New DNA Analysis On Old Blood Pegs Aaron Kosminski As Jack the Ripper

It surely won’t be the last theory offered, but a century and a quarter after the notorious crimes of Jack the Ripper, an “armchair detective” has employed DNA analysis on the blood-soaked shawl of one of the Ripper’s victims, and has declared it in a new book an unambiguous match with Jewish immigrant Aaron Kosminski, long considered a suspect. Kosminski died in 1919 in an insane asylum. The landmark discovery was made after businessman Russell Edwards, 48, bought the shawl at auction and enlisted the help of Dr Jari Louhelainen, a world-renowned expert in analysing genetic evidence from historical crime scenes. Using cutting-edge techniques, Dr Louhelainen was able to extract 126-year-old DNA from the material and compare it to DNA from descendants of [Ripper victim Catherine] Eddowes and the suspect, with both proving a perfect match. (Also at The Independent.) It’s not the first time DNA evidence has been used to try to pin down the identidy of Jack the Ripper, but the claimed results in this case are far less ambiguous than another purported mitochondrial DNA connection promoted by crime novelist Patricia Cornwell in favor of artist William Sickert as the killer in a 2002 book. Read more of this story at Slashdot.

Continued here:
New DNA Analysis On Old Blood Pegs Aaron Kosminski As Jack the Ripper

A Detailed Guide to Cell Phone Insurance in the US

Phone insurance isn’t an exciting topic. But it is a topic a lot of people have questions about, particularly when it comes to two things: who’s the best, and is phone insurance actually a good investment? As you’ll see, those questions don’t really have an easy answer. But I’m going to break down a few of the US’s most popular insurers, alternatives (like your homeowners policy), and explore whether phone insurance is even actually a good idea given your individual needs. Read more…        

Read this article:
A Detailed Guide to Cell Phone Insurance in the US

Researchers Reverse-Engineer Dropbox, Cracking Heavily Obfuscated Python App

rjmarvin writes “Two developers were able to successfully reverse-engineer Dropbox to intercept SSL traffic, bypass two-factor authentication and create open-source clients. They presented their paper, ‘Looking inside the (Drop) box’ (PDF) at USENIX 2013, explaining step-by-step how they were able to succeed where others failed in reverse-engineering a heavily obfuscated application written in Python. They also claimed the generic techniques they used could be applied to reverse-engineer other Frozen python applications: OpenStack, NASA, and a host of Google apps, just to name a few…” Read more of this story at Slashdot.

View original post here:
Researchers Reverse-Engineer Dropbox, Cracking Heavily Obfuscated Python App