This site is “taking the edge off rant mode” by making readers pass a quiz before commenting

The team at NRKbeta attributes the civil tenor of its comments to a feature it introduced last month. On some stories, potential commenters are now required to answer three basic multiple-choice questions about the article before they’re allowed to post a comment.

Source: This site is “taking the edge off rant mode” by making readers pass a quiz before commenting

The goal is to ensure that the commenters have actually read the story before they discuss it.

J.C. Penney’s troubles are reflected in satellite images of its parking lots

Orbital Insight, a venture capital-funded satellite intelligence startup based in Palo Alto, tracks 250,000 parking lots for 96 retail chains across the U.S.

Source: J.C. Penney’s troubles are reflected in satellite images of its parking lots | The Outline

Orbital Insight’s parking lot figures track pretty closely with J.C. Penney’s stock price.

SpaceX to Send Privately Crewed Dragon Spacecraft Beyond the Moon Next Year

Once operational Crew Dragon missions are underway for NASA, SpaceX will launch the private mission on a journey to circumnavigate the moon and return to Earth. Lift-off will be from Kennedy Space Center’s historic Pad 39A near Cape Canaveral – the same launch pad used by the Apollo program for its lunar missions. This presents an opportunity for humans to return to deep space for the first time in 45 years and they will travel faster and further into the Solar System than any before them.

Source: SpaceX to Send Privately Crewed Dragon Spacecraft Beyond the Moon Next Year | SpaceX

SMTP over XXE − how to send emails using Java’s XML parser

The (presumably ancient) code has a bug, though: it does not verify the syntax of the user name. RFC 959 specifies that a username may consist of a sequence of any of the 128 ASCII characters except <CR> and <LF>. Guess what the JRE implementers forgot? Exactly − to check for the presence of <CR> or <LF>. This means that if we put %0D%0A anywhere in the user part of the URL (or the password part for that matter), we can terminate the USER (or PASS) command and inject a new command into the FTP session.

Source: SMTP over XXE − how to send emails using Java’s XML parser – shift or die

So, if we send a USER command to a mail server instead of a FTP server, it will answer with an error code (since USER is not a valid SMTP command), but let us continue with our session. Combined with the bug mentioned above, this allows us to send arbitrary SMTP commands, which allows us to send emails.

Techdirt lawyers ask judge to throw out suit over “Inventor of E-mail”

n the end, this isn’t a debate about facts, say Masnick’s lawyers. Both Ayyadurai and Masnick acknowledge that the MAILBOX program was created at MIT in the 1960s and that Ray Tomlinson created the “@” symbol protocol in 1971. The two draw different conclusions, however. Ayyadurai calls the ARPANET creations “command-line protocols for transferring text messages” or “primitive electronic communication systems.” In Masnick’s view, Ayyadurai doesn’t dispute the historical facts, but instead “attacks Techdirt’

Source: Techdirt lawyers ask judge to throw out suit over “Inventor of E-mail” | Ars Technica

How IoT hackers turned a university’s network against itself

While this incident represents one of the first of its kind, the bad news is this form of attack is only going to become more common as more and more everyday items get connected to the internet, providing hackers with greater numbers of potential zombie devices.”

The reason behind it is the issue of default credentials for wireless devices. This is going to bring billions of devices into the fold by 2020, which is only three years away. Whenever it is, there’s going to be so many of these things used by people with very limited understanding of what they are,” says Dine.

Source: How IoT hackers turned a university’s network against itself | ZDNet

The network that IoT devices must use should be isolated and secured by a firewall.  This isn’t that difficult to do.

Microsoft Azure now offers patent troll IP protection

Microsoft quotes a report from Boston consulting group which estimates a 22% rise in IP lawsuits relating to cloud products over the last five years in the U.S. alone. It also observes that non-practicing entities have increased their spending on cloud patents by 35% over the same period of time.

Source: Microsoft Azure now offers patent troll IP protection

How to Spot Ingenico Self-Checkout Skimmers

The overlay skimming devices pictured here include their own tiny magnetic read heads to snarf card data from the magnetic stripe when customers swipe their cards. Consequently, those tiny readers often interfere with the legitimate magnetic card reader on the underlying device, meaning compromised self-checkout lines may move a bit slower than others.

Source: How to Spot Ingenico Self-Checkout Skimmers — Krebs on Security

Math and the Best Life

If mathematics is a medium for human flourishing, it stands to reason that everyone should have a chance to participate in it. But in his talk Su identified what he views as structural barriers in the mathematical community that dictate who gets the opportunity to succeed in the field — from the requirements attached to graduate school admissions to implicit assumptions about who looks the part of a budding mathematician.

Source: Math and the Best Life — an Interview With Francis Su | Quanta Magazine