pipeline

We salute Trump for crush COVID given to him by Democrats

Sacha Baron Cohen has responded to Donald Trump’s remarks about Borat 2

Donald—I appreciate the free publicity for Borat! I admit, I don’t find you funny either. But yet the whole world laughs at you.

I’m always looking for people to play racist buffoons, and you’ll need a job after Jan. 20. Let’s talk!

{ Sacha Baron Cohen | Quote: Borat }

‘The sea has neither meaning nor pity.’ –Chekhov

34.jpg

…an agreement to feature Google’s search engine as the preselected choice on Apple’s iPhone and other devices. […] Apple had arranged the deal to require periodic renegotiations, according to a former senior executive, and each time, it extracted more money from Google. […]

Steve Jobs, Apple’s co-founder, once promised “thermonuclear war” on his Silicon Valley neighbor when he learned it was working on a rival to the iPhone. […] “I’m going to destroy Android,” Mr. Jobs told his biographer. […] A year later, Apple introduced Siri. Instead of Google underpinning the virtual assistant, it was Microsoft’s Bing. […] Around 2017, the deal was up for renewal. Google was facing a squeeze, with clicks on its mobile ads not growing fast enough. Apple was not satisfied with Bing’s performance for Siri. And Mr. Cook had just announced that Apple aimed to double its services revenue to $50 billion by 2020, an ambitious goal that would be possible only with Google’s payments. […] By the fall of 2017, Apple announced that Google was now helping Siri answer questions, and Google disclosed that its payments for search traffic had jumped. […]

Nearly half of Google’s search traffic now comes from Apple devices, according to the Justice Department, and the prospect of losing the Apple deal has been described as a “code red” scenario inside the company. When iPhone users search on Google, they see the search ads that drive Google’s business. They can also find their way to other Google products, like YouTube.

A former Google executive, who asked not to be identified because he was not permitted to talk about the deal, said the prospect of losing Apple’s traffic was “terrifying” to the company. […]

Apple now receives an estimated $8 billion to $12 billion in annual payments — up from $1 billion a year in 2014 — in exchange for building Google’s search engine into its products. It is probably the single biggest payment that Google makes to anyone and accounts for 14 to 21 percent of Apple’s annual profits. That’s not money Apple would be eager to walk away from.

{ NY Times | Continue reading }

‘Le sage arrose doucement, l’insensé tout de suite inonde.’ –Florian

The group, known to researchers as “Dragonfly” or “Energetic Bear” for its hackings of the energy sector, was not involved in 2016 election hacking. But it has in the past five years breached the power grid, water treatment facilities and even nuclear power plants, including one in Kansas.

It also hacked into Wi-Fi systems at San Francisco International Airport and at least two other West Coast airports in March in an apparent bid to find one unidentified traveler, a demonstration of the hackers’ power and resolve.

September’s intrusions marked the first time that researchers caught the group, a unit of Russia’s Federal Security Service, or F.S.B., targeting states and counties. The timing of the attacks so close to the election and the potential for disruption set off concern inside private security firms, law enforcement and intelligence agencies. […]

“This appears to be preparatory, to ensure access when they decide they need it,” […] Energetic Bear typically casts a wide net, then zeros in on a few high-value targets. […] They could take steps like pulling offline the databases that verify voters’ signatures on mail-in ballots, or given their particular expertise, shutting power to key precincts. […]

Officials at San Francisco International Airport discovered Russia’s state hackers had breached the online system that airport employees and travelers used to gain access to the airport’s Wi-Fi. The hackers injected code into two Wi-Fi portals that stole visitors’ user names, cracked their passwords and infected their laptops. The attack began on March 17 and continued for nearly two weeks until it was shut down. […] As pervasive as the attacks could have been, researchers believe Russia’s hackers were interested only in one specific person traveling through the airports that day.

{ NY Times | Continue reading }

‘One silver lining to this shit show is that Bill Barr destroyed his reputation.’ –Scott Shapiro

updated with The Lincoln Project’s legal response

eldfrdhucaeqygk.jpeg

eldfqoduwaaojej.png

1.jpeg

2.jpeg

3.jpeg

And she lit up and fireland was ablaze

99.jpg

A range of methods have been applied for user authentication on smartphones and smart watches, such as password, PIN and fingerprint. […] In this paper, a new biometric trait, finger snapping, is applied for person authentication.

Finger snapping is an act of making an impulsive sound with one’s fingers and palm. It is often done by connecting the thumb with another (middle, index or ring) finger, and then moving the other finger immediately downward to hit the palm. Such act of finger snapping involves physiological characteristics which refer to inherited traits that are related to human body, as the sound of finger snapping is differentiated by the size of palm and skin texture. In addition, it also involves behavioral characteristics which refer to learned pattern of a person, as it is the movement of the finger creates the sound.

A survey is carried out on 74 people about whether they can snap their fingers and accept the finger snapping authentication. Results show that 86.5 % of the respondents can snap fingers, of which 89.2 % would like to authenticate themselves using a simple finger snap. Besides, through our finger snapping collecting phase, we come to find out that people who could not snap their fingers can learn to do it after understanding the method of finger snapping.

{ Biometric Recognition | Continue reading }

previously { Silicon Valley Legends Launch Beyond Identity in Quest to Eliminate Passwords }

photo { Guen Fiore }

Only 4 more spray tans before we vote him out

This paper presents a model in which politicians can increase the probability of election by making exaggerated claims about the benefits of their own platform — referred to as positive campaigning — and by exaggerating the undesirable characteristics of their rival — i.e., negative campaigning. Such lies may be detected at some point in the future and thus result in a costly loss in reputation. Thus the politician must tradeoff immediate benefits against potential future costs.

{ Public Choice (1996) | Continue reading }

‘Smoking doesn’t kill.’ –Mike Pence

sm.jpg

Had I no eyes but ears, my ears would love

41.jpg

The Federal Bureau of Investigation is issuing this announcement to encourage Americans to exercise caution when using hotel wireless networks (Wi-Fi) for telework. FBI has observed a trend where individuals who were previously teleworking from home are beginning to telework from hotels. US hotels, predominantly in major cities, have begun to advertise daytime room reservations for guests seeking a quiet, distraction-free work environment. While this option may be appealing, accessing sensitive information from hotel Wi-Fi poses an increased security risk over home Wi-Fi networks. Malicious actors can exploit inconsistent or lax hotel Wi-Fi security and guests’ security complacency to compromise the work and personal data of hotel guests. Following good cyber security practices can minimize some of the risks associated with using hotel Wi-Fi for telework.

Attackers target hotels to obtain records of guest names, personal information, and credit card numbers. The hotel environment involves many unaffiliated guests, operating in a confined area, and all using the same wireless network. Guests are largely unable to control, verify, or monitor network security. Cyber criminals can take advantage of this environment to monitor a victim’s internet browsing or redirect victims to false login pages. Criminals can also conduct an “evil twin attack” by creating their own malicious network with a similar name to the hotel’s network. Guests may then mistakenly connect to the criminal’s network instead of the hotel’s, giving the criminal direct access to the guest’s computer. […]

Once the malicious actor gains access to the business network, they can steal proprietary data and upload malware, including ransomware. Cybercriminals or nation-state actors can use stolen intellectual property to facilitate their own schemes or produce counterfeit versions of proprietary products. Cybercriminals can use information gathered from access to company data to trick business executives into transferring company funds to the criminal.

{ iC3 | Continue reading }

ink on black paper { Aura Satz, Tone Transmission, 2020 }

Let’s honor National Substance Use Prevention Day

California is gonna have to ration water. You wanna know why? Because they send millions of gallons of water out to sea, out to the Pacific. Because they want to take care of certain little tiny fish, that aren’t doing very well without water.

{ Donald J. Trump | Continue reading }

S.O.S.

w.jpg

{ Newsweek | White House Gift Shop }

What mental illness does to the brain?

63.jpg

Recently, some scientists from NASA have claimed that there may be a black hole like structure at the centre of the earth. We show that the existence of life on the earth may be a reason that this black hole like object is a black brane that has been formed from biological materials like DNA. Size of this DNA black brane is 109 times longer than the size of the earth’s core and compacted interior it. By compacting this long object, a curved space-time emerges, and some properties of black holes emerge. This structure is the main cause of the emergence of the large temperature of the core, magnetic field around the earth and gravitational field for moving around the sun. Also, this structure produces some waves which act like topoisomerase in biology and read the information on DNAs. […]

These dark DNAs not only exchange information with DNAs but also are connected with some of the molecules of water and helps them to store information and have memory. Thus, the earth is the biggest system of telecommunication which connects DNAs, dark DNAs and molecules of water.

{ Macedonian Journal of Medical Sciences | Continue reading }

photo ( Nadia Von Scotti }

As when you drove with her to Findrinny Fair

55.jpg

Earlier this week, Elon Musk said there’s a “good chance” settlers in the first Mars missions will die. […] the trip itself will take a year based on current estimates, and applicants to settlement programs are told to expect this trip to be one way.

{ Popular Mechanics | Continue reading }

This truly makes me think of the good humanity can do… that and the fact that cellphones are now becoming more and more waterproof… pretty soon we’ll be able to push people into pools again.

41.jpg

The Justice Department plans to bring an antitrust case against Google as soon as this month […] A coalition of 50 states and territories support antitrust action against Google […]

Alphabet was an obvious antitrust target. Through YouTube, Google search, Google Maps and a suite of online advertising products, consumers interact with the company nearly every time they search for information, watch a video, hail a ride, order delivery in an app or see an ad online. Alphabet then improves its products based on the information it gleans from every user interaction, making its technology even more dominant.

Google controls about 90 percent of web searches globally, and rivals have complained that the company extended its dominance by making its search and browsing tools defaults on phones with its Android operating system. Google also captures about one-third of every dollar spent on online advertising, and its ad tools are used to supply and auction ads that appear across the internet. […]

Makan Delrahim, the head of the Justice Department’s antitrust division, had pushed the department to investigate Google but was recused from the case because he represented the company in a 2007 acquisition that helped it to dominate the online advertising market.

In an unusual move, Mr. Barr placed the investigation under Jeffrey A. Rosen, the deputy attorney general, whose office would not typically oversee an antitrust case. Mr. Barr and Mr. Delrahim also disagreed on how to approach the investigation, and Mr. Barr had told aides that the antitrust division had been asleep at the switch for decades, particularly in scrutinizing the technology industry.

Mr. Rosen does have a tech background: He was the lead counsel for Netscape Communications when it filed an antitrust complaint against Microsoft in 2002.

In October, Mr. Rosen hired Ryan Shores, a veteran antitrust lawyer, to lead the review and vowed to “vigorously seek to remedy any violations of law, if any are found.”

Mr. Barr also had a counselor from his own office, Lauren Willard, join the team as his liaison. She met with staff members and requested information about the investigation. She also issued directives and made proposals about next steps.

{ NY Times | Continue reading }

platinum print { Robert Mapplethorpe, Coral Sea, 1983 }

‘And the state of (gestures at everything) *this* is not helping lol.’ –britney gil

45.jpg

Some luxury brands have started adding surveillance to their arsenal, turning to blockchains to undermine the emergence of secondary markets in a way that pays lip service to sustainability and labor ethics concerns. LVMH launched Aura in 2019, a blockchain-enabled platform for authenticating products from the Louis Vuitton, Christian Dior, Marc Jacobs, and Fenty brands, among others. Meanwhile, fashion label Stella McCartney began a transparency and data-monitoring partnership with Google for tracking garment provenance, discouraging fakes and promising to ensure the ethical integrity of supply chains. Elsewhere, a host of fashion blockchain startups, including Loomia, Vechain, and Faizod, have emerged, offering tracking technologies to assuage customer concerns over poor labor conditions and manufacturing-related pollution by providing transparency on precisely where products are made and by which subcontractors. […]

Companies such as Arianee, Dentsu and Evrythng also aim to track clothes on consumers’ bodies and in their closets. At the forefront of this trend is Eon, which with backing from Microsoft and buy-in from mainstream fashion brands such as H&M and Target, has begun rolling out the embedding of small, unobtrusive RFID tags — currently used for everything from tracking inventory to runners on a marathon course — in garments designed to transmit data without human intervention. […]

According to the future depicted by Eon and its partners, garments would become datafied brand assets administering access to surveillance-enabled services, benefits, and experiences. The people who put on these clothes would become “users” rather than wearers. In some respects, this would simply extend some of the functionality of niche wearables to garments in general. Think: swimsuits able to detect UV light and prevent overexposure to the sun, yoga pants that prompt the wearer to hold the right pose, socks that monitor for disease risks, and fitness trackers embedded into sports shirts. […]

According to one potential scenario outlined by Eon partners, a running shoe could send a stream of usage data to the manufacturer so that it could notify the consumer when the shoe “nears the end of its life.” In another, sensors would determine when a garment needs repairing and trigger an online auction among competing menders. Finally, according to another, sensors syncing with smart mirrors would offer style advice and personalized advertising.

{ Real Life | Continue reading }

related { Much of the fashion industry has buckled under the weight of the coronavirus — it appears to have sped up the inevitable }

Business as usual. In. Out. Hello. Goodbye.

4.png

Profits from organized crime are typically passed through legitimate businesses, often exchanging hands several times and crossing borders, until there is no clear trail back to its source—a process known as money laundering.

But with many businesses closed, or seeing smaller revenue streams than usual, hiding money in plain sight by mimicking everyday financial activity became harder. “The money is still coming in but there’s nowhere to put it,” says Isabella Chase, who works on financial crime at RUSI, a UK-based defense and security think tank.

The pandemic has forced criminal gangs to come up with new ways to move money around. In turn, this has upped the stakes for anti-money laundering (AML) teams tasked with detecting suspicious financial transactions and following them back to their source. […]

According to the United Nations Office on Drugs and Crime, between 2% and 5% of global GDP—between $800 billion and $2 trillion at current figures—is laundered every year. Most goes undetected. Estimates suggest that only around 1% of profits earned by criminals is seized. […] The problem for criminals is that many of the best businesses for laundering money were also those hit hardest by the pandemic. Small shops, restaurants, bars, and clubs are favored because they are cash-heavy, which makes it easier to mix up ill-gotten gains with legal income. […]

Older systems rely on hand-crafted rules, such as that transactions over a certain amount should raise an alert. But these rules lead to many false flags and real criminal transactions get lost in the noise. More recently, machine-learning based approaches try to identify patterns of normal activity and raise flags only when outliers are detected. These are then assessed by humans, who reject or approve the alert.

This feedback can be used to tweak the AI model so that it adjusts itself over time. Some firms, including Featurespace, a firm based in the US and UK that uses machine learning to detect suspicious financial activity, and Napier, another firm that builds machine learning tools for AML, are developing hybrid approaches in which correct alerts generated by an AI can be turned into new rules that shape the overall model.  

{ Technology Review | Continue reading }

Stock market at new highs in hopes of squeezing shorts until their balls are blue

5.jpg

One day Lisa realizes that she is both Lisa and Muriel and that they are the same person

22.jpg

11.jpg

{ Aron Klein, Bulgarian demon chasers | more }

How P.E. and Guerilla Funk is keepin it movin

3.jpg

For the second time ever, astronomers have detected a pattern in a mysterious fast radio burst coming from space. […] earlier this year when astronomers found that FRB 180916.J0158+65 had a pattern in bursts occurring every 16.35 days. Over the course of four days, the signal would release a burst or two each hour. Then, it would go silent for another 12 days.

Now, they have detected a pattern in a second repeating fast radio burst, known as FRB 121102. During this cyclical pattern, radio bursts are emitted during a 90-day window, followed by a silent period of 67 days. This pattern repeats every 157 days.

{ CNN | Continue reading }

Now don’t tell me you’ve never heard of the marvelous Madame Mim?

4.jpg

the dick pics you’ve been waiting for

43.jpg

{ Huntington Beach, California, May 13, 2020 | more gloomy photos }

45.jpg

{Huntington Beach, California }

51.jpg

{ amazon.com | Related: Mrs. Trump had chosen some furniture for the White House residence […] in her absence, President Trump — whose tastes veer toward the gilded, triumphal style of Louis XIV — replaced her choices with several pieces he liked better. One of two people familiar with the episode cited it as an example of Mr. Trump’s tendency not to relent on even the smallest requests from his wife. | NY Times }