Tetris-Enabled T-Shirt. That Is All.

Modern gamers have it so easy. You can race, shoot, hunt, hide, storm, and slay on portable platforms from your cell phone to a high-tech handheld gaming device. However, one man has taken this technology into an entirely different realm: fashion.

As reported by Time.com, "YouTube user Marc Kerger crafted the shirt, which features 128 LEDs and an Arduino Uno microcontroller board, in honor of Tetris’s 30th anniversary." A pair of AA batteries and you're off into belly-based, block-stacking bliss.

Tetris, the iconic Russian brainteaser, was invented in 1984 by Russian engineering student Alexey Pajitnov, and soon after took the world by shape-spinning, stackable storm.



Frying The Onion Ring: NSA Databases ALL German Tor Users




While the NSA claims to only target a small number of internet users for its creepy peeping (and then, only for our "security"), recent discoveries have shown that their methods of determining who is watch-worthy is more than just a few naughty buzzwords you may have typed into Google. Data from targeted users is compiled and stored indefinitely...with some targets (particularly those overseas) having done nothing more than use the Tor anonymizing software.

Tor, an "onion" type encryption service, anonymizes one by rerouting information through various proxy servers. This is extremely difficult to trace and henceforth infuriating to the NSA. Rather than do actual investigations to decide who may actually be committing cybercrimes via this software, the NSA instead chooses to target anyone who has downloaded the program to their computer. They are apparently under the assumption that those of us who are smart enough to recognize what is going on and going wrong are likely criminals for taking the "crazy" steps to protect ourselves.

This revelation, as reported by boingboing.com, first emerged from the investigations of several intrepid German reporters. The leak of this information is thought to have been divulged post-Snowden, leading reporter Corey Doctorow to speculate, "The existence of a potential second source means that Snowden may have inspired some of his former colleagues to take a long, hard look at the agency's cavalier attitude to the law and decency."  Yet while the total Tor-based "terrorist" list is currently thought only to apply to German users, one would not be surprised if this did or will soon apply to Tor users in America.

If only one good apple could change the whole rotten barrel. At least we still have a barrel of...onions?  Stinking as the whole operation is, the powers that be can't simply stop our freedom of thought just yet.






Electric Excellence For Everyone: Tesla's Affordable Model E

The changing dynamics of sustainable transportation will hopefully soon allow our dependency on fossil fuels to decline dramatically. Now, electric car manufacturers Tesla are taking steps to bring their technology to different levels of the market.

The Tesla Model E is a new and more affordable electric car that could raise the industry's appeal to the masses. As reported by technobuffalo.com, Tesla VP of engineering Chris Porritt indicated "the E will be priced to compete with Audi’s A4 sedan and BMW’s compact 3 series, which both cost a little over $30,000 new." The Model E is significantly less expensive than their flagship $70,000 Model S automobile, thanks to developments made by Tesla's Gigafactory that will enable the creation of lower-cost batteries.

Tesla also plans to release an SUV, the Model X, due out in the second quarter of 2015. The company has refused to comment on any prospective release date for hoverboards.
Image courtesy www.gas2.org.

Down With The Sickness: Your Online Health Records Are Easily Hackable



Your medical records from personal doctors and hospitals are increasingly going electronic, both due to ease of accessibility for providers and the stimulus of $24 billion dollars in federal incentive money (thanks to the 2009 Health Information Technology for Economic and Clinical Health Act.)  Now, serious worries are raised that this sensitive information's accessibility isn't being protected well enough from threats.

According to the Identify Theft Resource Center, over half of the 353 tracked breaches in 2014 were from the health sector.  Criminal attacks on health data are on the rise, with the target information (such as a full health profile on a certain person) selling for $500 on the black market.  This information can be used to steal an identity to gain care, or worse, commit blackmail with the sensitive material.  A Ponemon report claimed 313,000 people were health-record heist victims in 2013, up 19 percent from the previous year.

Politico.com reports that security ratings firm BitSight has rated the health care industry as the least prepared for a cyber attack, thanks in part to their high volume of threats and slow response time.  Also, about half of health systems surveyed in an annual review by the Health Information Management Systems Society indicated that they spent 3 percent or less of their IT budgets on security.

Even the Feds admit this is a weak system.  The health industry “is not as resilient to cyber intrusions compared to the financial and retail sectors, therefore the possibility of increased cyber intrusions is likely,” according to a warning released by the FBI.

Since 2009, more than 31.6 million individuals (a tenth of the United States) have had their medical records exposed through some form of malfeasance or outright theft, according to the U.S. Department of Health and Human Services.

OnionWare Anonymity Software Makes Spies Cry: New Secure Filesharing Service Expertly Thwarts Middlemen


With privacy issues becoming more and more critical in modern life, it is important to retain a feeling of security when dealing with one's major online documents. More than simple spied-on social media or intercepted emails, having a means to store and transfer large files online in a private manner is the focus of a new anonymity software.

Inspired by NSA patriot Edward Snowden, the new OnionWare technology uses the super-secure Tor network to thwart prying eyes, then establishes a temporary website on the user's computer. This eliminates the "middleman" of other filesharing services like Dropbox, which could be infiltrated by the government at any point. Using Onionware and Tor, a secure password and URL are exchanged peer-to-peer, and once the desired files are downloaded by the recipient, the temporary site is deleted permanently.

Parker Higgins, an activist with the Electronic Frontier Foundation, lauded the new technology, telling www.digitaljournal.com that, "Peer-to-peer offers no convenient mechanism for centralized surveillance or censorship. By design, there's usually no middleman that can easily record metadata about transfers—who uploaded and downloaded what, when, and from where—or block those transfers...recording all of it would require a dragnet effort, not a simple request for a log file from a centralized service provider."

The software was developed by tech analyst and cryptography/cybersecurity crusader Micah Lee while trying to expedite the secure transfer of files between Edward Snowden and journalists David Miranda and Glenn Greenwald, whose own files came under government scrutiny once the Snowden leaks were exposed.

Energy Companies E-Sabotaged? Dragonfly Cyberattacks Target Industrial Control Systems






Beginning by targeting defense and aerospace companies in 2011, the online organization called Dragonfly has now changed its target to American and European energy companies. The cyberattackers, thought to be members of a government agency due to their high degree of technological prowess, wreak computerized havoc on industrial control systems (ICS) of petroleum pipelines as well as ICS all over the energy grid (including energy industry industrial equipment providers.)

The operation was multifaceted and well-funded. According to Symantec.com, "The group initially began sending malware in phishing emails to personnel in target firms. Later, the group added watering hole attacks to its offensive, compromising websites likely to be visited by those working in energy in order to redirect them to websites hosting an exploit kit. The exploit kit in turn delivered malware to the victim’s computer. The third phase of the campaign was the Trojanizing of legitimate software bundles belonging to three different ICS equipment manufacturers."

Symantec was quick to offer solutions to protect computer systems from these attacks, which resemble the Stuxnet virus (aimed at the Iranian nuclear program, it was the first major malware ICS sabotage.) The goal of the recent attacks was further-reaching, intending to achieve a level of cyberespionage that could play a major role in sabotaging any of the infected systems.



From Blind To Bionic: New Technology Enables A Chance At Sight

Slowly watching one's senses fail is a sense of horror unlike any other. Now, visually, this can be somewhat curtailed thanks to the new bionic-eye invention, the Argus II.

Recently implanted with resounding success on blind American Roger Pontz, the Argus II is not perfect, but enables tremendous new capabilities in the visualization of light and dark differentiation. This enables Pontz to identify people, different locations, and sudden changes in environment far more accurately than he had before. As a teenager, Pontz had begun manifesting symptoms of retinitis pigmentosa, where the eye's retinas fail to transmit light patterns to the brain, and at age 40 he was fully blind.

Then, a virtual miracle occurred in the form of the Argus II technology. The Argus II system consists of a video camera mounted in a pair of glasses, which beams images to an small artificial retina implanted at the back of the eye. That retina then communicates the signals with the brain via cell-stimulating electrical pulses.

Although Pontz, the second American to undergo the Argus II implantation, had to relearn how to process visual signals using the new device, he lauded the results. Pontz told CNN, "It's been pretty awesome," he says. "I can tell when my grandson runs around the house, I can tell when people step in front of me, I can tell when my wife had on a white top versus dark bottoms, vice versa. I could follow my mom around on Easter; she had a light top on. Every day it's something small but something different."
Eyes on the prize:  the Argus II's optical elements.