Menu

Blog

Page 5249

Jul 5, 2021

Black Holes, Quantum Entanglement and the No-Go Theorem

Posted by in categories: computing, cosmology, quantum physics

New research shows that there are problems even quantum computers might never be able to solve.

Jul 5, 2021

Longevity Panel — The Scientists working on Reversing Aging | Part 1

Posted by in categories: biological, life extension

Long vid. Slight annotation in the comments. A few takaways I liked: We need to move to human data instead of mice. People’s attitude towards life extension should change drastically soon. There is human data among this group and have released it, will keep following it, and some to be released soon. Sinclair thinks he can start primate trials this year. And overall everyone is optimistic.


A couple of weeks ago Avi Roy, alongside Nathan Cheng & Laura Minquini, hosted the Longevity Panel discussion, which assembled some of the biggest scientists in the field currently working on reversing aging.

Continue reading “Longevity Panel — The Scientists working on Reversing Aging | Part 1” »

Jul 5, 2021

New chip wiring method scales down to 3nm

Posted by in categories: computing, materials

U.S. company Applied Materials has revealed a new process to engineer the wiring of advanced logic chips that can scale down to 3 nanometres (nm).

Jul 5, 2021

The Scandinavian way to zero-carbon construction

Posted by in category: futurism

Cities like Oslo, Helsinki and Copenhagen are working to clean up one of the world’s most high-emission industries.

Jul 5, 2021

Jeff Bezos steps down as Amazon boss

Posted by in category: futurism

Jeff Bezos leaves his role as CEO of the tech giant on Monday — exactly 27 years after he founded it.


As Bezos leaves his role as CEO, those who have worked with him ponder the lessons learned.

Jul 5, 2021

Google confession: Google Assistant records audio 24×7 even when you are not using it or don’t want it

Posted by in categories: mobile phones, robotics/AI

Voice assistants are a very controversial technological implementation, as some believe they are too intrusive with users’ privacy and do not provide significantly useful features compared to using a conventional computer or smartphone. Its use becomes increasingly questionable considering the constant reports of information collection. The most recent of these reports points out that Google Assistant technology can listen to users’ conversations even without being invoked.

The company had already admitted that it records some of the users’ conversations, though its reports claimed this was impossible if the user didn’t say “OK Google” aloud. However, this new report ensures that it is not necessary for the user to activate the assistant with the renowned voice command.

According to Android Authority researchers, a Google representative admitted that its virtual assistant records audio even when this tool is not used, even recognizing that employees have access to this information. However, Google clarified that this has not been done inadvertently, ensuring that its staff is not listening to users’ conversations. In addition, it was established that Google staff only have access to limited parts of the audio.

Jul 5, 2021

Google cloud VMs servers can be hacked via DHCP using this vulnerability in a specific scenario

Posted by in category: cybercrime/malcode

A recent security report states that it is possible to hijack sessions on Google Compute Engine virtual machines to gain root access through a DHCP attack. While deploying this attack is impractical, an exploit attempt can be highly functional.

The report, published on GitHub, mentions that a threat actor could allow threat actors to take control of virtual machines because these deployments rely on ISC DHCP software, which employs a very weak random number generator. A successful attack clutters these virtual machines with DHCP traffic, forcing the use of a fake metadata server controlled by an attacker.

If the attack is successful, the virtual machine uses the unauthorized server for its configuration instead of an official Google one, which would allow cybercriminals to log in to the affected device with root access.

Jul 5, 2021

Ultra-Realistic Hand Scans

Posted by in category: futurism

A Founder of 3D Scan Store has shown a re-rendered version of one of the realistic hand scans.

Jul 5, 2021

A residue-free approach to water disinfection using catalytic in situ generation of reactive oxygen species

Posted by in category: futurism

Despite its biocidal properties, the use of hydrogen peroxide is still limited in the context of water disinfection. Here an approach is disclosed based on the generation of H2O2 in situ by means of an AuPd catalyst, which can compete with chlorination methods by generating a highly reactive radical flux.

Jul 4, 2021

This VTOL Aircraft Flies Without Any Blades!

Posted by in categories: futurism, transportation

The J-2000 VTOL flying vehicle doesn’t use any blades, instead it uses a quiet “fluidic propulsion system,” the future of flying vehicles.