Source: Schneier on Security
Interesting analysis of the possibility, feasibility, and efficacy of deliberately fake scientific research, something I had previously speculated about.
Source: Schneier on Security
Interesting analysis of the possibility, feasibility, and efficacy of deliberately fake scientific research, something I had previously speculated about.
Source: Ars Technica

Enlarge (credit: Leni Tuchsen)
Google's Chrome team is feeling pressure from competitors over ad tracking. Apple has long offered industry-leading protection against tracking cookies, while Mozilla recently announced that Firefox will begin blocking tracking cookies by default. Microsoft has been experimenting with tracking protection features in Edge, too.
But Google has a problem: it makes most of its money selling ads. Adopting the same aggressive cookie blocking techniques as its rivals could prevent Google's customers from targeting ads—potentially hurting Google's bottom line.
So in a blog post last week, Google outlined an alternative privacy vision—one that restricts some forms of user tracking without blocking the use of tracking cookies any time soon.
Source: The Verge - All Posts
Dozens of retailers sell de facto silencers, making it easy for gun owners to avoid federal screening and registration
Source: The Verge - All Posts
How do you get rid of hate speech on social platforms? Until now, companies have generally tried two approaches. One is to ban individual users who are caught posting abuse; the other is to ban the large pages and groups where people who practice hate speech organize and promote their noxious views.
But what if this approach is counterproductive? That’s the argument in an intriguing new paper out today in Nature from Neil Johnson, a professor of physics at George Washington University, and researchers at GW and the University of Miami. The paper, “Hidden resilience and adaptive dynamics of the global online hate ecology,” explores how hate groups organize on Facebook and Russian social network VKontakte — and how they resurrect...
Source: Hacker News
Source: Hacker News
Source: Hacker News
Source: Hack a Day
Heat shrink tubing is great for insulating wires. Labeling wires in a bundle is always useful, too. [Voltlog] has a cheap Brother label printer and discovered he can buy knock off label cassettes for a lot less from China. However, he also found something else: cassettes with heat shrink tubing in them made for the same kind of printer. Could he use the heat shrink cassettes to make neat wire labels? In his first video the answer was sort of, but not really. However, he later had a breakthrough and made a second video explaining how to do it. You can see both videos, below.
At first, the printer didn’t even want to recognize the cassette. It seems like Brother doesn’t want you using exotic tapes with cheap printers. No worry, this isn’t sophisticated DRM, just a sense hole that you need to cover with tape. This discovery was made using the extremely scientific trick of covering all the holes that were not on a regular cassette.
With the holes covered up, the printer worked, but the print came out mirrored. To understand why, you have to understand how the normal labels work. In the cassette, the label material has no paper backing which is separate in a different part of the cartridge. The printer marks the backside of the see-through label and then bonds the paper backing to it as it exits the printer. This makes sense because it puts the markings under the tape where they are relatively safe from moisture or physical abrasion.
However, with heat shrink, it isn’t transparent and there’s no backing material. So the reverse print doesn’t really help you. It turns out the cheap printer can do non-mirrored printing, but to make that work, one of the holes in the special cassette needed to stay open. Once the proper holes were covered and uncovered, everything worked great.
Heat shrink is probably more high tech than you’d think. Did you know you can get it with adhesive inside it, too?
Source: The Register
Patch Tuesday Software buried in Windows since the days of WinXP can be abused to take complete control of a PC with the help of good ol' Notepad and some crafty code.…
Source: Hacker News