Indian researchers recycle fish scales into energy nanogenerator

Indians consume a lot of fish: Data from 2014 estimated that each urban citizen consumed an average of 2.8 kg per year, or about 3.7 million kg for the whole country. That leaves a lot of leftover bones, scales and tails. As they reported this week in Applied Physics Letters, a team of researchers at Jadavpur University looked for ways to re-use this "biowaste" and pioneered a method to generate electricity from it.

First, some biophysics. Fish scales have collagen fibers containing piezoelectric properties: Stress them and you generate a charge. Considering this, the researchers collected a large volume of them and used a demineralization process to make them transparent and flexible. Then they toyed with the hierarchical alignment of these treated scales, boosting their energy yield and effectively creating a bio-piezoelectric nanogenerator.

It can scavenge several types of ambient mechanical energies like body movements, machine and sound vibrations and wind flow. Even touching the nanogenerator produced enough electricity to light 50 LEDs. The result is a big step for self-powered flexible electronics, which could one day be developed into things like pacemakers energized by heartbeats that safely biodegrade in time. While it could also find applications in transparent and portable electronics, the biocompatibility likely makes this tech more valuable to medical uses like e-healthcare monitoring, in vitro diagnostics and edible devices.

Source: Phys.org

from Engadget http://ift.tt/2caQ1FK
via IFTTT

A $50 device and an app can easily steal your PC’s log-in

You’d think protecting your computer with a strong password can keep it safe, but apparently, all it takes to steal your log-in credentials is a $50 piece of hardware and an app. According to R5 Industries principal security engineer Rob Fuller, he was able to pilfer usernames and passwords from locked computers using a USB device loaded with a hacking app called Responder. The stolen passwords are encoded, sure, but once they’re in another person’s possession, they can be cracked. One of the small, Linux-powered computers he used (USB Armory) costs $155, but the other (Hak5 Turtle) costs only $50. Computers share log-in credentials with them, because they recognize the devices as trusted Ethernet adapters.

Fuller said the combination worked on all versions of Windows and even on El Capitan, though he still needs to check whether his Mac experiment was a fluke. He also said that the hack was so easy to pull off, he "tested it so many ways to confirm" since he had such a hard time believing it was possible.

He captured the process on cam, which you can watch below, and explained how it works in an email to Ars Technica:

"What is happening in the video, is the USB Armory is being plugged into a locked (but logged in) system. It boots up via the USB power, and starts up a DHCP server, and Responder. While it’s doing this, the victim is recognizing it as a Ethernet adapter. The victim then makes route decisions and starts sending the traffic it was already creating to the Armory instead of the "real" network connection. Responder does its job and responds to all kinds of services asking for authentication, and since most OSs treat their local network as "trusted" it sees the authentication request and automatically authenticates. Seeing that the database of Responder has been modified the Armory shuts down (LED goes solid)."

Of course, this is a non-issue if you exclusively use your computer at home, and there’s nobody living there you don’t trust. But if you tend to bring laptops to coffee shops and other places, check out this prevention technique Fuller recommends, or just make sure you never leave your computer unattended.

Via: Ars Technica

Source: Rob Fuller

from Engadget http://ift.tt/2cFG8kx
via IFTTT