10 of the Best Moments From the Early Days of CGI

CGI is everywhere now. In many cases, it’s almost completely indistinguishable from things that were actually filmed. You can only tell by the impossible camera angles. It wasn’t always that way though—you remember The Last Starfighter , don’t you? Still, 20th century CGI had its high points, and these are 10 of them. Read more…

Visit site:
10 of the Best Moments From the Early Days of CGI

Google Street View Accidentally Made an Algorithm That Cracks CAPTCHAs

House numbers on Google Street View can turn up as blobby, blurry things, so its engineers built a pretty crazy neural network to decipher them. Except this algorithm also turns out to be very very good at deciphering other blobby, blurry texts—like CAPTCHAs, which it cracks with 99 percent accuracy . Take that, human. Read more…

Continue Reading:
Google Street View Accidentally Made an Algorithm That Cracks CAPTCHAs

The Science Behind Making the Fastest Possible Pinewood Derby Car

You wouldn’t think that a four-wheeled car would go faster if one of its wheels didn’t touch the ground. Or if its axles were bent. Or if it was designed to grind against a wall. But you’d be wrong, and here’s the science to prove it. Read more…

See the original article here:
The Science Behind Making the Fastest Possible Pinewood Derby Car

Welcome to The World’s Largest Ghost City: Ordos, China

Built for over a million people, the city of Ordos was designed to be the crowning glory of Inner Mongolia. Doomed to incompletion however, this futuristic metropolis now rises empty out of the deserts of northern China. Only 2% of its buildings were ever filled; the rest has largely been left to decay, abandoned mid-construction, earning Ordos the title of China’s Ghost City . Read more…        

View post:
Welcome to The World’s Largest Ghost City: Ordos, China

FreeBSD won’t use Intel & Via’s hardware random number generators, believes NSA has compromised them

The maintainers of the security-conscious FreeBSD operating system have declared that they will no longer rely on the random number generators in Intel and Via’s chips , on the grounds that the NSA likely has weakened these opaque hardware systems in order to ease surveillance. The decision is tied to the revelations of the BULLRUN/EDGEHILL programs, wherein the NSA and GCHQ spend $250M/year sabotaging security in standards, operating systems, software, and networks. “For 10, we are going to backtrack and remove RDRAND and Padlock backends and feed them into Yarrow instead of delivering their output directly to /dev/random,” FreeBSD developers said. “It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more.” In separate meeting minutes, developers specifically invoked Snowden’s name when discussing the change. “Edward Snowdon [sic] — v. high probability of backdoors in some (HW) RNGs,” the notes read, referring to hardware RNGs. Then, alluding to the Dual EC_DRBG RNG forged by the National Institute of Standards and Technology and said to contain an NSA-engineered backdoor, the notes read: “Including elliptic curve generator included in NIST. rdrand in ivbridge not implemented by Intel… Cannot trust HW RNGs to provide good entropy directly. (rdrand implemented in microcode. Intel will add opcode to go directly to HW.) This means partial revert of some work on rdrand and padlock.” “We cannot trust” Intel and Via’s chip-based crypto, FreeBSD developers say [Dan Goodin/Ars Technica]        

Read the original post:
FreeBSD won’t use Intel & Via’s hardware random number generators, believes NSA has compromised them

Spooks of Warcraft: how the NSA infiltrated gamespace

A new Snowden leak details how he NSA and GCHQ tasked its agents to infiltrate Second Life, World of Warcraft, and other MMOs to find jihadis and spy on them. The battalions of undercover orcs did indeed take much of gamespace, but there’s no evidence they ever spotted a plot. I was once questioned by members of an “unnamed branch of the State Department” at a games and public diplomacy event about the likelihood that jihadis were playing MMOs; and I said something like, “Sure, of course. Everyone plays MMOs.” I didn’t realize they’d take it all quite so much to heart. The absurdity of sending spies to infiltrate Warcraft can best be understood as a natural outflow of the doctrine that holds that if any two bad guys, anywhere in the world, can communicate in such a way that the NSA can’t listen in on them, all of society will crumble. Once you set yourself the insane task of eavesdropping on all conversations, everywhere, always, it’s inevitable that you’ll send Secret Squirrel and his pals to Azeroth. At the request of GCHQ, the NSA had begun a deliberate effort to extract World of Warcraft metadata from their troves of intelligence, and trying to link “accounts, characters and guilds” to Islamic extremism and arms dealing efforts. A later memo noted that among the game’s active subscribers were “telecom engineers, embassy drivers, scientists, the military and other intelligence agencies”. The UK agency did not stop at World of Warcraft, though: by September a memo noted GCHQ had “successfully been able to get the discussions between different game players on Xbox Live”. Meanwhile, the FBI, CIA, and the Defense Humint Service were all running human intelligence operations – undercover agents – within the virtual world of Second Life. In fact, so crowded were the virtual worlds with staff from the different agencies, that there was a need to try to “deconflict” their efforts – or, in other words, to make sure each agency wasn’t just duplicating what the others were doing. By the end of 2008, such human intelligence efforts had produced at least one usable piece of intelligence, according to the documents: following the successful takedown of a website used to trade stolen credit card details, the fraudsters moved to Second Life – and GCHQ followed, having gained their first “operational deployment” into the virtual world. This, they noted, put them in touch with an “avatar [game character] who helpfully volunteered information on the target group’s latest activities”. Second Life continued to occupy the intelligence agencies’ thoughts throughout 2009. One memo noted the game’s economy was “essentially unregulated” and so “will almost certainly be used as a venue for terrorist laundering and will, with certainty, be used for terrorist propaganda and recruitment”. Revealed: spy agencies’ covert push to infiltrate virtual world of online games [James Ball/The Guardian]        

See the article here:
Spooks of Warcraft: how the NSA infiltrated gamespace

Tell Me Something I Don’t Know 019: Ed Piskor and The Hip Hop Family Tree

Cartoonist Ed Piskor’s latest book, The Hip Hop Family Tree (Fantagraphic Books) collects his non-fiction comic strip history of Hip Hop, serialized weekly here on Boing Boing. The Hip Hop Family Tree follows the success of his debut graphic novel last year, Wizzywig (Top Shelf Comics), the tale of a computer hacker. Piskor has a special knack for creating comics that appeal to audiences beyond those of us who frequent comic book shops and bookmark webcomics for daily reading. We caught up with him after a busy month of promotional activity for the new book, including stops at Miami Book Fair, Chicago Ideas Week, Brooklyn Book Fair, and the Small Press Expo. GET TMSIDK: RSS | On iTunes | Download episode | Listen on Stitcher Follow TMSIDK on Twitter Tell Me Something I Don’t Know is produced and hosted by three talented cartoonists and illustrators: Jim Rugg , a Pittsburgh-based comic book artist, graphic designer, zinemaker, and writer best known for Afrodisiac , The Plain Janes , and Street Angel . His latest project is SUPERMAG . Jasen Lex is a designer and illustrator from Pittsburgh. He is currently working on a graphic novel called Washington Unbound. All of his art and comics can be found at jasenlex.com . Ed Piskor is the cartoonist who drew the comic, Wizzywig , and draws the Brain Rot/ Hip Hop Family Tree comic strip at this very site, soon to be collected by Fantagraphics Books and available for pre-order now .        

See original article:
Tell Me Something I Don’t Know 019: Ed Piskor and The Hip Hop Family Tree

Medieval kids’ birch-bark doodles

Michael sez, “Apparently medieval Russian schoolroooms used birch bark for things like writing practice. Erik Kwakkel, medieval book historian at Leiden University, Netherlands, has some charming photos of stick-figure illustrations on bark by kids who, like kids everywhere, got a bit bored with the lesson and started doodling in the margins. There are links to more images (and an interesting scholarly article) at the bottom of the post .” The most special items, however, are the ones shown above, which are from a medieval classroom. In the 13th century, young schoolboys learning to write filled these scraps with alphabets and short texts. Bark was ideal material for writing down things with such a short half-life. Then the pupils got bored and started to doodle, as kids do: crude drawings of individuals with big hands, as well as a figure with a raised sword standing next to a defeated beast (lower image). The last one was drawn by Onfim, who put his name next to the victorious warrior. The snippets provide a delightful and most unusual peek into a 13th-century classroom, with kids learning to read – and getting bored in the process. Medieval kids’ doodles on birch bark [Erik Kwakkel] ( Thanks, Michael ! )        

See the article here:
Medieval kids’ birch-bark doodles

Botnet of 20,000 point-of-sale machines

Details are emerging about Stardust, a piece of malicious software that targets point-of-sale credit-card processing machines. Stardust has reportedly compromised over 20,000 PoS machines and turned them into a easy-to-control botnet. The malware’s masters can monitor the botnet in realtime and issue fine-grained commands to its components, harvesting a titanic volume of payment card details. The discovery comes as researchers from a separate security firm called Arbor Networks published a blog post on Tuesday reporting an active PoS compromise campaign. The advisory is based on two servers found to be hosting Dexter and other PoS malware. Arbor researchers said the campaign looks to be most active in the Eastern Hemisphere. There was no mention of a botnet or of US restaurants or retailers being infected, so the report may be observing a campaign independent from the one found by IntelCrawler. It remains unclear how the attackers manage to initially infect PoS terminals and servers that make up the botnet. In the past, criminals have targeted known vulnerabilities in applications that many sellers of PoS software use to remotely administer customer systems. Weak administrator passwords, a failure to install security updates in a timely fashion, or unknown vulnerabilities in the PoS applications themselves are also possibilities. Credit card fraud comes of age with advances in point-of-sale botnets [Dan Goodin/Ars Technica]        

Read this article:
Botnet of 20,000 point-of-sale machines