Links für 2025 KW 22#
Meine To-Read Liste, Zusammengefasst von Mistral-Small-24B.
USA: Admin-Panels zahlreicher Wasserwerke frei zugänglich im Netz:
The text reports on a significant security vulnerability discovered by researchers from Censys, who found approximately 400 control panels for water treatment facilities in the USA that were freely accessible over the internet. These systems, which rely on the same SCADA software, allowed unauthorized access to critical infrastructure, with some systems even permitting full control without authentication. The researchers, who initially identified these vulnerabilities through the analysis of TLS certificates, notified the software manufacturer and the US Environmental Protection Agency (EPA). Following these notifications, many of these systems were secured, although some remained unprotected. The EPA and the US Cybersecurity and Infrastructure Security Agency (CISA) collaborated to issue guidelines for securing these control systems, emphasizing the importance of implementing measures like multi-factor authentication.
Supreme Court allows DOGE to access Social Security data:
The Supreme Court, with a conservative majority, has permitted members of the Trump administration’s Department of Government Efficiency (DOGE) to access sensitive Social Security Administration data. This decision overturned a lower court’s injunction and was met with objections from the court’s three liberal justices. DOGE, established by Elon Musk, aims to modernize systems and detect fraud, but critics, including progressive groups and unions, argue that this access violates privacy laws and could expose Americans‘ personal data to misuse.
The White House celebrated the ruling as a victory for efficiency and the rule of law, while liberal Justice Ketanji Brown Jackson criticized the court’s intervention as unnecessary. The data in question includes Social Security numbers, medical records, and financial information. The lawsuit challenging DOGE’s actions alleges violations of the Privacy Act and the Administrative Procedure Act. The Supreme Court also issued a separate order allowing the Trump administration to shield DOGE from freedom of information requests, further complicating the ongoing litigation.
Falsehoods Programmers Believe About Aviation:
The text is a blog post by engineers at FlightAware, discussing common misconceptions about aviation data that programmers often assume to be true. These false assumptions can lead to issues in flight tracking systems. The post highlights various inaccuracies, such as the belief that flights always depart from gates, adhere to strict schedules, or are consistently identified by a single flight number. It also covers misconceptions about airport identifiers, waypoint names, altitude definitions, and the reliability of flight information from Air Navigation Service Providers.
Additionally, the post addresses false assumptions about ADS-B messages, including their sources, accuracy, and the reliability of the information they contain. The engineers at FlightAware emphasize the need for their flight tracking engine, Hyperfeed, to correctly interpret these complexities to provide accurate and consistent data for their users.
The overall message is that aviation data is messy and full of exceptions, and software engineers need to be aware of these falsehoods to build robust systems.
Medieval Africans Had a Unique Process for Purifying Gold With Glass:
2005 discovery of ancient coin molds in Tadmekka, Mali, led to a multi-year investigation into medieval African gold purification methods. Archaeologists found highly refined gold droplets and glass fragments in 11th-century molds, which were used to create „bald dinar“ coins. This discovery revealed that Africans used recycled glass from broken vessels to refine gold, a method not seen before in the archaeological record. This process involved mixing gold ore with glass, which dissolved impurities but not the inert gold. Europeans of the same period used cupellation, a different process involving lead. Walton’s team at the Center for Scientific Studies in the Arts replicated this method using gold dust, local sand, and synthetic glass, confirming the ingenuity and sophistication of the medieval Malian technique.
Windows 10 spies on your use of System Settings:
The text discusses the discovery of Windows 10’s spying activities when accessing the System Settings app. The author, a fan of Nir Sofer’s utilities, used two DNS logging programs, DNSLookupView and DNSQuerySniffer, to monitor DNS requests. While exploring the System Settings, the author noticed that merely viewing the settings triggered DNS queries to www.bing.com and cxcs.microsoft.net, indicating potential telemetry or spying activities. Further investigation using TcpLogView revealed that these DNS queries were followed by outbound TCP requests to the same addresses, confirming data transmission.
To mitigate this, the author blocked cxcs.microsoft.net and found that the System Settings app still functioned but attempted to connect to other servers like ctldl.windowsupdate.com and www.bing.com. The author suggests several defensive measures, including modifying router settings, using Pi Hole, or employing firewalls with outbound control. The author also emphasizes that Bing is not just a search engine but also plays a role in telemetry. Modifying the hosts file to block specific domains was tested but showed inconsistent results.
The text concludes by noting that Microsoft’s spying activities are extensive and often overlooked. The author lists several sub-domains to block and warns about the limitations of DNS blocking when using Secure DNS or VPNs. The author also mentions related research by Helge Klein, which identified numerous hosts and IP addresses that Windows communicates with.
Musk-Trump dispute includes threats to SpaceX contracts:
The text discusses a public feud between former President Trump and Elon Musk, which escalated on social media after Musk criticized a budget bill supported by Trump. Trump threatened to cancel government contracts with Musk’s companies, including SpaceX, in response. Musk initially reacted by announcing the decommissioning of SpaceX’s Dragon spacecraft, but later walked back this statement. The dispute raised concerns about potential disruptions to SpaceX’s work with NASA and the Defense Department, which rely heavily on SpaceX for launch services and other missions. The exchange was seen by some as political posturing, given the interdependence between the government and SpaceX. Meanwhile, Trump also withdrew his nomination of Jared Isaacman for NASA administrator, citing political differences. The search for a new NASA administrator was announced to be led by Gen. Dan Caine, though his relevance to the position was questioned.
Unfit for Work: The startling rise of disability in America:
The text delves into the significant increase in the number of Americans receiving disability benefits over the past three decades, highlighting that this group is often overlooked in discussions about the social safety net. The federal government spends more on disability payments than on food stamps and welfare combined, yet these recipients are not counted among the unemployed, making them invisible in economic discussions.
The story focuses on Hale County, Alabama, where nearly a quarter of working-age adults are on disability. The process of determining disability is subjective, often involving judgments about conditions like back pain or mental illness. Doctors and judges play crucial roles in these decisions, and the system can be influenced by factors like education level. Many people on disability struggle to imagine alternative jobs that could accommodate their health issues.
The closure of local mills and factories has led many workers to turn to disability benefits, as these jobs often disappear and retraining opportunities are limited. The disability program has inadvertently become a welfare system for those without job skills, trapping recipients in poverty. Children with learning disabilities are also part of this system, creating a complex situation where families rely on disability checks for livelihood, potentially discouraging children from improving academically.
The text also explores the political and economic context, noting that disability benefits have become a de facto welfare program. Politicians have not addressed the underlying issues, and the disability-industrial complex, including lawyers and private companies, has emerged to help people navigate the system, sometimes at the expense of the government’s ability to manage the program effectively. The future of the disability program is uncertain, with concerns about its financial sustainability and the need for a comprehensive plan to address the root causes of disability dependency.
Race, ethnicity don’t match genetic ancestry, according to a large U.S. study:
The text discusses a significant study from the All of Us Research Program, which found that self-reported race and ethnicity in the U.S. often do not align with genetic ancestry. This highlights that race and ethnicity are sociocultural constructs and not reliable indicators of genetic differences. The study analyzed genetic data from over 230,000 participants and discovered that most individuals‘ genetic makeup reflects a gradient of ancestries spanning multiple continents, rather than fitting neatly into specific racial or ethnic categories.
The findings suggest that using broader continental categories for genetic studies can be misleading, as more specific ancestry markers can reveal different health traits, such as variations in body mass index (BMI). This complexity is particularly evident among individuals who identify as Hispanic or Latino, whose DNA shows a mix of African, European, and Native American ancestries. The study underscores the need for a more nuanced approach to understanding genetic ancestry and its impact on health, moving away from simplistic racial categories.
The study also notes that while geneticists generally avoid using the term „race“ in studies, self-reported race and ethnicity can still capture important social and environmental factors affecting health. The U.S. Census Bureau’s changes to the 2030 census reflect this complexity by combining race and ethnicity into a single question. However, the implications of these findings are specific to the U.S. context and may not apply to other countries with mixed populations. Overall, the study emphasizes the importance of recognizing the intricacies of genetic ancestry and its implications for health research.
The text is a personal account of struggling with weight and food issues, and the author’s journey towards understanding and overcoming these challenges. The author introduces the concept of two intertwined traps - a physical and a mental fat trap. The physical trap involves being overweight, which can lead to health issues and discomfort, while the mental trap involves obsessive thoughts about food, body image, and self-worth.
The author emphasizes that the body positivity movement is crucial for providing relief to those stuck in these traps, as judgment only exacerbates their misery. They also stress that self-acceptance is vital, but it should not mean accepting a lifetime of being overweight or obese. The author believes that, with effort, it is possible to escape both traps.
To escape the physical trap, the author suggests simple, albeit challenging, lifestyle changes such as regular exercise, a balanced diet, and adequate sleep. However, the mental trap is more difficult to overcome, as it involves addressing obsessive thoughts and harmful beliefs about food and body image.
The author shares three methods to help escape the mental trap: therapy, meditation, and reading books on the subject. They recommend specific books that have helped them, emphasizing that the journey towards freedom from these traps is an ongoing process of awareness, work, and self-compassion. The author concludes by expressing hope that their story can help others in similar situations.
A masochist’s guide to web development:
This text is a detailed guide by a developer who ported their Rubik’s cube optimal solver to a web application using WebAssembly and Emscripten. The author shares their journey, which involved dealing with complexities such as multithreading, SIMD, callback functions, and persistent storage. The goal was to achieve near-native performance while leveraging the portability of web apps.
The tutorial is not for beginners but is targeted at C or C++ developers looking to port their programs or libraries to the web. It walks through setting up the development environment, creating a basic „Hello World“ program, and gradually building more complex functionalities like libraries, multithreading, and persistent storage.
Key points include:
WebAssembly (WASM): A low-level language for running high-performance web applications in a web browser.
Emscripten: A compiler that translates C and C++ code into WebAssembly.
Multithreading: Implementing multithreaded applications using pthreads and web workers.
Persistent Storage: Using IndexedDB for persistent data storage in the browser.
Callback Functions: Handling C functions that take JavaScript callbacks.
Modular JavaScript: Building modular libraries that can be imported and used in both Node.js and web pages.
The author emphasizes the challenges and complexities involved, noting that while Emscripten abstracts many details, the abstractions can leak, requiring a deep understanding of both C/C++ and web technologies. The tutorial is a collection of personal notes and lessons learned, providing a practical guide for developers facing similar tasks.
4-7-8 Breathing - Free Breathing Exercise - Breathbelly:
The text discusses the 4-7-8 breathing exercise, a technique developed by Dr. Andrew Weil to help manage stress, reduce anxiety, and improve sleep. The exercise involves inhaling for four seconds, holding the breath for seven seconds, and exhaling for eight seconds. This pattern is repeated several times to trigger the body’s natural relaxation response and slow the heart rate.
The text also mentions various cue sounds and background music options to accompany the exercise, including natural sounds, instrumental music, and ambient tunes designed to enhance relaxation. These options provide a sensory backdrop to support the breathing practice and create a calming atmosphere.
Interactive Guide: Mastering Rate Limiting:
The text discusses the importance of rate limiting in backend applications, which prevents overuse of resources by a single user, thus maintaining service quality for others. Key benefits include preventing resource starvation, reducing server hosting costs, and providing basic protection against DDoS attacks.
The article introduces four common rate-limiting algorithms through interactive apps:
Token Bucket Algorithm: A bucket holds a fixed number of tokens, which are added at a fixed rate. Requests are allowed if a token is available; otherwise, they are rejected or delayed. This allows for short bursts of requests if tokens are available.
Leaky Bucket Algorithm: Requests are added to a bucket and processed at a constant rate, similar to a bucket leaking water. If the bucket is full when a new request arrives, the request is dropped, smoothing out bursts and outputting requests at a steady rate.
Fixed Window Algorithm: Time is divided into fixed-size windows, and a counter tracks the number of requests per client/IP. If the count exceeds the limit, further requests are rejected until the next window. This method is simple and efficient but can allow burst traffic spikes at the start or end of a window.
Sliding Window Algorithm: This algorithm keeps a timestamped log of each request and counts how many requests were made in the last X seconds. If the count is under the limit, the request is allowed and logged; otherwise, it’s rejected. This approach provides more flexibility compared to the fixed window algorithm.
The author has created interactive apps for users to experiment with these rate-limiting algorithms.
Cysteine depletion triggers adipose tissue thermogenesis and weight loss:
The text discusses a scientific study on the effects of cysteine depletion on adipose tissue thermogenesis and weight loss. Key points include:
Cysteine Depletion: The study involves cysteine depletion in mice and its impact on body weight and metabolism.
Weight Loss: Cysteine-depleted mice experience significant weight loss without overt pathology.
Metabolic Changes: The depletion triggers metabolic rewiring, including changes in metabolites related to the transsulfuration pathway.
Adipose Tissue: Cysteine starvation induces thermogenic reprogramming in adipose tissue, leading to browning.
Thermogenesis: The process involves increased energy expenditure and activation of thermogenic pathways.
Mitochondrial Function: There is evidence of mitochondrial function preservation despite cysteine depletion.
Single-Cell Analysis: The study uses single-cell RNA sequencing to understand the transcriptional regulation in adipose tissue.
Microbial Impact: The effects of cysteine depletion are independent of gut microbiota.
Thermoneutrality: The thermogenic response is independent of thermoneutral conditions.
Adrenergic Signaling: The browning of adipose tissue requires adrenergic signaling.
The study also includes references to previous research on related topics, such as the effects of caloric restriction on adipose tissue browning and the role of cysteine in metabolism.
The research team includes investigators from various institutions, and the study was supported by multiple grants and facilities. The findings have implications for understanding the mechanisms of weight loss and metabolic regulation.
Millions in west do not know they have aggressive fatty liver disease, study says:
The text discusses the prevalence and underdiagnosis of Metabolic dysfunction-associated steatohepatitis (MASH), the most aggressive form of non-alcoholic fatty liver disease, in the US, UK, Germany, and France. Around 20 million people in these countries have MASH, but only about 2.5 million are aware of their condition due to low diagnosis rates. This lack of awareness can lead to severe health issues like liver cancer and cardiovascular disease, and significant economic costs. Experts call for increased diagnosis rates, screening for at-risk individuals, and the use of non-invasive diagnostic methods. Additionally, there are suggestions to utilize weight loss drugs and diabetes medications, which have shown promise in improving liver health. The overall message is that urgent action is needed to increase awareness, diagnosis, and treatment of MASH to prevent severe health and economic consequences.
Welcome - Open Source Distilling:
The text discusses various topics related to the iSpindel, a device used in brewing and distilling. The first topic highlights a video that introduces new features of The Jeffrey 2.69, demonstrates a flat soldering technique, and shows how to balance an iSpindel to 25 degrees using solder pad weights. The second topic addresses a common issue with the iSpindel, specifically when it fails to appear as a Wi-Fi network during configuration mode despite successful firmware flashing. The third topic explains the usefulness of a serial monitor as a diagnostic tool for troubleshooting iSpindel issues by providing insights into its internal operations. Overall, the text provides practical information and troubleshooting tips for users of the iSpindel device.
Self-hosting your own media considered harmful:
The author received their second community guidelines violation from YouTube for a video demonstrating the use of LibreELEC on a Raspberry Pi 5 for 4K video playback. The video was removed because YouTube alleged it promoted „dangerous or harmful content,“ specifically content that describes how to get unauthorized access to media or software. The author insists that the video only shows how to self-host a media library and does not promote any illegal activities. This is not the first time the author has faced such issues; a previous video about installing Jellyfin was also removed but later reinstated after an appeal. Despite the video’s popularity and lack of issues for over a year, the appeal for the latest removal was denied.
The author has re-uploaded the video to the Internet Archive and Floatplane, making it freely available for anyone to download and view. They also mention the challenges of maintaining a sustainable content production model on platforms like Peertube, given the smaller audience and proportionally fewer patrons. The author expresses gratitude for the support from Patreon, GitHub, and Floatplane, but also acknowledges the reliance on YouTube’s AdSense revenue and vast reach. There is concern about Google’s AI summarization of videos, which may be using content creators‘ work without proper compensation.
The bizarre story of a maths proof that is only true in Japan:
The text discusses a long-standing mathematical controversy surrounding a proof by Shinichi Mochizuki of the abc conjecture, a significant problem in number theory. Mochizuki’s proof, based on his inter-universal Teichmüller (IUT) theory, has been met with widespread skepticism and incomprehension from the mathematical community. Despite conferences, summaries, and intense study, only a handful of mathematicians, primarily from Japan, claim to understand and support Mochizuki’s work.
Two prominent German mathematicians, Peter Scholze and Jakob Stix, found a fatal flaw in Mochizuki’s proof, but Mochizuki and his supporters disputed this. Despite the controversy, Mochizuki’s papers were published in a journal he edits. A new challenger, Kirti Joshi, has entered the debate, claiming to have resolved the issues but facing hostility from Mochizuki and disagreement from Scholze. The text concludes by suggesting that formal proof checkers or artificial intelligence might one day help resolve this impasse, though such verification is currently far from feasible. The situation highlights a rare and contentious divide within the mathematical community, with no clear resolution in sight.
Tamagotchi.de - Alles über Tamagotchis!:
The text is a guide on various tips and tricks for Tamagotchi users. It explains how to manipulate the game to achieve certain results, such as pausing the game, speeding up the Tamagotchi’s aging process, or accessing hidden features. The text also provides detailed instructions on how to obtain specific Tamagotchi characters by following particular care routines. It includes information on sleep schedules for different Tamagotchi types, minimum weight requirements, and expected lifespans for various characters. The guide also touches on power-saving techniques and a method to potentially win a game, though its effectiveness is questionable. Additionally, it warns users about the risks of certain actions, such as manipulating the Tamagotchi’s age, which can cause it to die. The overall message is to help users get the most out of their Tamagotchi experience by providing insights into its mechanics and character development.
The author describes a significant shift in their workflow due to the use of AI, specifically Claude Code, which has allowed them to be more efficient and productive. This experience has led them to reflect on the profound impact of AI on society. They observe that AI is rapidly becoming integrated into daily life, with people from all walks of life using it for various tasks. This rapid adoption reminds them of the steam engine’s transformative impact rather than the gradual adoption of smartphones.
The author acknowledges that while there is resistance to AI within the tech community, they personally are optimistic about its potential. They see AI as a new substrate for innovation and believe it will democratize access to knowledge and accelerate advancements in various fields. The author encourages others to approach this technological shift with curiosity and responsibility, rather than cynicism or fear, as it marks a significant moment in history akin to the advent of electricity or the printing press.
In summary, the author highlights the transformative power of AI, its rapid integration into society, and the need to embrace this change with a positive and responsible mindset. They believe that AI will augment human capabilities and drive innovation across various domains.
Solarkomponenten angreifbar: 35.000 Admin-Panels frei zugänglich im Netz:
The text discusses a significant security issue with solar energy systems, highlighting that a substantial number of unprotected admin panels of solar components, particularly in Germany, are freely accessible online. Security researchers from Forescout discovered over 35,000 such admin panels globally, with a majority located in Europe. Germany tops the list with 20% of these vulnerable panels, followed closely by Greece. The exposed admin panels belong to various solar components, including inverters and data loggers, from 42 different manufacturers.
The report emphasizes that many of these components are outdated and have known vulnerabilities. For example, SMA Solar Technology’s data loggers, which are no longer produced, make up a significant portion of the exposed devices. Similarly, Solarview Compact monitoring devices have been linked to past cybersecurity incidents. The distribution of exposed admin panels does not align with the market share of manufacturers, suggesting potential issues with security configurations or lack of awareness among customers and installers.
While the researchers do not consider this a direct threat to the stability of power grids, they warn that freely accessible admin panels can serve as entry points for attackers to compromise broader networks. They recommend securing these panels, applying patches promptly, and removing outdated devices from the network to mitigate risks.
9 Lessons From Cursor’s System Prompt:
Cursor’s AI coding assistant stands out for its effectiveness in following instructions and providing helpful responses. The key to its success lies in several strategic approaches to prompt engineering and tool design.
Firstly, Cursor defines the AI’s role and personality very precisely. It tells the AI that it is an agent operating in a specific Integrated Development Environment (IDE), pair programming with a user. This clarity helps the AI filter its vast knowledge and select appropriate responses.
The system prompt is structured using XML-like tags to break down complex instructions into digestible chunks. This structure not only helps the AI process the instructions but also aids human developers in maintaining and iterating on these prompts.
Cursor emphasizes autonomy, instructing the AI to keep working until the user’s query is completely resolved. It encourages the AI to gather more information independently and execute plans without waiting for user confirmation.
The AI is also guided on how to communicate its actions naturally, avoiding technical jargon and referring to tools in a way that feels like human collaboration.
Practical constraints are built into the system to keep the AI focused and to optimize costs. For example, it avoids generating extremely long hashes or non-textual code and limits the number of iterations for fixing linter errors.
Cursor uses two user prompts: one for custom instructions tailored to the user’s needs and another for the actual query along with dynamic context. This context includes web search results, file contents, and IDE state, all embedded directly into the prompt. This Retrieval Augmented Generation (RAG) approach ensures the AI has all the relevant information at its disposal.
The AI is equipped with a comprehensive toolkit and strict instructions on how to use it. Tools are designed to handle manageable chunks of data, ensuring the AI stays focused and doesn’t get overwhelmed. For instance, the read_file tool can view only a limited number of lines at a time.
The tool interactions are designed to return not only the primary data but also stateful information, helping the AI make more intelligent subsequent calls.
In summary, Cursor’s effectiveness comes from a combination of precise role definition, structured prompts, emphasis on autonomy, natural communication, practical constraints, comprehensive context provision, and smart tool design. These strategies make the AI a valuable pair programmer, capable of handling complex coding tasks efficiently.
Making sure you’re not a bot!:
The text discusses a challenge presented to users visiting a website, requiring them to enable JavaScript to proceed. This measure is in response to AI companies aggressively scraping websites, which has altered the conventional understanding of website hosting. The challenge is implemented using a system called Anubis, which employs Proof-of-Work and Hashcash mechanisms to deter automated scraping. A no-JavaScript solution is currently being developed to address users who prefer not to enable JavaScript. The text mentions resources like the Anubis GitHub repository, articles on AI companies scraping websites, and the JShelter project for additional context.
The study investigates the nonlinear transitions in brain aging, highlighting a critical window in midlife for metabolic intervention to prevent age-related cognitive decline. Key findings include:
Nonlinear Aging Trajectory: Brain aging does not follow a linear path but rather a nonlinear trajectory, with significant changes starting in midlife (around 40s). This is characterized by destabilization and desynchronization of brain networks.
Metabolic Changes: The initial phase of brain aging is primarily driven by metabolic changes, specifically insulin resistance, which impairs glucose metabolism in the brain. This is marked by increased HbA1c levels, indicating reduced insulin sensitivity.
Gene Expression and Ketone Transport: Gene expression analyses reveal that neuronal insulin resistance, particularly involving the GLUT4 transporter, is a key driver of brain aging. Conversely, the MCT2 transporter, which facilitates ketone uptake, appears to counteract these aging effects by providing an alternative energy source for neurons.
Ketone Intervention: Administered ketones, which can bypass insulin resistance, show significant benefits in stabilizing brain networks, particularly during the midlife critical window (ages 40 to 60). This intervention is most effective before sustained neuronal damage occurs, suggesting a limited window for effective treatment.
Critical Window: The study identifies a midlife „critical window“ (ages 40 to 60) where metabolic interventions, such as ketone administration, can reverse or slow down brain aging effects. Beyond this window, the benefits of ketones diminish, indicating that early intervention is crucial.
Mechanistic Insights: The research integrates findings from large-scale neuroimaging datasets, gene expression analyses, and metabolic intervention studies to provide a comprehensive understanding of brain aging mechanisms. It underscores the importance of early metabolic interventions in delaying or preventing age-related cognitive decline.
In summary, the study underscores the importance of early metabolic interventions in midlife to mitigate age-related brain deterioration, offering a potential strategy for preventing or delaying cognitive decline associated with aging.
Streaming: Mehr Werbung bei Youtube Premium Lite:
Youtubes cheaper subscription service, Premium Lite, will now include more ads, specifically in Shorts, despite the monthly price remaining at 5,99 Euro. This change will take effect from June 30, 2025. Shorts, which are prominent in the mobile app, are expected to generate more revenue through ads due to their endless scrolling format. Regular videos will remain mostly ad-free. This move could encourage frequent Shorts viewers to upgrade to the more expensive Premium Abo, which costs 12,99 Euro per month, as it offers additional features like offline downloads and no ads at all.
Regierungsdaten in den Socken: FBI erwischt Spionagefahnder bei der Spionage:
A 28-year-old cybersecurity employee of the Defense Intelligence Agency (DIA) in the US was arrested on May 29 for attempting to leak classified government documents to a foreign entity. The individual, whose job was to prevent such insider threats, made several mistakes that led to his identification and arrest. He offered the documents to a foreign government via email, expressing disagreement with the US government’s values, but inadvertently included identifiable information in the email. The FBI, after receiving the email, used a decoy operation to catch him red-handed. The man would manually copy classified data into a notebook, hide it in his socks, and later transfer it to a USB drive to be picked up at a designated location. He was oblivious to the fact that he was being monitored by DIA’s surveillance systems.
Colon cancer recurrence and deaths cut 28% by simple exercise, trial finds:
A high-quality clinical trial has found that aerobic exercise can significantly reduce the risk of colon cancer recurrence, new cancer development, or death in patients who have undergone surgery and chemotherapy. The study, involving nearly 900 participants, showed that those who engaged in regular aerobic exercise, such as brisk walking or jogging, for three years had a 28 percent lower risk of these outcomes over eight years compared to those who received only health education. The exercise group also had higher survival rates and reduced risk of death. Notably, the benefits of exercise were comparable to those of many standard drug treatments, and the exercise routines required were not excessively intense. The study suggests that exercise may help prevent cancer recurrence and new cancers through various biological mechanisms. Experts praised the findings, highlighting the importance of exercise as an evidence-based recommendation for cancer patients.
The text draws a parallel between the rise and fall of polyester in the 20th century and the current trajectory of generative AI art to illustrate how synthetic creations can lose their appeal over time. Initially, polyester was celebrated for its practicality and efficiency, much like how AI art is currently praised for reducing the time and effort required to create new designs. However, polyester eventually faced a cultural backlash due to its aesthetic and social connotations, leading to a revaluation of natural fibers like cotton and linen. Similarly, the text suggests that generative AI art may soon face an aesthetic and social backlash, as it is already being associated with low-skilled creators and is beginning to feel „cheesy“ in its proliferation.
The author argues that the devaluation of AI art is part of a larger trend in our hyper-capitalist economy, where cultural artifacts lose their distinct value when they can be easily procured and created by anyone. This process, reminiscent of postmodernism’s critique of cultural value, is seen as detrimental to the creation of deep meaning. However, the author remains hopeful that, as with polyester, there will be a future revival of human-made art. The key takeaway is that while AI art may currently be popular, its perceived value could diminish over time, potentially leading to a renewed appreciation for human-created aesthetics.
rsync’s defaults are not always enough:
This text discusses the limitations of using the default settings of rsync, a popular data synchronization tool. While rsync is efficient and widely used for mirroring sites and backups, its default behavior of checking only file size and modification time can miss certain changes, such as silent data corruption.
The author highlights a scenario where files on a Debian system, backed up using rsync, showed identical sizes and modification times but different hash values, indicating that rsync’s default checks had failed to catch data corruption. This issue can occur even without bit rot or other obvious causes of data corruption.
To mitigate this problem, the author recommends using rsync’s -I or -c options, which perform checksums on files instead of relying on size and modification time. These options are slower but can help detect and prevent the propagation of silent data corruption. The author also suggests using the –dry-run option to preview changes before applying them, ensuring that the source files are not corrupted.
In summary, while rsync is a powerful tool, its default settings may not be sufficient for detecting all data changes, and users should consider using checksum options to ensure data integrity.
Web-Scraping AI Bots Cause Disruption For Scientific Databases and Journals - Slashdot:
Scientific databases and academic journals are being overwhelmed by automated web-scraping bots searching for data to train AI models. These bots have caused significant disruptions, with some sites becoming unusable due to high traffic volumes. The issue has escalated since the introduction of DeepSeek, a large language model from China, which showed that effective AI can be developed with less computational power than previously believed. This has led to a surge in bot activity, with many institutions reporting service disruptions. For instance, the image repository DiscoverLife and medical journal publisher BMJ have both suffered from severe bot traffic, impacting their services and accessibility. The Confederation of Open Access Repositories found that most of its members have experienced AI bot scraping, highlighting the widespread nature of this problem.
TODO
“Smart” Devices Are Growing Like Weeds, but Are They Safe?:
The text discusses the growing threat of cyberattacks on critical infrastructure and Internet of Things (IoT) devices, highlighting several high-profile incidents and the increasing use of IoT devices in essential systems. The authors, Guy Fedorkow and Thomas Hardjono, emphasize the importance of securing these devices through a combination of basic cybersecurity hygiene and defense in depth. This includes measures like not using default passwords, regular software updates, and understanding the software supply chain.
They introduce the concept of a Software Bill of Materials (SBOM) to track the provenance of software components. Defense in depth involves three key functions: protect, detect, and remediate. The „protect“ function uses a layered approach to security, with each layer checking the next for integrity. The innermost layer, known as the Root of Trust (RoT), is crucial because it is implicitly trusted and must be carefully protected. The „detect“ function uses remote attestation to gather and report fingerprints of each layer during startup, ensuring that any tampering is detectable. The „remediate“ function involves actions to address detected anomalies, such as power-cycling the device or using authenticated watchdog timers.
The text concludes by noting that while these security measures have been available for some time, they are now becoming more accessible and affordable, even for budget-minded embedded chips. It underscores the responsibility of both device designers and system integrators to implement and coordinate these security features to enhance overall resilience against cyber threats.
Japanese Scientists Develop Artificial Blood:
The text discusses the development of artificial blood by Japanese scientists led by Hiromi Sakai. This artificial blood is created from expired donor blood and can be used for any blood type, making it a universal solution. It has a significantly longer shelf life compared to donated red blood cells, with the ability to store the synthetic blood for up to five years under refrigeration. Clinical trials have shown promising results, with no significant side effects reported so far. The goal is to make this artificial red blood cell solution practical for use by 2030. In addition, other researchers like Professor Teruyuki Komatsu are also working on similar artificial oxygen carriers, with animal trials showing positive outcomes. The overall message is the potential of artificial blood to revolutionize healthcare, particularly in areas with limited blood supplies.