Coinbase Is Making $2.7 Million a Day

An anonymous reader quotes a report from Bitcoin News: In information released to shareholders this week, Coinbase revealed that it recorded turnover of $1 billion last year, which works out at an astonishing $2.74 million a day or $2, 000 a minute. As America’s largest bitcoin broker, Coinbase claims the lion’s share of the money that’s pouring into the crypto space at a dizzying rate. 2017 was a bumper year for all crypto exchanges, which reported record numbers across the board: new signups, new staff hired, new trading pairs, and new revenue. Those revenue streams have turned into a torrent that has caused Coinbase’ coffers to swell. Recode reports that the company’s revenue exceeded $1 billion last year, most of it derived from the trading fees it levies. These vary from between 0.25% and 1%. and quickly add up: in the past 24 hours, 36, 000 BTC were traded on Coinbase, accounting for more than 15% of the total market. Coinbase isn’t the world’s largest exchange (and is technically a broker rather than a conventional exchange — that duty falls to its GDAX subsidiary) but it’s the best known and carries great weight in the cryptocurrency industry. Read more of this story at Slashdot.

More here:
Coinbase Is Making $2.7 Million a Day

Intel Launches 8th Gen Core Series CPUs With Integrated AMD Radeon Graphics

MojoKid writes: At CES 2018, Intel unveiled more details of its 8th generation Intel Core processors with integrated AMD Radeon RX Vega M graphics. Like cats and dogs living together, the mashup of an Intel processor with an AMD GPU is made possible by an Embedded Multi-Die Interconnect Bridge (EMIB), which provides a high-speed data interconnect between the processor, GPU and 4GB of second-generation High-Bandwidth Memory (HBM2). Intel is delivering 8th generation H-Series Core processors in 65W TDP (laptops) and 100W TDP (desktops) SKUs that will take up 50 percent less PCB real estate, versus traditional discrete configs. Both the mobile and desktop variants of the processors will be available in Core i5 or Core i7 configurations, with 4 cores and 8 threads, up to 8MB of cache and 4GB of HBM2. The 65W mobile processors can boost up to 4.1GHz, while the Radeon RX Vega M GL GPU has base/boost clocks of 931MHz and 1011MHz, respectively. The AMD GPU has 20 compute units and memory bandwidth checks in at 179GB/s. Desktop processors ratchet the maximum boost slightly to 4.2GHz, while the base/boost clocks of the Radeon RX Vega M GH GPU jump to 1063MHz and 1190MHz, respectively. Desktop GPUs are also upgraded with 24 CUs and 204GB/s of memory bandwidth. Intel says that its 8th generation Core i7 with Radeon RX Vega M GL graphics is up to 1.4x faster than a Core i7-8550U with an NVIDIA GeForce GTX 1050 GPU in a notebook system. System announcements from Dell and HP are forthcoming, with availability in the first half of this year. Intel has also launched a new NUC small form factor gaming mini PC based on the technology as well. Read more of this story at Slashdot.

Taken from:
Intel Launches 8th Gen Core Series CPUs With Integrated AMD Radeon Graphics

After Intel ME, Researchers Find Security Bug In AMD’s SPS Secret Chip-on-Chip

An anonymous reader writes: AMD has fixed, but not yet released BIOS/UEFI/firmware updates for the general public for a security flaw affecting the AMD Secure Processor. This component, formerly known as AMD PSP (Platform Security Processor), is a chip-on-chip security system, similar to Intel’s much-hated Management Engine (ME). Just like Intel ME, the AMD Secure Processor is an integrated coprocessor that sits next to the real AMD64 x86 CPU cores and runs a separate operating system tasked with handling various security-related operations. The security bug is a buffer overflow that allows code execution inside the AMD SPS TPM, the component that stores critical system data such as passwords, certificates, and encryption keys, in a secure environment and outside of the more easily accessible AMD cores. Intel fixed a similar flaw last year in the Intel ME. Read more of this story at Slashdot.

Read the original:
After Intel ME, Researchers Find Security Bug In AMD’s SPS Secret Chip-on-Chip

A Christmas gift from Game Boy ROM hackers: Super Mario Land 2 in color

The Christmas holiday season is traditionally a great time to kick back and catch up on forgotten video games, and usually, we recommend doing so with majorly discounted video game sales. That’s still the case (and every platform, from Steam to Nintendo eShop to Xbox Live to PlayStation Network to GoG , seems to have a sale going on right now), but this year’s coolest holiday offer cannot be purchased: an out-of-nowhere ROM hack for one of Nintendo’s best original Game Boy games. Today, a classic-game hacker who goes by the handle Toruzz released a “ROM patch” for Nintendo’s 1992 game Super Mario Land 2: Six Golden Coins . This 25th-anniversary release adds a “DX” suffix to the game’s name, and that’s because it’s been designed specifically to run on original Game Boy Color hardware. As a result, the ROM hack adds support for the Game Boy Color’s expanded color palette—which could run up to 56 colors on the screen simultaneously, as broken down by various sprite-specific palettes—along with support for the GBC’s faster CPU. Read 3 remaining paragraphs | Comments

See the original article here:
A Christmas gift from Game Boy ROM hackers: Super Mario Land 2 in color

T-Mobile Is Becoming a Cable Company

T-Mobile has revealed that it’s launching a TV service in 2018, and that is has acquired Layer3 TV (a company that integrates TV, streaming and social networking) to make this happen. The company thinks people are ditching cable due to the providers, not TV itself. Engadget reports: It claims that it can “uncarrier” TV the way it did with wireless service, and has already targeted a few areas it thinks it can fix: it doesn’t like the years-long contracts, bloated bundles, outdated tech and poor customer service that are staples of TV service in the U.S. T-Mobile hasn’t gone into detail about the functionality of the service yet. How will it be delivered? How much will it cost? Where will it be available? And will this affect the company’s free Netflix offer? This is more a declaration of intent than a concrete roadmap, so it’s far from certain that the company will live up to its promises. Ultimately, the move represents a big bet on T-Mobile’s part: that people like TV and are cutting the cord based on a disdain for the companies, not the service. There’s a degree of truth to that when many Americans are all too familiar with paying ever-increasing rates to get hundreds of channels they don’t watch. However, there’s no guarantee that it’ll work in an era when many people (particularly younger people) are more likely to use Netflix, YouTube or a streaming TV service like Sling TV. Read more of this story at Slashdot.

Read More:
T-Mobile Is Becoming a Cable Company

Author of BrickerBot Malware Retires, Says He Bricked 10 Million IoT Devices

An anonymous reader writes: The author of BrickerBot — the malware that bricks IoT devices — has announced his retirement in an email to Bleeping Computer, also claiming to have bricked over 10 million devices since he started the “Internet Chemotherapy” project in November 2016. Similar to the authors of the Mirai malware, the BrickerBot developer dumped his malware’s source code online, allowing other crooks to profit from his code. The code is said to contain at least one zero-day. In a farewell message left on hundreds of hacked routers, the BrickerBot author also published a list of incidents (ISP downtimes) he caused, while also admitting he is likely to have drawn the attention of law enforcement agencies. “There’s also only so long that I can keep doing something like this before the government types are able to correlate my likely network routes (I have already been active for far too long to remain safe). For a while now my worst-case scenario hasn’t been going to jail, but simply vanishing in the middle of the night as soon as some unpleasant government figures out who I am, ” the hacker said. Read more of this story at Slashdot.

Read More:
Author of BrickerBot Malware Retires, Says He Bricked 10 Million IoT Devices

Bitcoin fees are skyrocketing

Enlarge / Rising demand has caused Bitcoin’s transaction fees to skyrocket. (credit: Timothy B. Lee, using data from Blockchain.info) The cost to complete a Bitcoin transaction has skyrocketed in recent days. A week ago, it cost around $6 on average to get a transaction accepted by the Bitcoin network. The average fee soared to $26 on Friday and was still almost $20 on Sunday. The reason is simple: until recently, the Bitcoin network had a hard-coded 1 megabyte limit on the size of blocks on the blockchain, Bitcoin’s shared transaction ledger. With a typical transaction size of around 500 bytes, the average block had fewer than 2,000 transactions. And with a block being generated once every 10 minutes, that works out to around 3.3 transactions per second. A September upgrade called segregated witness allowed the cryptographic signatures associated with each transaction to be stored separately from the rest of the transaction. Under this scheme, the signatures no longer counted against the 1 megabyte blocksize limit, which should have roughly doubled the network’s capacity. But only a small minority of transactions have taken advantage of this option so far, so the network’s average throughput has stayed below 2,500 transactions per block—around four transactions per second. Read 7 remaining paragraphs | Comments

View article:
Bitcoin fees are skyrocketing

Bitcoin Gold, the Latest Bitcoin Fork, Explained

Timothy B. Lee via Ars Technica explains Bitcoin Gold: A new cryptocurrency called Bitcoin Gold is now live on the Internet. It aims to correct what its backers see as a serious flaw in the design of the original Bitcoin. There are hundreds of cryptocurrencies on the Internet, and many of them are derived from Bitcoin in one way or another. But Bitcoin Gold — like Bitcoin Cash, another Bitcoin spinoff that was created in August — is different in two important ways. Bitcoin Gold is branding itself as a version of Bitcoin rather than merely new platforms derived from Bitcoin’s source code. It has also chosen to retain Bitcoin’s transaction history, which means that, if you owned bitcoins before the fork, you now own an equal amount of “gold” bitcoins. While Bitcoin Cash was designed to resolve Bitcoin’s capacity crunch with larger blocks, Bitcoin Gold aims to tackle another of Bitcoin’s perceived flaws: the increasing centralization of the mining industry that verifies and secures Bitcoin transactions. The original vision for Bitcoin was that anyone would be able to participate in Bitcoin mining with their personal PCs, earning a bit of extra cash as they helped to support the network. But as Bitcoin became more valuable, people discovered that Bitcoin mining could be done much more efficiently with custom-built application-specific integrated circuits (ASICs). As a result, Bitcoin mining became a specialized and highly concentrated industry. The leading companies in this new industry wield a disproportionate amount of power over the Bitcoin network. Bitcoin Gold aims to dethrone these mining companies by introducing an alternative mining algorithm that’s much less susceptible to ASIC-based optimization. In theory, that will allow ordinary Bitcoin Gold users to earn extra cash with their spare computing cycles, just as people could do in the early days of Bitcoin. Read more of this story at Slashdot.

Visit site:
Bitcoin Gold, the Latest Bitcoin Fork, Explained

Kaspersky Admits To Reaping Hacking Tools From NSA Employee PC

Kaspersky has acknowledged that code belonging to the US National Security Agency (NSA) was lifted from a PC for analysis but insists the theft was not intentional. From a report: In October, a report from the Wall Street Journal claimed that in 2015, the Russian firm targeted an employee of the NSA known for working on the intelligence agency’s hacking tools and software. The story suggested that the unnamed employee took classified materials home and operated on their PC, which was running Kaspersky’s antivirus software. Once these secretive files were identified — through an avenue carved by the antivirus — the Russian government was then able to obtain this information. Kaspersky has denied any wrongdoing, but the allegation that the firm was working covertly with the Russian government was enough to ensure Kaspersky products were banned on federal networks. There was a number of theories relating to what actually took place — was Kaspersky deliberately targeting NSA employees on behalf of the Kremlin, did an external threat actor exploit a zero-day vulnerability in Kaspersky’s antivirus, or were the files detected and pulled by accident? According to Kaspersky, the latter is true. On Wednesday, the Moscow-based firm said in a statement that the results of a preliminary investigation have produced a rough timeline of how the incident took place. It was actually a year earlier than the WSJ believed, in 2014, that code belonging to the NSA’s Equation Group was taken. Read more of this story at Slashdot.

Read the original post:
Kaspersky Admits To Reaping Hacking Tools From NSA Employee PC

Japanese Metal Manufacturer Faked Specifications To Hundreds of Companies

schwit1 writes: Kobe Steel, a major Japanese supplier of steel and other metals worldwide, has admitted that it faked the specifications to metals shipped to hundreds of companies over the past decade.Last week, Kobe Steel admitted that staff fudged reports on the strength and durability of products requested by its clients — including those from the airline industry, cars, space rockets, and Japan’s bullet trains. The company estimated that four percent of aluminum and copper products shipped from September 2016 to August 2017 were falsely labelled, Automotive News reported. But on Friday, the company’s CEO, Hiroya Kawasaki, revealed the scandal has impacted about 500 companies — doubling the initial count — and now includes steel products, too. The practice of falsely labeling data to meet customer’s specifications could date back more than 10 years, according to the Financial Times.For rockets the concern is less serious as they generally are not built for a long lifespan, but for airplanes and cars this news could be devastating, requiring major rebuilds on many operating vehicles. Read more of this story at Slashdot.

See the article here:
Japanese Metal Manufacturer Faked Specifications To Hundreds of Companies