A Tower of Molten Salt Will Deliver Solar Power After Sunset

Solar power projects intended to turn solar heat into steam to generate electricity have struggled to compete amid tumbling prices for solar energy from solid-state photovoltaic (PV) panels. But the first commercial-scale implementation of an innovative solar thermal design could turn the tide. Engineered from the ground up to store some of its solar energy, the 110-megawatt plant is nearing completion in the Crescent Dunes near Tonopah, Nev. It aims to simultaneously produce the cheapest solar thermal power and to dispatch that power for up to 10 hours after the setting sun has idled photovoltaics.

Source: A Tower of Molten Salt Will Deliver Solar Power After Sunset – IEEE Spectrum

Point-and-shoot weapon stops drones without destroying them

The tool is a point-and-shoot system, and has a range of some 400 meters. It gains control of the drone, immobilizing it so no remote action can occur. It does so by either disrupting remote control or GPS navigation.

The drone then either lands in the vicinity or flies back to its starting point, and effectively suffers no damage.

Source: Point-and-shoot weapon stops drones without destroying them

South Korea-backed app puts children at risk

In April, Seoul required new smartphones sold to those 18 and under to be equipped with such software, a first-of-its-kind move, according to Korea University law professor Park Kyung-sin. The Korean Communications Commission has promoted Smart Sheriff and schools have sent out letters to parents encouraging them to download the app, which is free.

Source: APNewsBreak: South Korea-backed app puts children at risk – Houston Chronicle

Children’s phone numbers, birth dates, web browsing history and other personal data were being sent across the Internet unencrypted, making them easy to intercept. Authentication weaknesses meant Smart Sheriff could easily be hijacked, turned off or tricked into sending bogus alerts to parents. Even worse, they found that many weaknesses could be exploited at scale, meaning that thousands or even all of the app’s 380,000 users could be compromised at once.

Nine of world’s biggest banks join to form blockchain partnership

Rutter said the initial focus would be to agree on an underlying architecture, but it had not yet been decided whether that would be underpinned by bitcoin’s blockchain or another one, such as one being built by Ethereum, which offers more features than the original bitcoin technology.

Once that had been agreed on, Rutter said, the first use of the technology might be the issuance of commercial paper on the blockchain.

Source: Nine of world’s biggest banks join to form blockchain partnership | Reuters

Almost None of the Women in the Ashley Madison Database Ever Used the Site

When you look at the evidence, it’s hard to deny that the overwhelming majority of men using Ashley Madison weren’t having affairs. They were paying for a fantasy.

Source: Almost None of the Women in the Ashley Madison Database Ever Used the Site

The question is, how do you find fakes in a sea of data? Answering that becomes more difficult when you consider that even real users of Ashley Madison were probably giving fake information at least some of the time. But wholesale fakery still leaves its traces in the profile data. I spoke with a data scientist who studies populations, who told me to compare the male and female profiles in aggregate, and look for anomalous patterns.

Windows 10? Here are privacy issues you should consider

Sign into Windows with your Microsoft account and the operating system immediately syncs settings and data to the company’s servers. That includes your browser history, favorites and the websites you currently have open as well as saved app, website and mobile hotspot passwords and Wi-Fi network names and passwords.

Source: Windows 10? Here are privacy issues you should consider

The updated terms also state that Microsoft will collect information “from you and your devices, including for example ‘app use data for apps that run on Windows’ and ‘data about the networks you connect to.’”

Online Cheating Site AshleyMadison Hacked

In a long manifesto posted alongside the stolen ALM data, The Impact Team said it decided to publish the information in response to alleged lies ALM told its customers about a service that allows members to completely erase their profile information for a $19 fee.

According to the hackers, although the “full delete” feature that Ashley Madison advertises promises “removal of site usage history and personally identifiable information from the site,” users’ purchase details — including real name and address — aren’t actually scrubbed.

Source: Online Cheating Site AshleyMadison Hacked — Krebs on Security

Mandating insecurity by requiring government access to all data and communications

We have found that the damage that could be caused by law enforcement exceptional access requirements would be even greater today than it would have been 20 years ago. In the wake of the growing economic and social cost of the fundamental insecurity of today’s Internet environment, any proposals that alter the security dynamics online should be approached with caution. Exceptional access would force Internet system developers to reverse forward secrecy design practices that seek to minimize the impact on user privacy when systems are breached. The complexity of today’s Internet environment, with millions of apps and globally connected services, means that new law enforcement requirements are likely to introduce unanticipated, hard to detect security flaws.

Source: DSpace@MIT: Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications

Encryption “would not have helped” at OPM, says DHS official

But when pressed on why systems had not been protected with encryption prior to the recent discovery of an intrusion that gave attackers access to sensitive data on millions of government employees and government contractors, she said, “It is not feasible to implement on networks that are too old.” She added that the agency is now working to encrypt data within its networks.

Source: Encryption “would not have helped” at OPM, says DHS official | Ars Technica

A consultant who did some work with a company contracted by OPM to manage personnel records for a number of agencies told Ars that he found the Unix systems administrator for the project “was in Argentina and his co-worker was physically located in the [People’s Republic of China]. Both had direct access to every row of data in every database: they were root.