How We Know North Korea Didn’t Detonate a Hydrogen Bomb

StartsWithABang writes: The news has been aflame with reports that North Korea detonated a hydrogen bomb on January 6th, greatly expanding its nuclear capabilities with their fourth nuclear test and the potential to carry out a devastating strike against either South Korea or, if they’re more ambitious, the United States. The physics of what a nuclear explosion actually does and how that signal propagates through the air, oceans and ground, however, can tell us whether this was truly a nuclear detonation at all, and if so, whether it was fusion or fission. From all the data we’ve collected, this appears to be nothing new: just a run-of-the-mill fission bomb, with the rest being a sensationalized claim. (Related: Yesterday’s post about how seismic data also points to a conventional nuke, rather than an H-bomb.) Read more of this story at Slashdot.

Taken from:
How We Know North Korea Didn’t Detonate a Hydrogen Bomb

Microsoft will warn users targeted by government hackers (update)

Microsoft promises to notify its users if it believes that the government’s targeting their account. In its announcement post , the company says it already notifies subscribers if an unauthorized person’s trying to access their Outlook email and OneDrive. But from now on, it will also specify if it suspects the attacker is sponsored by a government. Microsoft VP Scott Charney writes: We’re taking this additional step of specifically letting you know if we have evidence that the attacker may be “state-sponsored” because it is likely that the attack could be more sophisticated or more sustained than attacks from cybercriminals and others. These notifications do not mean that Microsoft’s own systems have in any way been compromised. According to Reuters , Redmond has changed its policy after the news outlet made a series of inquiries over the past few days regarding a Hotmail attack that was discovered in 2011. Apparently, Microsoft had evidence that Chinese authorities were behind that campaign targeting the emails of China’s Tibetan and Uighur minority leaders, but it never told the victims. (*see update below) In addition to announcing the new policy, the company has also listed steps people can take to prevent their accounts from being accessed by outsiders, state-sponsored or not. These include switching on two-step verification, using strong passwords and keeping their OS and anti-virus program up to date. Microsoft is the latest addition in the growing list of tech corporations that had chosen to tell their customers if they’re being hacked by the government. Google has been doing so since 2012, and Facebook announced its intention to warn people of state-sponsored attacks in October. Update: A Microsoft spokesperson has reached out and told Engadget that it isn’t true that it was able to pinpoint the source of the 2011 Hotmail attacks: Our focus is on helping customers keep personal information secure and private. Our primary concern was ensuring that our customers quickly took practical steps to secure their accounts, including by forcing a password reset. We weighed several factors in responding to this incident, including the fact that neither Microsoft nor the U.S. Government were able to identify the source of the attacks , which did not come from any single country. We also considered the potential impact on any subsequent investigation and ongoing measures we were taking to prevent potential future attacks. [Image credit: AP Photo/Ted S. Warren] Source: Microsoft , Reuters (1) , (2)

Follow this link:
Microsoft will warn users targeted by government hackers (update)

House looks into claims the NSA spied on Congress

You’re not the only one concerned that the National Security Agency might be spying on Congress … Congress is, too. The House Intelligence Committee says it’s investigating claims that the NSA monitored communications between members of Congress and Israeli leadership as they discussed the Iran nuclear agreement. The Committee not only wants a point-by-point verification of the Wall Street Journal ‘s original report, but to find out whether or not the NSA was following the rules. There’s potential for trouble. While the White House reportedly didn’t order the eavesdropping, it also didn’t stop the activity when it found out. Moreover, this came after officials claimed that the US no longer snoops on NATO members’ heads of state — apparently, that courtesy doesn’t extend to allies outside of the region. Even if any surveillance was completely above-board, it’ll still raise questions about where and when the NSA is allowed to operate. [Image credit: AP Photo/J. Scott Applewhite] Source: The Hill

Read the article:
House looks into claims the NSA spied on Congress

Google will strip Oracle’s Java code out of Android

Google has confirmed that it will no longer use Java application programming interfaces (APIs) from Oracle in future versions of Android, according to VentureBeat . Instead, it will switch to OpenJDK, an open-source version of Oracle’s own Java Development Kit. While you might ask, “Who actually cares?”, Google says the change will simplify app development by creating a common codebase for Java. It’s hard to imagine that such a huge change (8, 902 files are supposedly affected) isn’t related to Google’s ongoing legal dispute with Oracle, though. That dispute, depending on how it’s resolved, could adversely affect Android development and app coding in general. The epic dispute started when Oracle sued Google for copyright back in 2010, claiming that Google improperly used its Java APIs. Google argued that the APIs in question were essential for to software innovation, and therefore couldn’t be copyrighted. In 2012, a jury found that Google didn’t infringe Oracle’s copyright, but a Federal court mostly reversed the decision in 2014. The US Supreme court didn’t want to touch the case and sent it back to a lower court, where it currently sits. Users on Y Combinator’s Hacker News who first spotted the code have theorized that it may mean that Google and Oracle have settled the lawsuit out of court. However, Google told VentureBeat that the legal dispute is still ongoing, so it couldn’t comment on whether the code change is related. As for how this affects you or me, the new code should make it a touch simpler for Android N developers, possibly resulting in better apps and quicker updates. However, the court’s upcoming decision could have much wider ramifications. If they decide that API’s from the likes of Java can be copyrighted, it could turn the patent wars into even more of a cluster-you-know-what. Source: VentureBeat

Read More:
Google will strip Oracle’s Java code out of Android

Clinton Home Servers Had Ports Open

Jim Efaw writes: Hillary Clinton’s home servers had more than just the e-mail ports open directly to the Internet. The Associated Press discovered, by using scanning results from 2012 “widely available online”, that the clintonemail.com server also had the RDP port open; another machine on her network had the VNC port open, and another one had a web server open even though it didn’t appear to be configured for a real site. Clinton previously said that her server featured “numerous safeguards, ” but hasn’t explained what that means. Apparently, requiring a VPN wasn’t one of them. Read more of this story at Slashdot.

View the original here:
Clinton Home Servers Had Ports Open

Feds recover emails from Hillary Clinton’s private server

The FBI has recovered emails from the private server Hillary Clinton surrendered to the Justice Department back in August, according to Bloomberg . If you recall, Clinton admitted to deleting all her personal correspondences long ago but turned over copies of her work emails (around 30, 000 in number) to the government. You can even read thousands of them — mostly schedules, press clippings, speech notes and the like — on the State Department’s website. However, she decided to hand over her server anyway after the Intelligence Community Inspector General told Congress that some of the work emails she turned in could be classified as “top secret.” Now, the feds have managed to salvage those deleted digital missives, though it’s unclear if they were able to restore them all or just a few. Bloomberg says the FBI is now hard at work segregating the pile, separating truly personal ones ( e.g. Chelsea Clinton’s wedding details and yoga routines) from those that can still fall under the “work” category. The authorities’ investigation is expected to last a few more months, though, so it could take a while before we find out whether other top secret emails were among the deleted ones. [Image credit: Shutterstock / Frontpage] Source: Bloomberg

See more here:
Feds recover emails from Hillary Clinton’s private server

How Wind and Politics Pushed the Price of Texas Electricity Below Zero

Slate dissects the strange circumstances that led the price of electricity in Texas to briefly dip not just to zero, but into negative territory, reaching at one point negative $8.52 per megawatt hour. Why? A combination of being an “electricity island” with only weak ties to the surrounding state’s grids; strong wind in a state that’s sprouted thousands of windmills; and infrastructure design that means the only real buyer for most electricity producers’ output is ERCOT, the Electric Reliability Council of Texas. (One of the comments attached to the story notes that Texas is not completely isolated from the national grid, but it’s still markedly isolated.) A slice: Demand fell—at 4 a.m., the amount of electricity needed in the state was about 45 percent lower than the evening peak. The wind was blowing consistently—much later in the day Texas would establish a new instantaneous wind generation record. At 3 a.m., wind was supplying about 30 percent of the state’s electricity, as this daily wind integration report shows. And because the state is an electricity island, all the power produced by the state’s wind farms could only be sold to ERCOT, not grids elsewhere in the country. Read more of this story at Slashdot.

Excerpt from:
How Wind and Politics Pushed the Price of Texas Electricity Below Zero

Bitcoin Fork Divides Community

HughPickens.com writes: The Bitcoin community is facing one of the most momentous decisions in its six-year history. The Bitcoin network is running out of spare capacity, and two increasingly divided camps disagree about what, if anything, to do about the problem. The technical issue is that a block, containing a record of recent transactions, currently has a 1MB limit. Increasing the block size would allow more transactions on the network at once, helping it to scale up to meet growing demand. But it would also make it more difficult for ordinary users to host full network “nodes” that validate new transactions on the network, potentially making the digital currency more centralized as a result. Now Rob Price writes that two high-profile developers have released a competing version of the codebase that risks splitting the digital currency in two. Gavin Andresen and Mike Hearn have released Bitcoin XT, an alternative version of the core software that supports increasing the block size when required. Bitcoin users will now be forced to decide between “Bitcoin Core” and Bitcoin XT, raising the prospect of a “fork, ” where the digital currency divides into two competing versions. According to Price, Core and XT are compatible right now. However, if XT is adopted by 75% of users by January 2016, it will upgrade to a larger block size that will be incompatible with Core — meaning that if the other 25% don’t then choose to convert, it will effectively split the currency into two. So far, 7.7% of the network has adopted XT, according to website XTnodes.com. “Ultimately, how the dispute is resolved may matter more than the specific decision that’s reached, ” says Timothy B. Lee. “If the community is ultimately able to reach a consensus, the process could become a template for resolving future disagreements. On the other hand, if disagreements fester for months — or, worse, if a controversial software change splits the Bitcoin network into two warring camps — it could do real damage to Bitcoin’s reputation.” Read more of this story at Slashdot.

See the original article here:
Bitcoin Fork Divides Community

Spooks Keep Finding Classified Information in Hillary’s Private Emails

Hillary Clinton’s email scandal isn’t going away any time soon. The Associated Press is now reporting that the intelligence community found classified information in two of the 40 randomly selected emails from the 30, 000 that Clinton handed over to investigators. Think about those numbers. Read more…

More:
Spooks Keep Finding Classified Information in Hillary’s Private Emails