looorg writes:https://www.zdnet.com/article/this-thermal-attack-can-read-your-password-from-the-heat-your-fingertips-leave-behind/Thermal keyboard attackWhile an interesting idea I wonder, like with a lot of these "attacks" how useful in practice they really are.The heat doesn't last very long, so you have to be there basically as you type or within seconds. After just 20 seconds the heat is dropping fast and after a minute you are basically guessing.Still 4 digit ATM pins could be in deep trouble. But then after you entered the 4 digit pin you usually push a few more numbers to get your money and make various choices at the machine. So it might be a difference between real live usage and laboratory usage.The heat or colour will then tell the order in what was used last to the keys that are fading was the once used earliest.But still unless it can tell a few keys appear that might be very similar in heat you end up with options. But then getting or guessing a password from a limited pool of characters is better or faster then guessing one from a larger pool.So the new security feature or recommendation will be to before you leave the ATM press ALL the keys or after you get your money just stand there for a minute or so and put the money into your wallet so you let the machine or the keypad cool down.How will the camera note if you use the same keys over again (AxxxxAxxxxxA)? Will it know if you hit the A key then multiple times?Original SubmissionRead more of this story at SoylentNews.
canopic jug writes:Chemistry World has an article about how the best-selling organic chemistry textbook has become open access. The 10 edition of John McMurry's textbook, Organic Chemistry, will be available free-of-charge. It appears likely that it will be under one of the Creative Commons Attribution licenses.
Judge delays Musk/Twitter trial, gives them three weeks to complete merger [Updated]Freeman and upstart write:https://arstechnica.com/tech-policy/2022/10/musk-asks-judge-to-cancel-trial-claims-twitter-wont-take-yes-for-an-answer/
Dutch Court Rules that Being Forced to Keep a Webcam on While Working is Illegalupstart writes:A US company was fined $50,000 and ordered to pay the employee's wages and vacation days:
hubie writes:Researchers at Baylor and Campbell universities found that smartphone users seeking meaning and purpose through their devices and social media could experience the opposite:
canopic jug writes:Volume 189 of The PCLinuxOS Magazine has an article on Bill Gates' evil prophecy from 40 years ago where he aims for ending general-purpose computing. He achieves that goal a step at a time over the decades, with the help of many a mole and quisling. Lately, the Pluton chip and Restricted Boot play both play key roles towards ending this era of general-purpose computing. The Pluton chip is an extension of the Trusted Platform Module (TPM) used by Vista10 and required by Vista11. Canonical, the maker of Ubuntu, and even its upstream source, Debian, folded years ago in regards to secure boot by using Microsoft's signing key, possibly cementing that as the norm. The article covers that and many other incidents leading up to the current situation.There is an ever-decreasing amount of time left to keep general-purpose computing alive and the author signs off with how to approach the political maneuvers going on:
hubie writes:Drinking two to three cups of coffee a day is linked with a longer lifespan and lower risk of cardiovascular disease compared with avoiding coffee:
upstart writes:Taken as a share of the market price, the climate change impacts of mining the digital cryptocurrency Bitcoin is more comparable to the impacts of extracting and refining crude oil than mining gold:
canopic jug writes:The New Yorker has a non-technical article, The Thorny Problem of Keeping the Internet's Time, about the Network Time Protocol (NTP) from both the software and protocol perspectives. It gives a surprisingly good summary of the background of both as well as the current situation and the issues holding back the next steps. If you have networked computers, especially servers, in any capacity then you are certainly familiar with the NTP or at least its supporting utilities. NTP was developed by David Mills, who by the late 1970s, after a *little*-bit-of-improvementer his PhD, eventually ended up at COMSAT where he started working on it for ARPANET. He still works on it despite failed eyesight.
upstart writes:The American chess grandmaster at the centre of the sport's biggest scandal has been accused of cheating more than 100 times on a major online platform:
upstart writes:Most developers aren't particularly good at building authorization into their applications, but would they trust a third-party provider like Oso?: