First vatburger is ready to eat

After spending $250,000 worth of anonymously donated money, Mark Post from Maastricht University is ready to go public with his first vat-grown hamburger, which will be cooked and eaten at an event in London this week. Though they claim that it’s healthier than regular meat, one question not answered in the article is the Omega 3/6 balance — crappy, corn-fed, factory-farmed meet is full of Omega 6s and avoided by many eaters; the grass-fed, free-range stuff is higher in Omega 3s. Yet growing meat in the laboratory has proved difficult and devilishly expensive. Dr. Post, who knows as much about the subject as anybody, has repeatedly postponed the hamburger cook-off, which was originally expected to take place in November. His burger consists of about 20,000 thin strips of cultured muscle tissue. Dr. Post, who has conducted some informal taste tests, said that even without any fat, the tissue “tastes reasonably good.” For the London event he plans to add only salt and pepper. But the meat is produced with materials — including fetal calf serum, used as a medium in which to grow the cells — that eventually would have to be replaced by similar materials of non-animal origin. And the burger was created at phenomenal cost — 250,000 euros, or about $325,000, provided by a donor who so far has remained anonymous. Large-scale manufacturing of cultured meat that could sit side-by-side with conventional meat in a supermarket and compete with it in price is at the very least a long way off.“This is still an early-stage technology,” said Neil Stephens, a social scientist at Cardiff University in Wales who has long studied the development of what is also sometimes referred to as “shmeat.” “There’s still a huge number of things they need to learn.” There are also questions of safety — though Dr. Post and others say cultured meat should be as safe as, or safer than, conventional meat, and might even be made to be healthier — and of the consumer appeal of a product that may bear little resemblance to a thick, juicy steak. Engineering the $325,000 Burger [Henry Fountain/New York Times] ( via /. )        

See the article here:
First vatburger is ready to eat

HOWTO build a working digital computer out of paperclips (and stuff)

Windell at Evil Mad Scientist Labs has dredged up an amazing project book from the Internet Archive: How to Build a Working Digital Computer (1967) (by Edward Alcosser, James P. Phillips, and Allen M. Wolk) contains a full set of instructions for building a working computer out of paperclips and various bits and bobs from the local hardware store. You can even use paperclips for switches (though, as Windell notes, “Arrays of paperclip logic gates can get pretty big, pretty fast.”) The instructions include a read-only drum memory for storing the computer program (much like a player piano roll), made from a juice can, with read heads made from bent paper clips.   A separate manually-operated “core” memory (made of paper-clip switches) is used for storing data.   So can this “paper clip” computer actually built, and if so, would it work?  Apparently yes, on both counts. Cleveland youngsters Mark Rosenstein and Kenny Antonelli built one named “ Emmerack ” in 1972 (albeit substituting Radio Shack slide switches for most of the paper clips), and another was built in 1975 by the  Wickenburg High School Math Club  in Arizona.  And, at least one modern build has been completed, as you can see on YouTube . How to Build a Working Digital Computer… out of paperclips ( via O’Reilly Radar )        

Read more here:
HOWTO build a working digital computer out of paperclips (and stuff)

American public schools in 9 states sharing every conceivable personal detail of their students with third parties

Greg Costikyan sez, inBloom , a Gates-funded non-profit to harness data to improve grade school education, has partnered with New York and eight other states to encourage the development of apps to “further education” by using intimate data about students, without parental consent and with no ability for parents to opt out. Among the data shared are name, address, phone numbers, test scores, grades, economic status, test scores, disciplinary records, picture, email, race, developmental delay… just about everything conceivable , and all specific, none of it anonymized. inBloom has arrangements with nine states (New York, Massachusetts, Louisiana, Colorado, Illinois, North Carolina, Georgia, Delaware and Kentucky) to do this. The XML schema used are downloadable here . Anyone can register as a developer and start using “sample” data, but “real” data is supposedly only available to developers with contracts with a school board. But this includes for-profit, third party developers, such as, say, Amplify, a News Corp subsidiary with a contract with New York. And it doesn’t appear there are any constraints on their use of this data. Who is Stockpiling and Sharing Private Information About New York Students? ( Thanks, Greg! )        

Excerpt from:
American public schools in 9 states sharing every conceivable personal detail of their students with third parties

ATM skimming comes to non-ATM payment terminals in train stations, etc

ATM skimming isn’t limited to ATMs! There are lots of terminals that ask you to swipe your card and/or enter a PIN, and many of them are less well-armored and -policed than actual cashpoints. Skimmers have been found on train-ticket machines, parking meters and other payment terminals. Once a crook has got your card number and sign-on data, they can use that to raid a your account at an ATM. Brian Krebs has a look at some of these devices, including a full-on fascia for a cheapie ATM discovered in latinamerica. The organization also is tracking a skimming trend reported by three countries (mainly in Latin America) in which thieves are fabricating fake ATM fascias and placing them over genuine ATMs, like the one pictured below. After entering their PIN, cardholders see an ‘out-of-order’ message. EAST said the fake fascias include working screens so that this type of message can be displayed. The card details are compromised by a skimming device hidden inside the fake fascia, and the PINs are captured via the built-in keypad, which overlays the real keypad underneath. This reminds me a little of the evolution of payphones — the armadillos of the device world! — and the look-alike COCOTS (customer-owned coin-operated telephones) that presented very soft targets if you could scry through their camouflage. Cash Claws, Fake Fascias & Tampered Tickets

Read More:
ATM skimming comes to non-ATM payment terminals in train stations, etc

Researchers show method for de-anonymizing 95% of “anonymous” cellular location data

Unique in the Crowd: The privacy bounds of human mobility , a Nature Scientific Reports paper by MIT researchers and colleagues at Belgium’s Universite Catholique de Louvain, documents that 95% of “anonymous” location data from cellphone towers can be de-anonymized to the individual level. That is, given data from a region’s cellular towers, the researchers can ascribe individuals to 95% of the data-points. “We show that the uniqueness of human mobility traces is high, thereby emphasizing the importance of the idiosyncrasy of human movements for individual privacy,” they explain. “Indeed, this uniqueness means that little outside information is needed to re-identify the trace of a targeted individual even in a sparse, large-scale, and coarse mobility dataset. Given the amount of information that can be inferred from mobility data, as well as the potentially large number of simply anonymized mobility datasets available, this is a growing concern.” The data they studied involved users in an unidentified European country, possibly Belgium, and involved anonymized data collected by their carriers between 2006 and 2007. Anonymized Phone Location Data Not So Anonymous, Researchers Find [Wired/Kim Zetter]

More here:
Researchers show method for de-anonymizing 95% of “anonymous” cellular location data

DDoS storm breaks records at 300 Gbps

The Internet has been groaning under the weight of a massive distributed denial of service (DDoS) attack on the Domain Name Service, apparently aimed at anti-spam vigilantes Spamhaus, in retaliation for their blacklisting of Dutch free speech hosting provider Cyberbunker. At 300 mbps, the DDoS is the worst in public Internet history. “These things are essentially like nuclear bombs,” said Matthew Prince, chief executive of Cloudflare. “It’s so easy to cause so much damage.” The so-called distributed denial of service, or DDoS, attacks have reached previously unknown magnitudes, growing to a data stream of 300 billion bits per second. “It is a real number,” Mr. Gilmore said. “It is the largest publicly announced DDoS attack in the history of the Internet.” Spamhaus, one of the most prominent groups tracking spammers on the Internet, uses volunteers to identify spammers and has been described as an online vigilante group. In the past, blacklisted sites have retaliated against Spamhaus with denial-of-service attacks, in which they flood Spamhaus with traffic requests from personal computers until its servers become unreachable. But in recent weeks, the attackers hit back with a far more powerful strike that exploited the Internet’s core infrastructure, called the Domain Name System, or DNS. As bad as this is, it could be a lot worse. An anonymous paper called Internet Census 2012: Port scanning /0 using insecure embedded devices reports on a researcher’s project to scan every IPv4 address for publicly available machines that will accept a telnet connection and yield up a root login to a default password. The researcher reports that 1.2 million such devices are available online (s/he compromised many of these machines in order to run the census). These machines are things like printers and routers with badly secured firmware, visible on the public net. They are often running an old version of GNU/Linux and can be hijacked to form part of a staggeringly large botnet that would be virtually unkillable, since the owners of these devices are vanishingly unlikely to notice that they are silently running attackware, and the devices themselves are completely unregarded. Firm Is Accused of Sending Spam, and Fight Jams Internet [NYT/John Markoff & Nicole Perlroth] ( via Hacker News )

View post:
DDoS storm breaks records at 300 Gbps

RPG inside an Excel workbook

Cary Walkin , an accountant in Toronto, knows a thing or two about Excel. So great is his expertise that he was able to create a full-fledged RPG inside of its scripting environment, called Arena.Xlsm. I couldn’t get it to run in LibreOffice, but it sounds like it’s very featurful and fun, provided that you’re willing to use Microsoft products: * Random enemies: Over 2000 possible enemies with different AI abilities. * Random items: 39 item modifiers result in over 1000 possible item combinations and attributes. * An interesting story with 4 different endings depending on how the player has played the game. * 8 boss encounters, each with their own tactics. * 4 pre-programmed arenas followed by procedurally generated arenas. Each play-through has its own challenges. * 31 Spells. There are many different strategies for success. * 15 Unique items. Unique items have special properties and can only drop from specific enemies. * 36 Achievements. * This is all in a Microsoft Excel workbook. Arena.Xlsm Released! ( via Digg )

View article:
RPG inside an Excel workbook