Archive for July, 2015

A $4 Billion Renovation Won’t Fix LaGuardia’s Awful Delays

LaGuardia’s new $4 billion renovation will look great, but it won’t fix the airport’s biggest problem: delayed flights.

The post A $4 Billion Renovation Won’t Fix LaGuardia’s Awful Delays appeared first on WIRED.

Go to Source

Facebook has made significant progress in a project to build solar-powered drones that can deliver Internet connectivity using a mix of lasers and radio signals, CEO Mark Zuckerberg announced yesterday.

“I’m excited to announce we’ve completed construction of our first full scale aircraft, Aquila, as part of our effort,” Zuckerberg wrote. “Aquila is a solar powered unmanned plane that beams down Internet connectivity from the sky. It has the wingspan of a Boeing 737, but weighs less than a car and can stay in the air for months at a time. We’ve also made a breakthrough in laser communications technology. We’ve successfully tested a new laser that can transmit data at 10 gigabits per second. That’s ten times faster than any previous system, and it can accurately connect with a point the size of a dime from more than 10 miles away.”Obviously, that 10Gbps would be shared among multiple users, but it could connect a lot of people to the Internet.

The network will operate similarly to Google’s Project Loon. While Loon uses balloons instead of drones, the aircraft in both networks distribute signals to each other to increase range.

Read 6 remaining paragraphs | Comments

Computer scientists have devised an attack on the Tor privacy network that in certain cases allows them to deanonymize hidden service websites with 88 percent accuracy.

Such hidden services allow people to host websites without end users or anyone else knowing the true IP address of the service. The deanonymization requires the adversary to control the Tor entry point for the computer hosting the hidden service. It also requires the attacker to have previously collected unique network characteristics that can serve as a fingerprint for that particular service. Tor officials say the requirements reduce the effectiveness of the attack. Still, the new research underscores the limits to anonymity on Tor, which journalists, activists, and criminals alike rely on to evade online surveillance and monitoring.

“Our goal is to show that it is possible for a local passive adversary to deanonymize users with hidden service activities without the need to perform end-to-end traffic analysis,” the researchers from the Massachusetts Institute of Technology and Qatar Computing Research Institute wrote in a research paper. “We assume that the attacker is able to monitor the traffic between the user and the Tor network. The attacker’s goal is to identify that a user is either operating or connected to a hidden service. In addition, the attacker then aims to identify the hidden service associated with the user.”

Read 6 remaining paragraphs | Comments

Snap, yak and stay on track: six smart toys for the essential collegian.

The more time we spend swimming in digital waters, the shallower our cognitive capacity becomes and the less control we have of our attention.

 Page 4 of 22  « First  ... « 2  3  4  5  6 » ...  Last »