Deciding to Make Frozen II Was Much More Complicated Than You'd Expect

The idea of making a sequel to one of the biggest animated films of all time somehow seems more than just “obvious.” “Essential” is likely a better word. And yet, the filmmakers behind Frozen and the upcoming Frozen II say making a sequel wasn’t their first instinct and the road to get there was more than a little…

Read more…



Source: Gizmodo – Deciding to Make Frozen II Was Much More Complicated Than You’d Expect

Shelter, Application To Create An Isolated Space On Android!

Creating an application clone on a smartphone is one way to open 2 different accounts for an application for certain purposes. Actually, cloning an application is not necessary when the application has a feature to open more than one account. Examples are Applications made by Google.

Source: LXer – Shelter, Application To Create An Isolated Space On Android!

German police seize “bulletproof” hosting data center in former NATO  bunker

Sven Olaf Kamphuis's Facebook profile picture, taken in front of the original CyberBunker facility. Its German successor was seized by police on September 26.

Enlarge / Sven Olaf Kamphuis’s Facebook profile picture, taken in front of the original CyberBunker facility. Its German successor was seized by police on September 26. (credit: Sven Olaf Kamphuis)

On September 26, a data center in a former NATO military bunker in the town of Traben-Trarbach, Germany was raided by police, according to a report by the Associated Press. Set up by a man who authorities describe as a 59-year-old Dutchman, the “CyberBunker” offered “bulletproof” hosting services—promising to keep hosted sites secure from law enforcement actions and operational regardless of legal demands.

According to authorities, the bunker housed the servers for a multitude of “dark web” sites selling drugs, hosting child pornography, and conducting other illegal activities. Among the sites hosted was “Wall Street Market,” which authorities claim was one of the world’s largest criminal marketplaces—selling drugs, stolen financial data, and hacking tools—until it was taken down earlier this year. The Traben-Trabach data center was also involved in a 2016 distributed denial of service (DDoS) attack against Deutsche Telekom.

Seven people were arrested, and six other suspects, including two Dutch nationals, are still being sought by police. The raid was part of a coordinated law enforcement action at five locations by authorities in Germany, the Netherlands, Poland, and Luxembourg.

Read 5 remaining paragraphs | Comments



Source: Ars Technica – German police seize “bulletproof” hosting data center in former NATO  bunker

Axi0mX Teases iPhone X Running iOS 13.1.1 Jailbroken With Checkm8 Exploit

Axi0mX Teases iPhone X Running iOS 13.1.1 Jailbroken With Checkm8 Exploit
Over the weekend, news spread of an unpatchable “checkm8” exploit that could allow millions of iPhone users to quickly and easily jailbreak their handsets. Lest there was any doubt it works, the hacker who developed the exploit posted a video on Twitter showing checkm8 in action on an iPhone X running iOS 13.1.1.

The bad news for Apple

Source: Hot Hardware – Axi0mX Teases iPhone X Running iOS 13.1.1 Jailbroken With Checkm8 Exploit

Looking Back at the Snowden Revelations

Matthew Green, a cryptographer and professor at Johns Hopkins University, writes: So what did Snowden’s leaks really tell us? The brilliant thing about the Snowden leaks was that he didn’t tell us much of anything. He showed us. Most of the revelations came in the form of a Powerpoint slide deck, the misery of which somehow made it all more real. And despite all the revelation fatigue, the things he showed us were remarkable. I’m going to hit a few of the highlights from my perspective. Many are cryptography-related, just because that’s what this blog is about. Others tell a more basic story about how vulnerable our networks are.

“Collect it all”

Prior to Snowden, even surveillance-skeptics would probably concede that, yes, the NSA collects data on specific targets. But even the most paranoid observers were shocked by the sheer scale of what the NSA was actually doing out there. The Snowden revelations detailed several programs that were so astonishing in the breadth and scale of the data being collected, the only real limits on them were caused by technical limitations in the NSA’s hardware. Most of us are familiar with the famous examples, like nationwide phone metadata collection. But it’s the bizarre, obscure leaks that really drive this home. “Optic Nerve”: From 2008-2010 the NSA and GCHQ collected millions of still images from every Yahoo! Messenger webchat stream, and used them to build a massive database for facial recognition. The collection of data had no particular rhyme or reason — i.e., it didn’t target specific users who might be a national security threat. It was just… everything.

Read more of this story at Slashdot.



Source: Slashdot – Looking Back at the Snowden Revelations

Video: Ubisoft’s Alex Karpazis rates your Rainbow Six: Siege loadouts

A few weeks ago, we asked folks at both the main and fashion-specific Rainbow Six subreddits to share pictures of their Rainbow Six: Siege operators and loadouts. We took some of those submissions and shared them with Ubisoft Presentation Art Director Alex Karpazis to get his expert take on the style and the strategy behind these character choices.

Karpazis has plenty to say about the purely superficial bits of Rainbow Six style, calling out some rocking “Twitch Prime purple hair” in particular. But he also gets into how that style can affect gameplay, as with different gun sights that “obscure different parts of the screen” when trying to make your shot. There’s also some general strategy advice mixed in, especially for people who accidentally kill their hostages with Fuze’s grenade-spreading gadget.

We also convinced Karpazis to show off his own in-game loadouts and stats, a process he preceded by saying “Nobody is good at Rainbow, including me… Please be gentle, I get it.”

Read 1 remaining paragraphs | Comments



Source: Ars Technica – Video: Ubisoft’s Alex Karpazis rates your Rainbow Six: Siege loadouts

A New King's Man Trailer Asks 'What If Downton Abbey Had Super Spies?'

Before they were posh, super spies saving the present-day world, the heroes of Fox’s Kingsman franchise were posh in an old-timey way befitting of an era where parachutes were considered cutting-edge technology. The latest trailer for Matthew Vaughn’s upcoming Kingsmen prequel, The King’s Man, is light in the way of…

Read more…



Source: io9 – A New King’s Man Trailer Asks ‘What If Downton Abbey Had Super Spies?’

Exim 4.92.3 security release

Exim 4.92.3 has been released with a fix for CVE-2019-16928, a heap-based
buffer overflow in string_vformat that could lead to remote code
execution. “The currently known exploit uses a extraordinary long
EHLO string to crash the Exim process that is receiving the message. While
at this mode of operation Exim already dropped its privileges, other paths to
reach the vulnerable code may exist.


Source: LWN.net – Exim 4.92.3 security release

HP Spectre x360 13 Revamped With Smaller Chassis And 10th Gen Intel Ice Lake CPUs

HP Spectre x360 13 Revamped With Smaller Chassis And 10th Gen Intel Ice Lake CPUs
Hewlett-Packard is refreshing its popular Spectre x360 13 with a number of critical upgrades that make it an even more compelling mobile warrior for professionals. Perhaps the biggest change comes with respect to the device’s chassis, which has nipped and tucked to the max.

HP has managed to shrink the Spectre x360 13 by 13 percent compared

Source: Hot Hardware – HP Spectre x360 13 Revamped With Smaller Chassis And 10th Gen Intel Ice Lake CPUs

D-Wave announces the next generation of its quantum annealer

A collection of many brightly colored lines a black background.

A depiction of the complex topology of the connections among qubits in D-Wave’s next-generation hardware. (credit: D-Wave)

On Tuesday, D-Wave announced the details of its next-generation computation hardware, which it’s calling “Advantage,” and released a set of white papers that describe some of the machine’s performance characteristics. While some of the details of the upcoming system have been revealed earlier, Ars had the chance to sit in on a D-Wave users’ group meeting, which included talks by company VP of Product dDsign, Mark Johnson and Senior Scientist Cathy McGeoch. We also sat down to discuss the hardware with Alan Baratz, D-Wave’s chief product officer. They gave us a sense of what to expect when the machine comes online next year.

Part of the landscape

D-Wave’s hardware performs a form of computation that’s distinct from the one being pursued by companies like Google, Intel, and IBM. Those companies are attempting to build a gate-based quantum computer that’s able to perform general computation, but they’ve run into known issues with scaling up the number of qubits and limiting the appearance of noise in their computations. D-Wave’s quantum annealer is more limited in the types of problems it can solve, but its design allows the number of qubits to scale up more easily and limits the impact of noise.

It’s easiest to think of a D-Wave as exploring an energy landscape filled with hills and valleys. It specializes in finding the lowest valley in one of these landscapes and avoids getting stuck in a local valley by using quantum effects to “tunnel” through intervening hillsides. That can be used to perform calculations, but only if the calculation can be structured so that it looks like an energy minimization problem.

Read 11 remaining paragraphs | Comments



Source: Ars Technica – D-Wave announces the next generation of its quantum annealer

It Came Outta Nowhere!: Dashcam Footage Of Driver Clipping A Couch On Highway At 70MPH

This is a short dashcam video of a motorist traveling around 70MPH on I-75 near Detroit and clipping a sofa that appears out of nowhere. Thankfully, the driver is fine, the car only suffered some slight wheel well bowing, and the couch was removed from the roadway. Still, somebody really needs to take a course in decorating. I mean if you put the couch there, where are you gonna put the TV? And I don’t even wanna think about the trek to the fridge for another cold one.

Keep going for the video while I speculate if this sofa’s owner also has a fire pit in their bathroom and toilet in the kitchen.

Source: Geekologie – It Came Outta Nowhere!: Dashcam Footage Of Driver Clipping A Couch On Highway At 70MPH

The ASUS ROG Phone II Review: Mobile Gaming First, Phone Second

The concept of mobile gaming is still a relatively new phenomenon. The idea that a user can have a smartphone dedicated to gaming that isn’t in of itself a console or handheld platform from Nintendo seems very odd – here’s a device that does everything a phone can do, as well as play the same games, so what makes it a “Gaming Phone”, especially if it has almost the same hardware inside? ASUS’s new ROG Phone II, designed under its Republic of Gamers brand, is ultimately a product designed to showcase that there are things you can do with a phone to make it more gaming focused. We take the device (and some of its accessories) for a spin.



Source: AnandTech – The ASUS ROG Phone II Review: Mobile Gaming First, Phone Second