When epithelial tissue cells move on curved surfaces, they display different patterns from those they form on flat surfaces—according to a new theory.
Page 4564
Sep 6, 2022
‘Disruptive impact’: India’s military starts investing in quantum key distribution
Posted by Saúl Morales Rodriguéz in categories: encryption, military, quantum physics
“So a quantum key distribution consists of two things: No. 1, got to have a quantum random number generator, and that’s one of the things that QNu Labs makes,” he said. “The second thing that you need is the receivers in which those two devices connect and be used to convey encrypted messages in this fashion.”
In military use, quantum key distribution would work best in point to point communication — that is, communicating from one person to another. Creating a “true network” that’s able to send the same encrypted message to multiple receivers at once is challenging because the encrypted bit that’s carrying the message eventually begins to lose its coherence and “drops away,” Herman said.
“In the military, where you’re sending extremely sensitive classified data from one office to the next, you want to make sure that no one’s going to be able to break into and decrypt that,” he said. “Well, [quantum key distribution] is definitely a way in which to carry that out.”
Sep 6, 2022
What the Natural Gas Shortage Means for Germany: A Winter of Privation?
Posted by Shubham Ghosh Roy in category: energy
On the other hand, ever since Moscow’s invasion of Ukraine in February, Germany has been doing all it can to become independent of gas imports from Russia. The country’s storage facilities are filling up and natural gas consumption, particularly in industry, has dropped significantly. So does that mean that the suspension of deliveries via Nord Stream 1 isn’t such a big deal after all? We have compiled answers to the most important questions.
How badly will German natural gas supplies be affected by the suspension of Nord Stream 1 operations?
The discontinuation of gas deliveries from Russia is certainly a setback for German efforts to fill storage facilities to maximum capacity before the arrival of winter. And drives prices even higher. For the moment, though, no industrial operation or household must be concerned about a sudden suspension of gas supplies. Natural gas demand is rather low for the time being, and plenty of the fuel is being delivered from other countries, though at a much higher price.
Sep 6, 2022
Pioneering mathematical formula paves way for exciting advances in health, energy, and food industry
Posted by Saúl Morales Rodriguéz in categories: biotech/medical, food, health, information science, mathematics
A groundbreaking mathematical equation that could transform medical procedures, natural gas extraction, and plastic packaging production in the future has been discovered.
The new equation, developed by scientists at the University of Bristol, indicates that diffusive movement through permeable material can be modeled exactly for the very first time. It comes a century after world-leading physicists Albert Einstein and Marian von Smoluchowski derived the first diffusion equation, and marks important progress in representing motion for a wide range of entities from microscopic particles and natural organisms to man-made devices.
Until now, scientists looking at particle motion through porous materials, such as biological tissues, polymers, various rocks and sponges have had to rely on approximations or incomplete perspectives.
Sep 6, 2022
New breakthrough pushes perovskite cell to greater stability, efficiency
Posted by Saúl Morales Rodriguéz in categories: solar power, sustainability
Researchers at the U.S. Department of Energy’s (DOE’s) National Renewable Energy Laboratory (NREL) have made a technological breakthrough and constructed a perovskite solar cell with the dual benefits of being both highly efficient and highly stable.
The work was done in collaboration with scientists from the University of Toledo, the University of Colorado-Boulder, and the University of California-San Diego.
A unique architectural structure enabled the researchers to record a certified stabilized efficiency of 24% under 1-sun illumination, making it the highest reported of its kind. The highly efficient cell also retained 87% of its original efficiency after 2,400 hours of operation at 55 degrees Celsius.
Sep 6, 2022
Minecraft is hackers’ favorite game title for hiding malware
Posted by Saúl Morales Rodriguéz in categories: cybercrime/malcode, transportation
Security researchers have discovered that Minecraft is the most heavily abused game title by cybercriminals, who use it to lure unsuspecting players into installing malware.
Based on stats collected by the security firm between July 2021 and July 2022, Minecraft-related files accounted for roughly 25% of malicious files spreading via game brand abuse, followed by FIFA (11%), Roblox (9.5%), Far Cry (9.4%), and Call of Duty (9%).
Other game titles with notable percentages of abuse during this period are Need for Speed, Grand Theft Auto, Valorant, The Sims, and GS: GO.
Sep 6, 2022
New Linux malware evades detection using multi-stage deployment
Posted by Saúl Morales Rodriguéz in categories: cryptocurrencies, cybercrime/malcode
A new stealthy Linux malware known as Shikitega has been discovered infecting computers and IoT devices with additional payloads.
The malware exploits vulnerabilities to elevate its privileges, adds persistence on the host via crontab, and eventually launches a cryptocurrency miner on infected devices.
Shikitega is quite stealthy, managing to evade anti-virus detection using a polymorphic encoder that makes static, signature-based detection impossible.
Sep 6, 2022
New EvilProxy service lets all hackers use advanced phishing tactics
Posted by Saúl Morales Rodriguéz in category: cybercrime/malcode
A reverse-proxy Phishing-as-a-Service (PaaS) platform called EvilProxy has emerged, promising to steal authentication tokens to bypass multi-factor authentication (MFA) on Apple, Google, Facebook, Microsoft, Twitter, GitHub, GoDaddy, and even PyPI.
The service enables low-skill threat actors who don’t know how to set up reverse proxies to steal online accounts that are otherwise well-protected.
Reverse proxies are servers that sit between the targeted victim and a legitimate authentication endpoint, such as a company’s login form. When the victim connects to a phishing page, the reverse proxy displays the legitimate login form, forwards requests, and returns responses from the company’s website.
Sep 6, 2022
Stable Diffusion: DALL-E 2 For Free, For Everyone!
Posted by Dan Kummer in category: computing
❤️ Check out Lambda here and sign up for their GPU Cloud: https://lambdalabs.com/papers.
📝 The paper “High-Resolution Image Synthesis with Latent Diffusion Models” is available here:
https://ommer-lab.com/research/latent-diffusion-models/
https://github.com/mallorbc/stable-diffusion-klms-gui.
Continue reading “Stable Diffusion: DALL-E 2 For Free, For Everyone!” »
Sep 6, 2022
Humans are the First Aliens. Here’s Why
Posted by Dan Breeden in categories: evolution, existential risks, information science
Where are all the aliens?! This is the essence to the Fermi Paradox. It’s most popular solution is the “Great Filter.” What is the obstacle that life and/or intelligent species are unlikely to survive? Let’s discuss.
00:00 Cold Open.
00:18 Introduction.
00:48 History of the Fermi Paradox.
02:48 Fermi Paradox Explained.
03:55 Drake Equation Explained.
07:04 The Great Filter.
09:56 Rare Earth Hypothesis.
10:53 Geologic Time in Galactic Years.
14:48 Evolution of Intelligent Life.
17:03 Conclusions.
19:11 Poll Results.
19:47 Outro.
20:10 Featured Comment.
Continue reading “Humans are the First Aliens. Here’s Why” »