Big Pharma is using faux generics to keep drug prices high, critics say

https://arstechnica.com/?p=1548229

EpiPen two-pack.
Enlarge /

EpiPen two-pack.

Brand-name drug makers are using “authorized generics” to keep drug prices high and stifle competition, according to a report by Kaiser Health News.

Authorized generics are defined by the US Food and Drug Administration as brand-name drugs that are simply repackaged and marketed without the brand name. They’re made by the same company that makes the brand-name drug and usually sold at a discount relative to the brand-name version.

Traditional generic drugs, on the other hand, are versions of a drug that are equivalent to a brand-name drug in active ingredients and effects but may have slight variations, such as in inactive ingredients like fillers and flavors. Generics are made by different companies from those that make the brand-name versions.

High-profile examples of authorized generics include Mylan’s cheaper form of its EpiPen, a life-saving epinephrine autoinjector that curbs deadly allergic reactions. In 2016, under political and public pressure to lower drug prices, Mylan introduced the authorized generic of EpiPen priced at $300 for a two-pack. That’s half the price of a two-pack of the brand-name version, which has a list price of around $600. But it’s still a staggering hike from EpiPen’s original cost of around $50 per injector in 2007. That year, Mylan bought the rights to EpiPen and then raised the price more than 400% in the years that followed. The authorized generic is essentially

triple the price

of what two injectors used to cost.

Drug companies argue that because authorized generics are priced lower than brand-name drugs, the faux generics lower overall prices and spur competition. But critics note that the prices can still be inflated, as in the EpiPen case. Moreover, because brand-name drugs’ list prices are often subject to rebates and discounts by middlemen, the authorized generics’ lower prices sometimes have no impact on how much drug companies net for their drugs.

Tricks and games

Another example is Eli Lilly’s authorized generic form of Humalog insulin, as Kaiser Health News points out. In March, Eli Lilly announced it would sell the authorized generic for $137 a vial, about half the price of the brand-name version’s $275 price. The company’s CEO reportedly said that seemingly compassionate move was made to address the “many patients [who] are struggling to afford their insulin.”

But the slashed price won’t affect Lilly’s bottom line, according to a senior pharmacy benefits executive who spoke to KHN under the condition of anonymity. After rebates, $137 is about what Eli Lilly gets for Humalog now, the executive said.

“It’s a parlor trick,” the executive added. “They’re bending to political pressure, but are they taking any money out of the system? They’re not.”

And, as others have noted, the price is still wildly inflated. A vial of brand-name Humalog has a list price of $55 in Germany, for instance. In 2001—before Lilly began hiking the price—the list price for a vial of Humalog in the US was $35.

While authorized generics help maintain high prices and profits for drug makers, they also choke back competition from actual generics, critics say.

When Congress set up the modern generic drug market in 1984—with the “Drug Price Competition and Patent Term Restoration Act of 1984″ (aka the Hatch-Waxman Amendments)—lawmakers intended to give the first generic maker the lucrative incentive of a 180-day period of market exclusivity. That is, the FDA holds back on approving additional generic versions of a drug for that period.

But with authorized generics, brand-name drug makers can time the release of their faux generics to match the release of generic competition. That’s exactly what PDL BioPharma did with the release of an authorized generic version of its blood-pressure drug, Tekturna (generic name aliskiren).

In 2017, PDL got wind that Anchen Pharmaceuticals was planning to come out with a generic version of the blood pressure pill. PDL then cut a deal with Anchen that, in part, had Anchen agree to delay the release of its generic until at least March 1, 2019. On March 4, 2019, PDL

announced the release of its authorized generic

.

In the announcement, PDL’s president and CEO, Dominique Monnet, noted that “We believe being first-to-market with a generic version of aliskiren provides [PDL subsidiary] Noden with a distinct competitive advantage.”

Robin Feldman, a pharmaceutical policy expert at the University of California Hastings College of the Law, echoed the point to KHN, saying that such moves can “stave off generic competition and make sure that generics can’t get much of a foothold when they do get to market.”

“That’s the game,” she added. “And drug companies have become masters at this.”

As of July 2019, there are nearly 1,200 authorized generics on the market in the US.

via Ars Technica https://arstechnica.com

August 8, 2019 at 11:59AM

A Boeing Code Leak Exposes Security Flaws Deep in a 787’s Guts

https://www.wired.com/story/boeing-787-code-leak-security-flaws

Late one night last September, security researcher Ruben Santamarta sat in his home office in Madrid and partook in some creative googling, searching for technical documents related to his years-long obsession: the cybersecurity of airplanes. He was surprised to discover a fully unprotected server on Boeing’s network, seemingly full of code designed to run on the company’s giant 737 and 787 passenger jets, left publicly accessible and open to anyone who found it. So he downloaded everything he could see.

Now, nearly a year later, Santamarta claims that leaked code has led him to something unprecedented: security flaws in one of the 787 Dreamliner’s components, deep in the plane’s multi-tiered network. Santamarta suggests that for a hacker, exploiting those bugs could represent one step in a multi-stage attack starts in the plane’s in-flight entertainment system and extends to its highly protected, safety-critical systems like flight controls and sensors.

Boeing flatly denies that sort of attack is possible, and rejects Santamarta’s claim of having discovered a potential path to pull it off. Santamarta himself admits that he doesn’t have a full enough picture of the aircraft—or access to a $250 million jet—to confirm his claims. But he and other avionics cybersecurity researchers who have reviewed his findings argue that while a full-on cyberattack on a plane’s most sensitive systems remains far from a material threat, the flaws uncovered in the 787’s code nonetheless represent a troubling lack of attention to cybersecurity from Boeing. They also say that the company’s responses have not been altogether reassuring, given the critical importance of keeping commercial airplanes safe from hackers.

At the Black Hat security conference today in Las Vegas, Santamarta, a researcher for security firm IOActive, plans to present his findings, including the details of multiple serious security flaws in the code for a component of the 787 known as a Crew Information Service/Maintenance System. The CIS/MS is responsible for applications like maintenance systems and the so-called electronic flight bag, a collection of navigation documents and manuals used by pilots. Santamarta says he found a slew of memory corruption vulnerabilities in that CIS/MS, and claims that a hacker could use those flaws as a foothold inside a restricted part of a plane’s network. An attacker could potentially pivot, Santamarta says, from the in-flight entertainment system to the CIS/MS to send commands to far more sensitive components that control the plane’s safety-critical systems, including its engine, brakes, and sensors. Boeing maintains that other security barriers in the 787’s network architecture would make that progression impossible.

Santamarta, a researcher for security firm IOActive, admits that he doesn’t have enough visibility into the 787’s internals to know if those security barriers are circumventable. But he says his research nonetheless represents a significant step toward showing the possibility of an actual plane-hacking technique. “We don’t have a 787 to test, so we can’t assess the impact,” Santamarta says. “We’re not saying it’s doomsday, or that we can take a plane down. But we can say: This shouldn’t happen.”

Flying Firewalls

In a statement, Boeing said it had investigated IOActive’s claims and concluded that they don’t represent any real threat of a cyberattack. “IOActive’s scenarios cannot affect any critical or essential airplane system and do not describe a way for remote attackers to access important 787 systems like the avionics system,” the company’s statement reads. “IOActive reviewed only one part of the 787 network using rudimentary tools, and had no access to the larger system or working environments. IOActive chose to ignore our verified results and limitations in its research, and instead made provocative statements as if they had access to and analyzed the working system. While we appreciate responsible engagement from independent cybersecurity researchers, we’re disappointed in IOActive’s irresponsible presentation.”

In a followup call with WIRED, a company spokesperson said that in investigating IOActive’s claims, Boeing had gone so far as to put an actual Boeing 787 in “flight mode” for testing, and then had its security engineers attempt to exploit the vulnerabilities that Santamarta had exposed. They found that they couldn’t carry out a successful attack. Honeywell, which supplied Boeing with the code for the CIS/MS, also wrote in a statement to WIRED that “after extensive testing, Honeywell and its partners determined there is no threat to flight safety as the 787’s critical systems cannot be affected.”

“Every piece of software has bugs. But this is not where I’d like to find the bugs.”

Stefan Savage, UCSD

IOActive’s attack claims—as well as Honeywell’s and Boeing’s denials—are based on the specific architecture of the 787’s internals. The Dreamliner’s digital systems are divided into three networks: an Open Data Network, where non-sensitive components like the in-flight entertainment system live; an Isolated Data Network, which includes somewhat more sensitive components like the CIS/MS that IOActive targeted; and finally the Common Data Network, the most sensitive of the three, which connects to the plane’s avionics and safety systems. Santamarta claims that the vulnerabilities he found in the CIS/MS, sandwiched between the ODN and CDN, provide a bridge from one to the other.

But Boeing counters that it has both “additional protection mechanisms” in the CIS/MS that would prevent its bugs from being exploited from the ODN, and another hardware device between the semi-sensitive IDN—where the CIS/MS is located—and the highly sensitive CDN. That second barrier, the company argues, allows only data to pass from one part of the network to the other, rather than the executable commands that would be necessary to affect the plane’s critical systems.

“Although we do not provide details about our cybersecurity measures and protections for security reasons, Boeing is confident that its airplanes are safe from cyberattack,” the company’s statement concludes.

Boeing says it also consulted with the Federal Aviation Administration and the Department of Homeland Security about Santamarta’s attack. While the DHS didn’t respond to a request for comment, an FAA spokesperson wrote in a statement to WIRED that it’s “satisfied with the manufacturer’s assessment of the issue.”

“This Is Security 101”

The new claims of software flaws come against the backdrop of the ongoing scandal over Boeing’s grounded 737 Max aircraft, after that aircraft’s faulty controls contributed to two crashes that killed 346 people. At the same time, Santamarta has his own history of unresolved disagreements with the aerospace industry over its cybersecurity measures. He has previously hacked a Panasonic Avionics in-flight entertainment system. And at last year’s Black Hat conference, for instance, he presented vulnerabilities in satellite communication systems that he said could be used to hack some non-sensitive airplane systems. The Aviation Industry Sharing and Analysis Center shot back in a press release that his findings were based on “technical errors.” Santamarta countered that the A-ISAC was “killing the messenger,” attempting to discredit him rather than address his research.

But even granting Boeing’s claims about its security barriers, the flaws Santamarta found are egregious enough that they shouldn’t be dismissed, says Stefan Savage, a computer science professor at the University of California at San Diego, who is currently working with other academic researchers on an avionics cybersecurity testing platform. “The claim that one shouldn’t worry about a vulnerability because other protections prevent it from being exploited has a very bad history in computer security,” Savage says. “Typically, where there’s smoke there’s fire.”

Savage points in particular to a vulnerability Santamarta highlighted in a version of the embedded operating system VxWorks, in this case customized for Boeing by Honeywell. Santamarta found that when an application asks to write to the underlying computer’s memory, the tailored operating system doesn’t properly check that it’s not instead overwriting the kernel, the most sensitive core of the operating system. Combined with several application-level bugs Santamarta found, that so-called parameter-check privilege escalation vulnerability represents a serious flaw, Savage argues, made more serious by the notion that VxWorks likely runs in many other components on the plane that might have the same bug.

“Every piece of software has bugs. But this is not where I’d like to find the bugs. Checking user parameters is security 101,” Savage says. “They shouldn’t have these kinds of straightforward vulnerabilities, especially in the kernel. In this day and age, it would be inconceivable for a consumer operating system to not check user pointer parameters, so I’d expect the same of an airplane.”

“This shouldn’t happen.”

Ruben Santamarta, IOActive

Another academic avionics cybersecurity researcher, Karl Koscher at the University of Washington, says he’s found such serious security flaws in an aircraft component as those Santamarta reported in the CIS/MS. “Perhaps Boeing intentionally treated it as untrusted, and the rest of the system can handle that untrusted bit,” Koscher says.”But saying, ‘it doesn’t matter because there are mitigations further down’ isn’t that good an answer. Especially if some of the mitigations turn out to be not as robust as you think they are.”

Koscher also points to the CIS/MS access to the Electronic Flight Bag, full of documents and navigation materials a plane’s pilot might refer to via a tablet in the cockpit. Corrupting that data could cause its own form of mayhem. “If you can create confusion and misinformation in the cockpit, that could lead to some pretty bad outcomes,” Koscher notes. (A Boeing spokesperson says that the EFB can’t be compromised from the CIS/MS, either, despite both being located in the same part of the 787’s network.)

Big, Flying Collections of Computers

To be clear, neither Savage nor Koscher believe that, based on Santamarta’s findings alone, a hacker could cause any immediate danger to an aircraft or its passengers. “This is a long way from an imminent safety threat. Based on what they have now, I think you could let the IOActive guys run amok on a 787 and I’d still be comfortable flying on it,” Savage says. “But Boeing has work to do.”

Assessing whether IOActive findings truly represent a step toward a serious attack is difficult, Savage points out, simply due to the impossible logistics of airplane security research. Companies like Boeing have the means to comprehensively test a quarter-billion dollar aircraft’s security, but deep conflicts of interest about what results they publish. Independent hackers like IOActive’s Santamarta don’t have the resources to carry out those complete investigations—even as highly resourced state hackers or others willing to test on live, airborne planes might.

Santamarta’s research, despite Boeing’s denials and assurances, should be a reminder that aircraft security is far from a solved area of cybersecurity research. “This is a reminder that planes, like cars, planes depend on increasingly complex networked computer systems,” Savage says. “They don’t get to escape the vulnerabilities that come with this.”


More Great WIRED Stories

via Wired Top Stories https://ift.tt/2uc60ci

August 7, 2019 at 02:36PM

How Disney+ Compares to Netflix, Hulu and Amazon Prime

https://lifehacker.com/how-disney-compares-to-netflix-hulu-and-amazon-prime-1837042032

Now that Disney’s long-awaited streaming service, Disney+, finally has an official launch date (November 12) and more details have been released, it’s clear that this isn’t just a niche supplemental service for Disney fans—the media giant is making a play for dominance in the streaming market. But while Disney has a wealth of content to fill Disney+’s library, and even a few surprising deals and extras packed in for some members, it still has to take on major players like Netflix, Amazon, and Hulu, which have been in the market for years and have carved out their own respective shares of the user base.

We thought it would be interesting to line up the various on-demand streaming services out there and see how Disney+ compares to each. For the purposes of this guide, we’re limiting the scope to “just” the other standalone on-demand services to which Disney+ is immediately comparable—Netflix, Hulu, and Amazon Prime Video—and leaving out internet-based live TV services like SlingTV, YouTubeTV, and PlaystationVue; channel-specific apps/services like CBS All Access and those that require a TV subscription; and niche services like Crunchyroll. We’re also omitting upcoming products like Apple TV Plus, Time-Warner’s HBO Max service (launching in 2020), and the NBCUniversal streaming service slated for 2021, since those services have yet to be detailed at the time of this writing. That said, you can be sure these three will be major players in the increasingly crowded streaming market when they launch, so we’ll give them their due once more information is available.

But enough with the caveats and context—let’s get on to examining how Disney+ compares to other mainstay services.

Disney+

Disney+ won’t be available until November 12, but recent announcements provide a clear picture of what to expect.

Price

Disney+ will be available in a standalone package for either $6.99 monthly or $69.99 annually. However, Disney will also be offering a bundle that includes Disney+, ESPN Plus, and the basic ad-supported Hulu service for $12.99 a month, which is several dollars cheaper than subscribing to each separately. It’s also roughly equivalent in cost to Netflix’s HD subscription tier and Amazon Prime’s monthly payment option, but includes three services instead of just one.

Noteworthy content

Disney+ is going to be the home of pretty much all Disney-owned TV series and movies from now on. All Disney and Pixar animated films, Marvel Cinematic Universe movies, and Star Wars films and animated TV series will be on the service, as well as upcoming premium TV series based on many of these properties, such as The Mandalorian and Loki. It’s also worth noting that Disney+ will be the streaming home for the entire 30-season run of The Simpsons. Admittedly, the full Disney+library is likely going to be smaller at first than its competitors, but the overall quality is arguably better than most.

Other perks

Aside from the bundle deal and access to Disney’s breadth of exclusive (and highly popular) content, Disney+ doesn’t have many notable other perks, per se. However, members of Disney’s D23 club will get early access to Disney+ ahead of its November 12 launch date.

Best for

Fans of any and all Disney-owned properties. The bundle deal with ESPN Plus and Hulu make it an especially strong competitor with the likes of Netflix and Amazon Prime.

Netflix

Netflix has enjoyed a long run as the most popular streaming service available, and while it still holds the majority of the market, newcomers like Disney+ cut into its content library and recent price hikes have seen users leave the service. That’s not to say Netflix is a lesser service overall than its competitors, but its identity and role in the market seems to be changing, evidenced by its increased emphasis on original content.

Pricing

Netflix has the most varied pricing structure of the bunch, with three different options available:

  • Basic: $6 per month. Standard definition streaming only, and limited to one streaming device at a time. Good for individuals who will only be streaming using mobile data plans.
  • Standard: $13 per month. High definition streaming (up to 1080p) and up to two simultaneous streams.
  • Premium. $16 per month. Ultra HD (UHD) streaming, including 4K and HDR content, and Dolby Atmos audio support. Allows up to four simultaneous streams, which is the highest number of simultaneous streams available across any of the services included here.

Users can also add on the DVD/Blue-ray rental-by-mail service to their streaming subscription, which varies in price depending on how many discs you wish to rent at a time, and in what format(s).

Noteworthy content

Netflix might have some excellent third-party movies and series, but some of the best content available is its originals like Stranger Things, Mudbound, and more. Netflix also currently has exclusive streaming rights for a handful of movies and TV series including Arrested Development, Mad Men, and No Reservations hosted by the late Anthony Bourdain. For the time being, it’s also the only place to watch select Marvel and Star Wars films (until Disney+ launches), and popular sitcoms Friends (until it leaves for HBO Max in 2020) and The Office (until NBCUniversal takes it back to its own upcoming service in 2021).

Other perks

Support for Hi-quality audio streaming with an appropriate 5.1 surround device; all content subtitled; nigh-ubiquitous device support.

Best for

Original content. The Premium plan is also the best for families who will be streaming on multiple devices simultaneously.

Hulu

Despite technically being a majority Disney-owned product, Hulu will remain a separate service from Disney+. While the basic Hulu service can be bundled with a Dinsey+ subscription as discussed above, Hulu offers higher pricing tiers that are not available in the Disney+ bundle—including an option for live TV.

Pricing

Hulu’s basic, ad-supported service is $6 per month. To nix the ads, the monthly price doubles to $12 monthly. Hulu is also the only service on this list that includes its own Live TV option, which ups the price to $45. The Live TV option also adds support for a second simultaneous stream.

Noteworthy content

On top of excellent Hulu Originals like Handmaid’s Tale, Hulu is also notable for keeping its library current with many series, with new episodes streamable within 24-48 hours after they air live. The Live TV option also adds over 50 TV channels, including live sports broadcasts.

Other perks

Hulu is the only service on this list currently available on the Nintendo Switch.

Best for

Keeping up with current series, especially with the live TV upgrade.

Amazon Prime Video

Amazon Prime has many perks for its members, and Prime Video is one of the best. The on-demand service includes a massive library of free content, bolstered by an equally expansive breadth of content available for rent and purchase—some of which is exclusive to only Prime members, too.

Pricing

Prime Video is a part of the normal Amazon Prime subscription, which is available for $13 monthly or $119 annually, though this can be discounted to $59 a year with a valid student email address. Members can also extend their library with “Channel” add-ons for an additional price (which varies depending on the specific “Channel” package). Video rentals and purchases also available.

Noteworthy content

Amazon originals like Good Omens, Marvelous Ms. Maisel, and The Man in the High Castle.

Other perks

4k, HDR (including Dolby Vision, HDR10, and HDR10+) and Dolby Atmos content is included at no extra cost—unlike Netflix, which requires user upgrade their plans to unlock access to such content. Plus, users get all other Amazon Prime benefits and special offers included with their subscription.

Best for

Library size and scope. It’s also a no-brainer for Prime members.

via Lifehacker https://lifehacker.com

August 7, 2019 at 03:34PM

The Galaxy Note 10 can stream games from your PC

https://www.engadget.com/2019/08/07/samsung-galaxy-note-10-game-streaming-discord-unpacked/

Samsung is keeping gamers in mind with the Galaxy Note 10. Though the PlayGalaxy Link P2P streaming service, you can stream PC games to your Note 10 and keep playing while you’re on the move — all without having to store games on your phone.

The device includes an AI-based Game Booster system, which optimizes performance and power consumption depending on the game you’re playing. A vapor cooling chamber system should keep your Note 10 from getting too warm during a Fortnite session too. In addition, you’ll be able to chat with your buddies from the Samsung game launcher, which has Discord integration.

via Engadget http://www.engadget.com

August 7, 2019 at 04:00PM

Amazon and Google continue to list gun accessories despite ban

https://www.engadget.com/2019/08/07/amazon-and-google-continue-to-list-gun-accessories-despite-ban/

Sales listings for shotgun rounds, magazines and other firearm accessories are slipping through the cracks at Google and Amazon — despite algorithms designed to catch the forbidden items. The Washington Post reported today that listings for such items were live as recently as Tuesday, only days after the nation grappled with mass shootings in Dayton and El Paso. Both tech giants have policies that ban the sale of guns, gun parts and related products like silencers or conversion kits on their online shopping platforms. They also use software designed to identify keywords and images related to firearms.

After being alerted of the Post‘s reporting, representatives for Amazon and Google have claimed that the items in question are no longer on the site. Still, the fight to remove such listings appears to be a game of whack-a-mole for tech giants.

A quick search by Engadget of "gun magazine" today on Google Shopping unearthed a kit that adjusts the height of a rife magazine and pistol magazine. Both appeared to violate Google’s ban, which extends to "any part that is essential to, or enhances the functionality of a gun" as well as items that appear to be guns. After Engadget contacted Google, the items were removed. The company said other items flagged by Engadget, such as a magazine carrier and a toy-sized replica of an AK-47, didn’t violate their policy. Google, which has banned weapons-related listings since 2012, prohibits parts that are "essential to or enhance the functionality" of a gun, such as stocks, clips, scopes and conversion kits.

"Our hearts go out to the victims of gun violence. The sale of weapons, guns, and certain gun parts is strictly prohibited on Google Shopping. As soon as we found policy-violating results, we removed them and are working to prevent these instances from reoccurring," wrote a Google spokesman in a statement.

Other online merchants are struggling to keep firearms merchandise off their platforms. An investigation by the Los Angeles Times today found listings for vintage AK-47s, pistol grips, enhanced AR-15 charging handles and other banned merchandise on EBay. Unless ecommerce companies take more aggressive action in policing such dangerous merchandise, it seems inevitable that they’ll keep cropping up.

Source: The Washington Post, The Los Angeles Times

via Engadget http://www.engadget.com

August 7, 2019 at 09:12PM

Facial recognition will catch sleepy taxi drivers in Russia

https://www.engadget.com/2019/08/08/facial-recognition-will-catch-sleepy-taxi-drivers-in-russia/

Exhausted Russian taxi drivers may soon be forced to take breaks. Yandex.Taxi, the largest taxi service in the nation, will install devices in all their cars that use facial recognition technology to identify tired drivers, reports Bloomberg. The company merged with Uber last year, allowing drivers to access riders from both apps.

The device, which will be mounted on the car’s windshield, includes software that can identify the signs of an exhausted person — including blinking, yawning and a less than upright posture. In total, the software can identify 68 facial points.

The move by Yandex is in response to demands from Russian legislators that taxi companies do more to prevent accidents. Moscow faced 764 car accidents last year, which resulted in 23 deaths. Many blamed the increased use of ride-hailing services and more cars on the road for the increase in roadside collisions.

Automakers have already rolled out similar facial recognition features in their vehicles. The 2019 Subaru Forester includes a feature called DriverFocus, a driver monitoring system that can identify signs of fatigue in drivers. A driver-facing camera on the Cadillac CT6 sedan uses infrared light to track head position.

Uber has a more low-tech approach to keep tired drivers off the road — it automatically goes offline for six hours after drivers reach the 12-hour time limit. Lyft has a 14-hour time limit. But drivers can easily bypass such restrictions if they use both apps. Yandex has already piloted face recognition for drivers in 100 cars, and plans to roll out the technology to several thousand cars soon.

Source: Bloomberg, Uber

via Engadget http://www.engadget.com

August 8, 2019 at 01:12AM

Tiny tardigrades crash-landed on the Moon and probably survived

https://arstechnica.com/?p=1547435

SEM image of <em>Milnesium tardigradum</em> in active state. Totes adorbz.
Enlarge /

SEM image of

Milnesium tardigradum

in active state. Totes adorbz.

Tardigrades, more commonly known as “water bears,” are microscopic creatures capable of surviving the harshest extreme conditions. In fact, they were the first animal to survive in the vacuum of space in 2007. Now, it seems, they might be ready to colonize the Moon. BBC News reports that an Israeli spacecraft carrying the tiny creatures in a state of dehydration crash-landed on the Moon back in April. All they need is a bit of water to reanimate, and voila! We’d have a colony of lunar tardigrades.

First described by German zoologist Johann Goeze in 1773, they were dubbed tardigrada (“slow steppers” or “slow walkers”) four years later by Lazzaro Spallanzani, an Italian biologist. That’s because tardigrades tend to lumber along like a bear. Since they can survive almost anywhere, they can be found in lots of places: deep-sea trenches, salt and freshwater sediments, tropical rain forests, the Antarctic, mud volcanoes, sand dunes, beaches, and lichen and moss. (Another name for them is “moss piglets,” immortalized in a 2017 South Park episode where the gang teaches tardigrades to dance to Taylor Swift songs for science class.)

They’re not technically members of the extremophile class of organisms since they don’t so much thrive in extreme conditions as endure, but they can endure for an impressively long time. Their secret? They can suspend their metabolism, enabling them to go without food or water for 30 years or more, and they can survive dehydrated for at least five years. Once revived, they go on with their lives, even capable of reproducing to replenish their numbers.

Even though they are much too large in reality, tardigrades featured in the quantum realm in <em>Ant Man and the Wasp.</em> "Make sure you stay out of the tardigrade fields," Janet Van Dyne cautions. "They're cute, but they'll eat you."
Enlarge /

Even though they are much too large in reality, tardigrades featured in the quantum realm in

Ant Man and the Wasp.

“Make sure you stay out of the tardigrade fields,” Janet Van Dyne cautions. “They’re cute, but they’ll eat you.”

The tardigrades aboard the SpaceIL Beresheet lunar lander were supplied by the Arch Mission Foundation, an organization dedicated to keeping backups of the flora and fauna of Earth by sending a “lunar library” into space, part of the group’s ongoing Billion Year Archive initiative. The library is a 30 million-page archive of human history and civilization, stored on a nanoscale device akin to a DVD—except it’s made of 25 layers of nickel disks just 40 microns thick. The archive purportedly can be read with an optical microscope or even a magnifying glass, and it contains thousands of books, DNA samples, and a few thousand water bears, among other treasures.

According to the organization’s website, “We intend to gradually pepper the solar system with records of our civilization…. The more locations that Arch Libraries are sent to, the greater the probability that at least one of them will survive to be discovered in the distant future. Long after the pyramids have turned to dust, and no matter what transpires on Earth, the Billion Year Archive will remain.”

The dehydrated tardigrade samples were in a state of suspended animation for their trip to the Moon and were encased in amber. But given how hardy the creatures can be, “We believe the chance of survival for the tardigrades are extremely high,” Arch Mission Foundation co-founder Nova Spivack told BBC News. Per Wired, “In the best-case scenario, Beresheet ejected the Arch Mission Foundation’s lunar library during impact, and it lies in one piece somewhere near the crash site.” Granted, it’s a long shot that water would magically appear (perhaps from thawed water ice) on the Moon in sufficient quantities to rehydrate any surviving tardigrades and allow them to thrive. But in principle, a colony of water bears is within the realm of possibility.

Even if they don’t survive, BBC News has a suggestion for Hollywood. “There’s definitely some great source material for a sci-fi/horror movie. Attack of the Moss Piglets from the Moon? We’d watch it.”

So would we.

via Ars Technica https://arstechnica.com

August 7, 2019 at 12:48PM