Open source physics engines

Graphics give games a visual appeal, but it’s the internal physics engine that gives the game’s world life. A physics engine is a software component that provides a simulation of a physical system. This simulation can include soft- and rigid-body dynamics, fluid dynamics, and collision detection. The open source community has a number of useful physics engines operating in the 2D and 3D domains targeted to games and simulations. This article introduces the use and basics of a physics engine and explores two options that exist: Box2D and Bullet.

via Open source physics engines.

figure1

Pwn2Own 2014 Claims IE, Chrome, Safari and More Firefox Zero-Days

In terms of why Firefox was the most exploited browser at the 2014 Pw2Own event, money likely plays a key role.
“Pwn2Own offers very large financial incentives to researchers to expose vulnerabilities, and that may have contributed in part to the researchers’ decision to wait until now to share their work and help protect Firefox users,” Stamm said. “Mozilla also offers financial rewards in our bug bounty program, and this program’s success has inspired other companies to follow suit.” –

via Pwn2Own 2014 Claims IE, Chrome, Safari and More Firefox Zero-Days.

Nanoscale optical switch breaks miniaturization barrier

The ultrafast switch is made out of an artificial material engineered to have properties that are not found in nature. In this case, the “metamaterial” consists of nanoscale particles of vanadium dioxide (VO2) – a crystalline solid that can rapidly switch back and forth between an opaque, metallic phase and a transparent, semiconducting phase – which are deposited on a glass substrate and coated with a “nanomesh” of tiny gold nanoparticles.

The scientists report that bathing these gilded nanoparticles with brief pulses from an ultrafast laser generates hot electrons in the gold nanomesh that jump into the vanadium dioxide and cause it to undergo its phase change in a few trillionths of a second.

via Nanoscale optical switch breaks miniaturization barrier | Research News @ Vanderbilt | Vanderbilt University.

A Close Look at the NSA’s Most Powerful Internet Attack Tool

Rather than go through the bureaucratic fight to move the attack logic into “system low” (and co-located on the wiretap), the NSA sought to work around it in the case of QUANTUMHAND. Instead of targeting just any web connection for exploitation, it targeted persistent “push” connections from Facebook, where a user’s browser would leave an idle connection open, waiting for a command from the server.

This way, even the slow, broken, classified architecture could exploit Facebook users. Sadly for NSA and GCHQ (and FSB, and DGSE, and every other spy agency), Facebook turned on encryption a few months ago, which should thwart this attack.

via A Close Look at the NSA’s Most Powerful Internet Attack Tool | Wired Opinion | Wired.com.

The biggest limitation on QUANTUM is location: The attacker must be able to see a request which identifies the target. Since the same techniques can work on a Wi-Fi network, a $50 Raspberry Pi, located in a Foggy Bottom Starbucks, can provide any country, big and small, with a little window of QUANTUM exploitation. A foreign government can perform the QUANTUM attack NSA-style wherever your traffic passes through their country.

Orbital computing: An amazing atomic-level tech for future computers

The new technology — or shall we say, science — is being developed by Joshua Turner at Stanford’s SLAC National Accelerator Laboratory. He calls the idea “orbital computing” since the bit that stores the it would be the orbits of electrons around the nucleus of an atom. The goal is to be able to probe the electron clouds of single atoms using terahertz waves of just the right size. The catch is that to generate a tight enough pulse of sufficient intensity to do this, you need an accelerator two miles long. But if you manage that, you can switch electron states 10,000 times faster than transistor states can be switched.

via Orbital computing: An amazing atomic-level tech for future computers | ExtremeTech.

Not even Joshua Turner is expecting orbital computing to be a workable technology any time soon. Most of his experiments are aimed at understanding what might be going on. He is merely looking into the crystal ball with a telescope and seeing what is even imaginable.

Alternative to Traditional Cellular Networks Makes a Virtue of Wireless Interference

Perlman says pCell takes a different approach: it embraces signal interference. In his vision, base stations smaller than your typical satellite TV antenna are placed wherever it’s convenient (such as on the roof or the side of a building), and their signals purposely overlap. Those overlapping signals, Perlman says, combine constructively to create a sort of personal cell, a centimeter in diameter, that moves with you as you move around the network. The signal doesn’t diminish as each additional user joins the network. Overall capacity can grow by adding more access points.

via Alternative to Traditional Cellular Networks Makes a Virtue of Wireless Interference | MIT Technology Review.

ClipIt

ClipIt is a lightweight, fully featured GTK+ clipboard manager. It was forked from Parcellite (http://parcellite.sourceforge.net), adding additional features and bugfixes to the project. Please also see http://clipit.rspwn.com/

via ClipIt | Free Development software downloads at SourceForge.net.

Clipboard managers can be useful when doing a lot of copy/pastes.  I noticed Clipit as part of the standard Fedora 19 install in one of my virtual machines.  They had no rpm package for Fedora 14 so I compiled the source and it works great.  It’s a nice no nonsense useful tool.

‘What does ISP mean?’ – how government officials are flunking security challenges

Singer added that another US official about to negotiate cybersecurity with China asked him to explain what “ISP” meant. “That’s like going to negotiate with the Soviets and not knowing what ‘ICBM’ means. And I’ve had similar experiences with officials from the UK, China and Abu Dhabi.

At the G20 conference diplomats were spearfished by an email with a link to nude photos of former French first lady Carla Bruni-Sarkozy, and many clicked – downloading spyware onto their computers.

via ‘What does ISP mean?’ – how government officials are flunking security challenges | Technology | theguardian.com.

Warrantless Cellphone Tracking

The secretive technology is generically known as a stingray or IMSI catcher, but the Harris device is also specifically called the Stingray. When mobile phones — and other wireless communication devices like air cards — connect to the stingray, it can see and record their unique ID numbers and traffic data, as well as information that points to the device’s location. By moving the stingray around, authorities can triangulate the device’s location with much more precision than they can get through data obtained from a mobile network provider’s fixed tower location.
The government has long asserted that it doesn’t need to obtain a probable-cause warrant to use the devices because they don’t collect the content of phone calls and text messages but rather operate like pen-registers and trap-and-traces, collecting the equivalent of header information.

via Florida Cops’ Secret Weapon: Warrantless Cellphone Tracking | Threat Level | Wired.com.