Drivers Using Reflective Scary Face Decals On Rear Window To Discourage High-Beam Users

scary-face-decals-6.jpg

Apparently drivers in some parts of China have been flocking to buy these reflective ghost/scary face decals (~$3 – $18) that are only visible when the driver behind them is using their high-beams. The idea is to discourage high-beam use/scare the driver behind you into crashing. No, seriously, I think people are actually crashing.

But traffic police in some states have warned against using the scary stickers, because they could cause traffic accidents. Police in Shandong say they’ll issue 100 yuan ($15) fines to drivers using ghoulish decals.

In Beijing, police say [Chinese] it’s not illegal to have the decals on, but the driver may have to bear responsibility of any accidents that result from scaring another driver with them.

You know what I do if somebody driving behind me has their high-beams on? Immediately pull over and get out and run because I do NOT have a license. What the hell was I thinking? I’m not going back to jail. Whose car was that anyways?

Keep going for several more shots of the possibilities. Also, no word if anybody’s seen the face in their own rearview and had a heart attack.

scary-face-decals-1.jpg

scary-face-decals-2.jpg

scary-face-decals-3.jpg

scary-face-decals-4.jpg

scary-face-decals-5.jpg

Thanks to Jenn, who agrees when you drive a monster truck, nobody’s high-beams are high enough to be a problem.

blog comments powered by Disqus

from Geekologie – Gadgets, Gizmos, and Awesome http://ift.tt/2fgRBVq
via IFTTT

Brain-altering Halo Sport headphones are available to everyone

Until now, Halo Neuroscience’s signature brain-bending headphones were only available to very specific groups: college-level athletes, pro athletes and the military. They helped build up hype for the eventual public release. That all changes today, however: you can buy your own set of Halo Sport headphones for $699. As before, that high price stems from the Sports’ "neuropriming." The over-ears send electrical currents to your brain that, at least in theory, make it extra-receptive to training. You won’t be inherently faster or stronger, but you might hit your goals sooner than you would otherwise.

How well do they work, though? It’s hard to quantify, since there are other factors that go into an athlete’s success beyond their receptiveness to training: the quality of that training, the athlete’s other traits and, of course, the competition. Oakland Raiders cornerback TJ Carrie is having a good year so far after wearing the Halo Sport, but the Olympians who used them? Their results are… mixed. Natasha Hastings helped win gold in the Rio Olympics’ 400m women’s relay. Mike Rodgers’ sprint relay team was disqualified in its final race, though, and Michael Tinsley was knocked out in the first round of the 400m hurdles.

This doesn’t mean that the brain-altering technology is ineffective. However, it does suggest that you should temper your expectations. No matter how well the Halo Sport works, you aren’t guaranteed fame and glory — you may perform better than you would otherwise, but you probably won’t win championships or smash records unless you’re already talented.

Via: CNET

Source: Halo Neuroscience

from Engadget http://ift.tt/2fGjyGX
via IFTTT

Google Translate Becomes a Neural Machine Translation Boss, Which is Good

google translate

Google announced a big update to its Translate service today that involves Neural Machine Translation. That sounds like some future AI, machine learning science, secretive robotic madness, and it may very well be, but it also means Google Translate is going to get a whole lot better everywhere you use it. 

Google explains Neural Machine Translation as a system that “translates whole sentences at a time, rather than just piece by piece.” In other words, Google Translate will use this technology to “help it figure out the most relevant translation, which it then rearranges and adjusts to be more like a human speaking with proper grammar.” Instead of getting a translation that is almost as impossible to read as the language you didn’t needed to translate, the translation should return in a much more natural format for you.

That make sense? Take a look at the image above and I’m guessing it will.

Google is calling this improvement the single biggest leap that Translate has “seen in the last ten years combined.” Yep, it’s a big one.

To start, Google Translate will Neural Machine Translation to work to and from English and French, German, Spanish, Portuguese, Chinese, Japanese, Korean, and Turkish. Those languages make up for more than 35% of Translate queries, so we’re off to a good start. Google did mention that the goal, as you probably guessed, is to make this magic happen for all 103 supported languages.

Neural Machine Translation will be available in in the Translate app and website.

Via:  Google

Google Translate Becomes a Neural Machine Translation Boss, Which is Good is a post from: Droid Life

from Droid Life: A Droid Community Blog http://ift.tt/2fewvqs
via IFTTT

Meet PoisonTap, the $5 tool that ransacks password-protected computers

Samy Kamkar

The perils of leaving computers unattended just got worse, thanks to a newly released exploit tool that takes only 30 seconds to install a privacy-invading backdoor, even when the machine is locked with a strong password.

PoisonTap, as the tool has been dubbed, runs freely available software on a $5 Raspberry Pi Zero device. Once the payment card-sized computer is plugged into a computer’s USB slot, it intercepts all unencrypted Web traffic, including any authentication cookies used to log in to private accounts. PoisonTap then sends that data to a server under the attacker’s control. The hack also installs a backdoor that makes the owner’s Web browser and local network remotely controllable by the attacker.

Samy Kamkar

PoisonTap is the latest creation of Samy Kamkar, the engineer behind a long line of low-cost hacks, including a password-pilfering keylogger disguised as a USB charger, a key-sized dongle that jimmies open electronically locked cars and garages, and a DIY stalker app that mined Google Streetview. While inspiring for their creativity and elegance, Kamkar’s inventions also underscore the security and privacy tradeoffs that arise from an increasingly computerized world. PoisonTap continues this cautionary theme by challenging the practice of password-protecting an unattended computer rather than shutting it off or, a safer bet still, toting it to the restroom or lunch room.

Kamkar told Ars:

The primary motivation is to demonstrate that even on a password-protected computer running off of a WPA2 Wi-Fi, your system and network can still be attacked quickly and easily. Existing non-HTTPS website credentials can be stolen, and, in fact, cookies from HTTPS sites that did not properly set the ‘secure’ flag on the cookie can also be siphoned.

Unsecured home or office routers are similarly at risk. Kamkar has published the PoisonTap source code and additional technical details here and has also released the following video demonstration:

PoisonTap – exploiting locked machines w/Raspberry Pi Zero

Once the device is inserted in a locked Mac or PC (Kamkar said he hasn’t tested PoisonTap on a Linux machine), it surreptitiously poisons the browser cache with malicious code that lives on well after the tool is removed. That makes the hack ideal for infecting computers while they are only briefly unattended. Here’s how it works.

Once the PoisonTap software is installed, the Raspberry Pi device becomes a miniature Linux computer that presents itself as an Ethernet network. Like a router, it’s responsible for allocating IP addresses for the local network through the dynamic host configuration protocol. In the process, the device becomes the gateway for sending and receiving traffic flowing over the local network. In this sense, PoisonTap is similar to a USB exploit tool demonstrated in September that stole login credentials from locked PCs and Macs.

Through a clever hack, however, PoisonTap is able to become the gateway for all Internet traffic as well. It does this by defining the local network to include the entire IPv4 address space. With that, the device has the ability to monitor and control all unencrypted traffic the locked computer sends or receives over its network connection.

PoisonTap then searches the locked computer for a Web browser running in the background with an open page. When it finds one, the device injects HTML iframe tags into the page that connect to the top 1 million sites ranked by Alexa. Because PoisonTap masquerades as the HTTP server for each site, the hack is able to receive, store, and upload any non-encrypted authentication cookies the computer uses to log in to any of those sites.

Given its highly privileged man-in-the-middle position, PoisonTap can also install backdoors that make both the Web browser and connected router remotely accessible to the attacker. To expose the browser, the hack leaves a combination of HTML and JavaScript in the browser cache that produces a persistent WebSocket. PoisonTap uses what’s known as a DNS rebinding attack to give remote access to a router.

That means attackers can use PoisonTap to remotely access a browser as it connects to a website or to gain administrative control over the connected router. Attackers still must overcome any password protections safeguarding an exposed router. But given the large number of unpatched authentication bypass vulnerabilities or default credentials that are never changed, such protections often don’t pose much of an obstacle.

PoisonTap challenges a tradition that can be found in almost any home or office—the age-old practice of briefly leaving a locked computer unattended. And for that reason, the ease and thoroughness of the hack may be understandably unsettling for some people. Still, several safeguards can significantly lower the threat posed by the hack. The first is to, whenever possible, use sites that are protected by HTTPS encryption and the transmission of secure cookies to prevent log-in credentials from being intercepted. A measure known as HTTP Strict Transport Security is better still, because it prevents attack techniques that attempt to downgrade HTTPS connections to unsecured HTTP.

As a result, neither Google nor Facebook pages can be triggered by computers infected by PoisonTap. Sadly, multi-factor authentication isn’t likely to provide much protection because it generally isn’t triggered by credentials provided in authentication cookies.

End users, meanwhile, should at a minimum close their browsers before locking their computer or, if they’re on a Mac, be sure to enable FileVault2 and put their machine to sleep before walking away, since browsers are unable to make requests in such cases. Regularly flushing browser caches is also a sound, albeit imperfect, measure. For the truly paranoid, it may make more sense to simply bring laptops along or to turn off machines altogether.

from Ars Technica http://ift.tt/2eFiwhx
via IFTTT

Want To Prevent The Flu? Skip The Supplements, Eat Your Veggies

Eating healthy will do more for your immune system than megadoses of supplements.

Gillian Blease/Ikon Images/Getty Images


hide caption

toggle caption

Gillian Blease/Ikon Images/Getty Images

Eating healthy will do more for your immune system than megadoses of supplements.

Gillian Blease/Ikon Images/Getty Images

Flu season is upon us, which means it’s time for the wave of advertisements promoting $8 juices or even more expensive supplements to “boost your immunity” or “support immune function.”

But those are marketing terms, not scientific ones. And there’s no proof that those products are going to keep you from getting sick.

When you’re exposed to a virus like the influenza virus, a number of factors determine if you actually get sick, and if so, how severely. One is pre-existing immunity, either from being previously exposed to a similar strain or through a vaccine, says Gregory Poland, a spokesman for the Infectious Diseases Society of America and a professor of medicine at the Mayo Clinic. Just last week, a paper published in Science reported that the flu strain you were first exposed to can affect your protection against new strains that jump from animals to humans.

Your immune status also matters; people who have untreated HIV or have recently received a bone marrow transplant, for example, cannot fight off infections like healthier people can.

Age, too, is a factor, with the very young and the very old suffering worse bouts of the flu.

And yes, what you eat does matter. “We know for a healthy immune system you need a healthy diet,” says Joan Salge Blake, a registered dietitian nutritionist and clinical associate professor at Boston University. You need protein as well as micronutrients including vitamins C, A, and E and zinc, she says.

The ideal way to get those nutrients, however, is to eat a healthful, varied diet, including sufficient protein and a variety of fruits and vegetables, says Poland. If you’re already doing that, it’s unlikely that you have major nutritional deficiencies. One exception is vitamin D, which is necessary for bone health and can be hard to get from food alone, though there’s not a consensus on the cutoff for a vitamin D deficiency.

Even those who aren’t eating the most healthful diet (i.e. most of us) are likely getting a lot of nutrients through fortified packaged foods like cereal. Nutrient deficiency does happen, but it’s relatively uncommon in the U.S. According to the Centers for Disease Control, less than 10 percent of the population is deficient in micronutrients, though Poland says certain groups of people are at risk, including vegans who are not careful about their food choices and older people who eat scant, unvaried diets.

“If you are malnourished, your immune system is going to suffer,” says Salge Blake.

If you are not nutrient deficient or malnourished, though, taking megadoses of vitamins are not going to super-charge your immune system or prevent you from catching the flu or other respiratory viruses. Vitamin C, often touted as a way to stay healthy in the winter, doesn’t seem to reduce the incidence of colds, though there is some evidence it may cut their duration and it might be helpful for people who experience short periods of heavy physical activity, according to a 2013 Cochrane review.

Juices sound attractive; after all, they are made from real foods. But Salge Blake says the best way to get the nutrients supplied by fruits and vegetables is to actually eat the fruits and vegetables themselves. That way you get the fiber, which slows the absorption of natural sugars and carries its own health benefits.

Drinking juices also makes it easy to consume too many calories, and obesity suppresses immune function.

What can the average person do who wants to make sure their immune system is as healthy as possible? In addition to a healthful diet and sufficient sleep, Poland recommends exercise, staying up to date on flu and pertussis vaccinations, staying away from people who are obviously sick, and washing your hands.

Katherine Hobson is a freelance health and science writer based in Brooklyn, N.Y. She’s on Twitter: @katherinehobson.

from NPR Topics: News http://ift.tt/2ghJuwJ
via IFTTT