Elon Musk’s Boring Company Delivers $600 Flamethrower

Last December, Boring Company CEO Elon Musk promised to sell a Boring Company-branded flamethrower after selling 50, 000 Boring Company hats. Well, sure enough, 50, 000 hats were sold and Musk is delivering on his promise. The Verge reports: Mark this down as one of the promises Elon delivers on, apparently, because it looks like the Boring Company flamethrower is here. Redditors in a few SpaceX, Boring Company, and Musk-related subreddits noticed earlier this week that the URL “boringcompany.com/flamethrower” started redirecting to a page with a password box. And at least one user was able to guess the original password, too: “flame.” (It’s since been changed.) Behind that password was a shop page that looks just like the one for The Boring Company’s hat. But instead of a $20 cap, they found a preorder prompt for a $600 flamethrower. “Prototype pictured above, ” the listing reads. “Final production flamethrower will be better.” Read more of this story at Slashdot.

Read the original:
Elon Musk’s Boring Company Delivers $600 Flamethrower

How a PhD Student Unlocked 1 Bitcoin Hidden In DNA

dmoberhaus writes: A 26-year-old Belgian PhD student named Sander Wuytz recently solved a 3-year-old puzzle that had locked the private key to 1 Bitcoin in a strand of synthetic DNA. Motherboard spoke with the student about how they managed to crack the puzzle, just days before it was set to expire. From the report: “As detailed by Nick Goldman, a researcher at the European Bioinformatics Institute, in his pioneering Nature paper on DNA storage, to encode information into DNA you take a text or binary file and rewrite it in base-3 (so rather than just ones and zeroes, there are zeroes, ones, and twos). This is then used to encode the data in the building blocks of life, the four nucleobases cytosine, thymine, adenine and guanine. As Wuyts explained to me, coding the data as nucleobases depended upon which nucleobase came before. So, for instance, if the previous base was adenine and the next pieces of data is a 0, it is coded as cytosine. If the next piece of data is a 1, it’s coded as guanine, and so on. After the data is encoded as synthetic DNA fragments, these fragments are used to identify and read the actual files stored in the DNA. In the case of the Bitcoin challenge, there were a total of nine files contained in the DNA fragments. The files were encrypted with a keystream, which is a random series of characters that is included with the actual plain text message to obfuscate its meaning. The keystream code had been provided by Goldman in a document explaining the competition. After running the code, Wuyts was able to combine the DNA fragments in the correct order to form one long piece of DNA. After working out some technical kinks, Wuyts was able to convert the DNA sequence into plain text, revealing the private key and unlocking the bitcoin (as well as some artefacts, including a drawing of James Joyce and the logo for the European Bioinformatics Institute). He had cracked the puzzle just five days before it was set to expire.” Read more of this story at Slashdot.

More:
How a PhD Student Unlocked 1 Bitcoin Hidden In DNA

Australian Birds of Prey Are Deliberately Setting Forests On Fire

An anonymous reader writes: If you’ve been counting the ways the Australian environment is trying to kill you, you can now add “arson” to the list. According to a six-year study published in The Journal of Ethnobiology, observers have confirmed what Aboriginal rangers have been observing for years: birds of prey routinely carry burning or smouldering sticks into dry grassy areas to scare small mammals into fleeing so they can be pack-hunted more effectively. This has implications for environmental management, since the best firebreak will not protect your controlled burn from a “firehawk” determined to breach it. Read more of this story at Slashdot.

Read More:
Australian Birds of Prey Are Deliberately Setting Forests On Fire

macOS High Sierra’s App Store System Preferences Can Be Unlocked With Any Password

A bug report submitted on Open Radar this week reveals a security vulnerability in the current version of macOS High Sierra that allows the App Store menu in System Preferences to be unlocked with any password. From a report: MacRumors is able to reproduce the issue on macOS High Sierra version 10.13.2, the latest public release of the operating system, on an administrator-level account by following these steps: 1. Click on System Preferences. 2. Click on App Store. 3. Click on the padlock icon to lock it if necessary. 4. Click on the padlock icon again. 5. Enter your username and any password. 6. Click Unlock. As mentioned in the radar, System Preferences does not accept an incorrect password with a non-administrator account. We also weren’t able to unlock any other System Preferences menus with an incorrect password. We’re unable to reproduce the issue on the third or fourth betas of macOS High Sierra 10.13.3, suggesting Apple has fixed the security vulnerability in the upcoming release. However, the update currently remains in testing. Read more of this story at Slashdot.

More:
macOS High Sierra’s App Store System Preferences Can Be Unlocked With Any Password

After Intel ME, Researchers Find Security Bug In AMD’s SPS Secret Chip-on-Chip

An anonymous reader writes: AMD has fixed, but not yet released BIOS/UEFI/firmware updates for the general public for a security flaw affecting the AMD Secure Processor. This component, formerly known as AMD PSP (Platform Security Processor), is a chip-on-chip security system, similar to Intel’s much-hated Management Engine (ME). Just like Intel ME, the AMD Secure Processor is an integrated coprocessor that sits next to the real AMD64 x86 CPU cores and runs a separate operating system tasked with handling various security-related operations. The security bug is a buffer overflow that allows code execution inside the AMD SPS TPM, the component that stores critical system data such as passwords, certificates, and encryption keys, in a secure environment and outside of the more easily accessible AMD cores. Intel fixed a similar flaw last year in the Intel ME. Read more of this story at Slashdot.

Read the original:
After Intel ME, Researchers Find Security Bug In AMD’s SPS Secret Chip-on-Chip

The World’s First 88-inch 8K OLED Display

From a report: Come CES, LG will be letting attendees get up close with its new 88-inch 8K OLED display, which is both the largest and the highest-resolution OLED panel to date. But as far as specs go, that’s all we have for now. Previously, the largest OLED screen size was 77 inches, and it “only” came in 4K. While this combination is currently offered to consumers by the likes of LG Electronics, Sony and Panasonic, they all source their large OLED panels from LG Display. Read more of this story at Slashdot.

See the article here:
The World’s First 88-inch 8K OLED Display

Construction Workers Find 30 Perfectly Preserved Dinosaur Eggs

An anonymous reader quotes BGR: Chinese construction workers digging on Christmas day found a gift that was wrapped 130 million years ago in the form of 30 incredibly preserved dinosaur eggs. The discovery was made in the city of Ganzhou at the future site of a new middle school, but work on the new facility had to be put on hold after the ancient eggs were discovered. According to state media, the workers reported uncovering “oval-shaped stones” while clearing rock away using explosive blasts. The workers suspected they might be important so they alerted local law enforcement who took command of the site and contacted experts from a nearby museum who confirmed the “rocks” were actually fossilized dinosaur eggs. The eggs, which are thought to date from the Cretaceous period, are estimated to be as old as 130 million years. The location where they were discovered is believed to have once been an ancient lakeshore, which would have been a pleasant place for the dinosaurs to raise their brood. Read more of this story at Slashdot.

Read the original post:
Construction Workers Find 30 Perfectly Preserved Dinosaur Eggs

AMD Quietly Made Some Radeon RX 560 Graphics Cards Worse

Brad Chacos: When the Radeon RX 560 launched in April it was the only RX 500-series card with a meaningful under-the-hood tech boost compared to the RX 400-series. The graphics processor in the older RX 460 cards packed 14 compute units and 896 stream processors; the upgraded Radeon RX 560 bumped that to 16 CUs and 1, 024 SPs. Now, some — but not all — of the Radeon RX 560s you’ll find online have specs that match the older 460 cards, and sometimes run at lower clock speeds to boot. AMD’s Radeon RX 560 page was also quietly altered to include the new configurations at some point, Heise.de discovered. The last snapshot of the page by the Internet Archive’s Wayback Machine occurred on July 7 and only lists the full-fat 16 CU version of the card, so the introduction of the nerfed 896 SP model likely occurred some time after that. Sifting through all of the available Radeon RX 560s on Newegg this morning reveals a fairly even split between the two configurations, all of which are being sold under the same RX 560 name. In a statement, AMD acknowledged the existence of 14 Compute Unit (896 stream processors) and 16 Compute Unit (1024 stream processor) versions of the Radeon RX 560. “We introduced the 14CU version this summer to provide AIBs and the market with more RX 500 series options. It’s come to our attention that on certain AIB and etail websites there’s no clear delineation between the two variants. We’re taking immediate steps to remedy this: we’re working with all AIB and channel partners to make sure the product descriptions and names clarify the CU count, so that gamers and consumers know exactly what they’re buying. We apologize for the confusion this may have caused.” Read more of this story at Slashdot.

Read the article:
AMD Quietly Made Some Radeon RX 560 Graphics Cards Worse

Man Hacks Jail Computer Network To Get Inmate Released Early

An anonymous reader writes: A Michigan man pleaded guilty last week to hacking the computer network of the Washtenaw County Jail, where he modified inmate records in an attempt to have an inmate released early. To breach the jail’s network, the attacker used only spear-phishing emails and telephone social engineering. The man called jail employees and posed as local IT staffers, tricking some into accessing a website, and downloading and installing malware under the guise of a jail system upgrade. Once the man (Konrads Voits) had access to this data, investigators said he accessed the XJail system, searched and accessed the records of several inmates, and modified at least one entry “in an effort to get that inmate released early.” Jail employees noticed the modification right away and alerted the FBI. The man as arrested a month later and is now awaiting sentencing (maximum 10 years and a fine of up to $250, 000). Read more of this story at Slashdot.

More:
Man Hacks Jail Computer Network To Get Inmate Released Early

Sensitive Personal Information of 246,000 DHS Employees Found on Home Computer

The sensitive personal information of 246, 000 Department of Homeland Security employees was found on the home computer server of a DHS employee in May, according to documents obtained by USA TODAY. From the report: Also discovered on the server was a copy of 159, 000 case files from the inspector general’s investigative case management system, which suspects in an ongoing criminal investigation intended to market and sell, according to a report sent by DHS Inspector General John Roth on Nov. 24 to key members of Congress. The information included names, Social Security numbers and dates of birth, the report said. The inspector general’s acting chief information security officer reported the breach to DHS officials on May 11, while IG agents reviewed the details. Acting DHS Secretary Elaine Duke decided on Aug. 21 to notify affected employees who were employed at the department through the end of 2014 about the breach. Read more of this story at Slashdot.

Read this article:
Sensitive Personal Information of 246,000 DHS Employees Found on Home Computer