearby Wi-Fi networks, and sends to a Gozen-run web server.

May 05 04:52

Facebook rejects creepy ads that show how much data it collects about you

Signal wanted to run ads on Instagram putting it all in your face

It's no secret that Facebook, Instagram and WhatsApp collect a fair bit user data. But how much exactly? A new blog post by the makers of Signal, the open-source secure messaging platform, shows that it's quite a lot.

"You got this ad because you're a newlywed Pilates instructor and you're cartoon crazy," reads one ad that Signal had planned to run on Instagram. "This ad used your location to see you're in La Jolla [a San Diego suburb]. You're into parenting blogs and thinking about LGBTQ adoption."

That's a shame, because as Harada explained in the blog post, "the way most of the internet works today would be considered intolerable if translated into comprehensible real-world analogs, but it endures because it is invisible."

"Facebook's own tools have the potential to divulge what is otherwise unseen," he added. "We wanted to use those same tools to directly highlight how most technology works."

May 04 13:54

Biden Admin Finds Legal Loophole To Spy On American Citizens It Considers “Extremists”

President Joe Biden’s administration has found a legal loophole which will allow it to spy on American citizens without a warrant. The administration is reportedly planning to work with private firms to monitor “extremist chatter by Americans online” because the federal government is legally limited to what they can do without a warrant.

May 04 11:06

4,700 Amazon employees had unauthorized access to private seller data

Thousands of Amazon employees, including those who developed private-label goods for the e-commerce giant, enjoyed years of access to sensitive third-party seller data, according to a new report.

An internal audit in 2015 traced the issue to lax security protocols, including the use of a tool called “spoofer access,” which allowed Amazon employees to view and edit accounts as sellers. The employees had access to profile information, inventory levels, product pricing, and even the ability to cancel orders. The audit, obtained by Politico, says that spoofer access was available to employees from around the world and persisted until at least 2018.

May 04 10:38

Intel CEO says chip shortage to last ‘couple of years’

The global semiconductor shortage roiling a wide range of industries likely won’t be resolved for a few more years, according to Intel Corp.’s new CEO Pat Gelsinger.

The company is reworking some of its factories to increase production and address the chip shortage in the auto industry, he said in an interview with CBS News, based on a transcript of “60 Minutes” that aired Sunday. It may take at least several months for the strain on supply to even begin easing, he added.

“We have a couple of years until we catch up to this surging demand across every aspect of the business,” Gelsinger said.

May 04 10:16

Group dedicated to exposing Chinese government secrets begins countdown for reveal this week

The group has initiated a five-day countdown for its next release.

Intrusion Truth initiated a countdown on its Twitter account Friday, promising its roughly 6,000 followers “something new” in five days.

But for those unfamiliar with the murky world of nation-state espionage, Intrusion Truth is unlikely to ring any bells. But the group has managed to make a name for itself online.

So who exactly are Intrusion Truth and what should we expect to see next week? Here’s what you need to know.

Who is Intrusion Truth?
Intrusion Truth is a mysterious group of self-described analysts who first emerged in 2017. The group, made up of an unknown number of anonymous members, quickly made a name for itself by taking the unusual step of exposing the identities of suspected Chinese government-backed hackers.

May 04 09:47

Patch issued to tackle critical security issues present in Dell driver software since 2009

Five serious vulnerabilities in a driver used by Dell devices have been disclosed by researchers.

On Tuesday, SentinelLabs said the vulnerabilities were discovered by security researcher Kasif Dekel, who explored Dell's DBUtil BIOS driver -- software used in the vendor's desktop and laptop PCs, notebooks, and tablet products.

The team says that the driver has been vulnerable since 2009, although there is no evidence, at present, that the bugs have been exploited in the wild.

The DBUtil BIOS driver, which comes pre-installed on many Dell machines running Windows, contains a component -- the dbutil_2_3.sys module -- which was subject to Dekel's scrutiny.

May 04 07:51

Anti-science Twitter censors all peer-reviewed science exposing futility of masks

Prashant Bhushan, an advocate-on-record for the Supreme Court of India, was punished by Twitter for tweeting about a peer-reviewed study showing that face masks are ineffective and harmful.

Twitter pulled the tweet citing a violation of its “community standards.” The linked study warns that wearing a face mask restricts breathing, lowers blood oxygen levels (hypoxemia), and increases blood carbon dioxide levels (hypercapnia). Wearing a face mask persistently can lead to long-term health effects, it further explains.

Joining in on the fun, YouTube also pulled a video featuring a scientific roundtable on the Wuhan coronavirus (Covid-19). In that “offensive” video, a professor from Harvard University explained that children in particular should not wear a face mask because of the risks involved.

May 04 05:38


U.S. Customs and Border Protection purchased technology that vacuums up reams of personal information stored inside cars, according to a federal contract reviewed by The Intercept, illustrating the serious risks in connecting your vehicle and your smartphone.

The contract, shared with The Intercept by Latinx advocacy organization Mijente, shows that CBP paid Swedish data extraction firm MSAB $456,073 for a bundle of hardware including five iVe “vehicle forensics kits” manufactured by Berla, an American company. A related document indicates that CBP believed the kit would be “critical in CBP investigations as it can provide evidence [not only] regarding the vehicle’s use, but also information obtained through mobile devices paired with the infotainment system.” The document went on to say that iVe was the only tool available for purchase that could tap into such systems.

May 04 05:35


The UN affiliated Organization for Economic Co-operation and Development (OECD) proposes that governments should publish rules as computer code to be directly consumed by software and machines. ? TN Editor

Rules as Code (RaC) is a highly innovative idea that addresses how law and regulations are simultaneously produced in natural language and in working computer code. RaC has important implications not only for producing better rules (meaning clear and fit for purpose), but providing also a strong impetus for a powerful new generation of rule-based software platforms (ones better suited for real-world rules produced by governments and businesses).

RaC is a reaction to, and a projection of, the broader on-going digital revolution impacting citizens and businesses.[4] The World Economic Forum has coined the term ‘The Fourth Industrial Revolution’ to describe the fundamental change in the way we live, work, and where the physical, digital, and biological worlds are merging.

Webmaster's Commentary: 

Hackers will have fun with this!

May 04 05:06

Intel and AMD chips are vulnerable to scary new attack — Spectre has returned [Update: Intel says threat is mitigated]

Now Spectre has returned. Researchers from the University of Virginia and the University of California San Diego determined that the new variants leak data via micro-op caches, which are used to speed up processing by storing simple commands so CPUs can grab them quickly.

Every AMD (since 2017) and Intel (since 2011) chip uses micro-op caches so they are all theoretically vulnerable to this attack. The security researchers who discovered these variants listed three possible ways a CPU could be infiltrated.

  • A same thread cross-domain attack that leaks secrets across the user- kernel boundary;
  • A cross-SMT thread attack that transmits secrets across two SMT threads running on the same physical core, but different logical cores, via the micro-op cache;

May 03 21:12

Privacy Concerns around Covid-19 immunity Passports

Countries worldwide have responded to the Covid-19 pandemic by closing borders and shutting down services and facilities to prevent the virus's spread. This has had a devastating impact on businesses, particularly the travel, hospitality, and entertainment sectors. Now, governments are exploring the possibilities of implementing Covid passports. This article explores the dangers behind doing so and how this may have an impact on our freedoms.

May 03 10:06

Hacking incident exposes shocking extent of global surveillance network

May 03 09:41

Having problems with calls and data on your smartphone? Try this simple fix

To me, it didn't seem right that three handsets would suffer from the same problem. That set off alarm bells in my head. I'd have had alarm bells after the first replacement. The chances of two handsets having a similar problem are low, doubly so when they're different makes and models.

It had to be a common factor unrelated to the handset itself. And since the reader had ruled out local cellular issues, the next thing that came to my mind was the SIM card.

I asked the reader if the SIM card had been replaced.


Photos showed that while the SIM was a bit scratched, it looked OK. I'd seen worse. But I recommended the reader get a replacement from their provider.

A few days later, I heard back from them.

The problem was fixed.

May 03 08:40

Caller ID should not be trusted because phone numbers are too easy for criminals to fake, Ofcom warns

In a method known as 'number spoofing', fraudsters can deliberately change their caller ID to disguise who they are or even pose as legitimate organisations.

This means that when they call their target, the number that comes up on their target's phone makes it look like they are being called by their bank, for example.

May 03 08:30

The end of free speech: Why is Britain handing huge new powers of censorship to tech giants to control what we write and say?

The UK is turning its broadcast regulator into the Hatefinder General, with a new law compelling social media companies to enforce an authoritarian crackdown on our behaviour that’s ‘unprecedented in any democracy’.

As the British nanny state widens its scope with the government’s new Online Safety Bill it is a sign that the German concept of wehrhafte Demokratie – or militant democracy – has arrived on our shores, dictating that some of our rights are sacrificed in the interests of order.

Once enshrined in law, the bill will ensure that true, online freedom of speech will follow the dial-up modem and those once omnipotent AOL subscription CDs into the dustbin of internet history. According to the authors of ‘You’re on Mute”, a briefing document from the Free Speech Union (FSU), the government’s plans “will restrict online free speech to a degree almost unprecedented in any democracy”.

May 03 07:54

MINISTRY OF TRUTH: 12 state attorneys general demand Big Tech platforms eliminate all speech from people injured by vaccines

Attorney generals from twelve states are calling on the world’s top social media networks to completely eradicate any negative claim about covid-19 vaccines. Facebook CEO Mark Zuckerberg and Twitter CEO Jack Dorsey have already implemented “misinformation” policies that remove any dissent against government lock downs, mandatory masks, and Big Pharma’s forceful vaccine push. However, the new covid vaccines are so faulty and unsafe, vaccine injury and death claims are still spreading across social media.

May 03 07:27

Why would Google suddenly need to know my birthday?

Q: When I logged into my Gmail account today, Google instructed me to add my birthday, saying this information is required to “comply with the law.” Is this a legitimate request? I have had a Google account for many years. Why would they suddenly need to know my birthday? I appreciate any enlightening information you may have on this subject!

— Anne Kuck, Bothell

A: I haven’t found a legal requirement for Google to ask for your birthday. But here’s what Google support says: “When you sign up for a Google Account, you may be asked to add your birthday. Knowing your birthday helps us use age-appropriate settings for your account. For example, minors may see a warning when we think they’ve found a site they may not want to see.”

If you’re like me, you may not want to give up personal information. Fortunately, there’s no checking on the date you enter, so feel free to get creative.

May 02 07:52

Biosurveillance On Your Smartphone? “Nano flashlight could allow future cell phones to detect viruses, more”

By Jason Erickson

Biosurveillance is beginning to enter the mainstream lexicon as the terrified public continues to seek solutions to stay virus-free, presumably forever. It’s also the new cash cow for companies seeking to capitalize on all things COVID-19.

Our colleagues in the independent media have been charting this trend extensively, reporting on everything from Smart Masks connected to your smartphone to give continuous health alerts; Bio-Barcodes via GMO spores hidden in food to track the supply chain; and the ultimate conspiracy – an implantable DARPA microchip for COVID detection. Here's the latest from MIT...

May 02 07:39

Farm Robot Zaps Weeds With High-Powered Lasers, Eliminates Need For Toxic Herbicides

In the same way, a self-driving car sees its surroundings on city streets, sensors that use machine learning technology allow farm robots to navigate fields. Automation is a growing presence in the farm industry, and a new generation of autonomous robots is helping farmers shape tomorrow's crops.

Crops that can be harvested with barely any or no herbicides would be beneficial not just to humans but also to the environment. An oddly-shaped autonomous farm tractor can eliminate the need for toxic herbicides by using high-powered lasers to weed about 20 acres per day to solve this dilemma.

Robotics company Carbon Robotics unveiled its newest weed elimination robot, Autonomous Weeder, which leverages artificial intelligence, sensors, and lasers to eliminate weeds on commercial farms.

May 02 05:57

Israeli-made robots are powering the e-commerce revolution

One of the first things that strike you when you enter eGold’s fulfillment center in the port city of Ashdod, is how quiet things are. The 20,000 square meter facility, that handles thousands of items a day, taking them from the container ship they arrived on and prepping them for delivery to customers’ homes is eerily silent. Where you would expect to hear the grumbling of engines, the whizzing and burring of conveyor belts, the shouting of instructions between workers, and the shrill warning of forklifts backing up, all you can hear is the hum of electric motors working in perfect sync.

May 02 03:28

Thieves break Experian’s credit freeze, 'thaw' accounts: report

Experian faces issues with how accounts are ‘thawed,’ according to a report from KrebsOnSecurity.

The cybersecurity blog reported that a reader had his freeze "thawed" without authorization on Experian’s website, demonstrating "how truly broken authentication and security remains in the credit bureau space."

The consumer credit reporting company, which maintains credit information on approximately 220 million U.S. consumers, allows consumers to lock or freeze their accounts to restrict access to their credit report. This makes the account more secure, protecting it from thieves who would use the information to open new accounts.

The KrebsOnSecurity report cited a software engineer who put a freeze on his credit files last year at Experian, Equifax and TransUnion after thieves tried to open multiple new payment accounts in his name.

Apr 30 16:25

Twitter isn’t censoring accounts to keep users ‘safe’, it is using its power to spoon-feed the world establishment narratives

It’s one thing to have policies against violence, abuse, and harassment. But in “protecting” users, Twitter is hell-bent on censoring voices that rock the boat, even when all they have tweeted is a peer-reviewed scientific paper.

Last week, Simon Goddek, who has a PhD in biotechnology and researches system dynamics, tweeted a link to a scientific study titled, “Is a Mask That Covers the Mouth and Nose Free from Undesirable Side Effects in Everyday Use and Free of Potential Hazards?”

Some time later, his account was frozen and he received a notice from Twitter that it would remain frozen until he deleted the offending tweet, and for the 12 hours following that.

Apr 30 14:21

‘Bat-sense’ algorithm could be used to monitor people and property without cameras

Smartphones and laptops can run the algorithm

A “bat-sense” algorithm that generates images from sounds could be used to catch burglars and monitor patients without using CCTV, the technique’s inventors say.

The machine-learning algorithm developed at Glasgow University uses reflected echoes to produce 3D pictures of the surrounding environment.

The researchers say smartphones and laptops running the algorithm could detect intruders and monitor care home patients.

Study lead author Dr Alex Turpin said two things set the tech apart from other systems:

Firstly, it requires data from just a single input — the microphone or the antenna — to create three-dimensional images. Secondly, we believe that the algorithm we’ve developed could turn any device with either of those pieces of kit into an echolocation device.

Apr 30 14:00

Opera upgrades user access to decentralized web via Unstoppable Domains

Chromium-based web browser Opera is all set to fully integrate with blockchain domain name provider Unstoppable Domains in a bid to provide millions of its users with decentralized web access.

Opera users will now be able to access decentralized websites hosted via IPFS using Unstoppable Domains’ popular .crypto NFT addresses from the Opera browser. This will include platforms such as iOS, Android, Windows, Mac or Linux.

Right now, Opera has over 320 million monthly active users across its offerings, following the addition of a crypto wallet to its browsers in 2019.

Crypto domains
Users of Unstoppable Domains are granted full ownership and control when they claim a domain because it is minted as an NFT on the Ethereum blockchain.

Domain names such as .crypto replace complex wallet addresses for payments across over 40 cryptocurrency wallets and exchanges in addition to accessing the decentralized web through Opera.

Apr 30 11:43

DHS Extends REAL-ID Airport Enforcement “Deadline” Again

By Edward Hasbrouck

The Department of Homeland Security has once again postponed its self-proclaimed “deadline” for enforcement of the REAL-ID Act at airports, this time from October 1, 2021, to May 3, 2023.

The latest postponement proves, once again, that the dates of the DHS threats to begin “enforcing” the REAL-ID Act at airports are as changeable as the dates in any of the threats made by extortionists or kidnappers. Today’s DHS press release is more like a ransom note than a legal notice: If you get an ID we deem acceptable, we might not harass you as much when you fly, and we might allow you to exercise your right to travel.

It remains unclear what enforcement of the REAL-ID Act at airports might mean. No law requires air travelers to have any ID, and the REAL-ID Act doesn’t change that...

Apr 30 11:00

New York City Public Squashes Dream of Police to Use Robot Dogs on the Streets

By Nicholas West

The creator of Black Mirror – the dystopian sci-fi series – has famously said that he chose to stop making episodes because our reality has essentially become equally dystopian to anything else he could create.

Apparently, a healthy dose of New York City residents had seen one of Black Mirror’s most iconic episodes, “Metalhead”, because an outpouring of resistance ensued after a robot dog – “Digidog” – was spotted prowling the streets, and the NYPD subsequently admitted they were beginning to use the dog at crime scenes...

Apr 30 08:22

‘Brain-like device’ mimics human learning in major computing breakthrough

Scientists have developed a device modelled on the human brain that can learn by association in the same way as Pavlov’s dog.

In the famous experiment, Russian physiologist Ivan Pavlov conditioned a dog to associate a bell with food. In order to replicate this way of learning, researchers from Northwestern University in the US and the University of Hong Kong developed so-called “synaptic transistors” capable of simultaneously processing and storing information in the same way as a brain.