Random Articles (Page 343)

Have a deep view into what people are curious about.

πŸ”— Through-the-Earth Mine Communications

πŸ”— Telecommunications

Through-the-Earth (TTE) signalling is a type of radio signalling used in mines and caves that uses low-frequency waves to penetrate dirt and rock, which are opaque to higher-frequency conventional radio signals.

In mining, these lower-frequency signals can be relayed underground through various antennas, repeater or mesh configurations, but communication is restricted to line of sight to these antenna and repeaters systems.

Discussed on

πŸ”— Streisand Effect

πŸ”— Internet πŸ”— Internet culture πŸ”— Business πŸ”— Politics πŸ”— Sociology

The Streisand effect is a social phenomenon that occurs when an attempt to hide, remove, or censor information has the unintended consequence of further publicizing that information, often via the Internet. It is named after American entertainer Barbra Streisand, whose attempt to suppress photographs of her residence in Malibu, California inadvertently drew further attention to it in 2003.

Attempts to suppress information are often made through cease-and-desist letters, but instead of being suppressed, the information receives extensive publicity, as well as media extensions such as videos and spoof songs, which can be mirrored on the Internet or distributed on file-sharing networks.

The Streisand effect is an example of psychological reactance, wherein once people are aware that some information is being kept from them, they are significantly more motivated to access and spread that information.

Discussed on

πŸ”— Domain tasting

πŸ”— Internet πŸ”— Marketing & Advertising

Domain tasting is the practice of temporarily registering a domain under the five-day Add Grace Period at the beginning of the registration of an ICANN-regulated second-level domain. During this period, a registration must be fully refunded by the domain name registry if cancelled. This was designed to address accidental registrations, but domain tasters use the Add Grace Period for illegal purposes.

Discussed on

πŸ”— Sensorvault

Sensorvault is an internal Google database that contains records of users' historical geo-location data.:β€Š1β€Š

It has been used by law enforcement to obtain a geo-fence warrant and to search for all devices within the vicinity of a crime, (within a geo-fenced area):β€Š1β€Š:β€Š1β€Š and after looking at those devices' movements and narrowing those devices down to potential suspects or witnesses, then asking Google for the information about the owners of those devices.:β€Š1β€Š:β€Š1β€Š

Discussed on

πŸ”— Domain Fronting

πŸ”— Internet πŸ”— Computing πŸ”— Computing/Computer Security πŸ”— Computing/Websites πŸ”— Computing/Networking

Domain fronting is a technique for Internet censorship circumvention that uses different domain names in different communication layers of an HTTPS connection to discreetly connect to a different target domain than is discernable to third parties monitoring the requests and connections.

Due to quirks in security certificates, the redirect systems of the content delivery networks (CDNs) used as 'domain fronts', and the protection provided by HTTPS, censors are typically unable to differentiate circumvention ("domain-fronted") traffic from overt non-fronted traffic for any given domain name. As such they are forced to either allow all traffic to the domain frontβ€”including circumvention trafficβ€”or block the domain front entirely, which may result in expensive collateral damage and has been likened to "blocking the rest of the Internet".

Domain fronting does not conform to HTTP standards that require the SNI extension and HTTP Host header to contain the same domain. Many large cloud service providers, including Amazon, Microsoft, and Google, actively prohibit domain fronting, which has limited it as a censorship bypass technique. Pressure from censors in Russia and China is thought to have contributed to these prohibitions, but domain fronting can also be used maliciously.

A newer variant of domain fronting, domain hiding, passes an encrypted request for one resource (say, a website), concealed behind an unencrypted (plaintext) request for another resource whose DNS records are stored in the same cloud. It has much the same effect. Refraction networking is an application of the broader principle.

πŸ”— Yoda conditions

πŸ”— Computing πŸ”— Computing/Software πŸ”— Star Wars

In programming jargon, Yoda conditions (also called Yoda notation) is a programming style where the two parts of an expression are reversed from the typical order in a conditional statement. A Yoda condition places the constant portion of the expression on the left side of the conditional statement. The name for this programming style is derived from the Star Wars character named Yoda, who speaks English with a non-standard syntax.

Yoda conditions are part of the Symfony, and the WordPress coding standards.

Discussed on

πŸ”— Atomic gardening

πŸ”— Agriculture πŸ”— Food and drink πŸ”— Plants πŸ”— Horticulture and Gardening πŸ”— Genetics

Atomic gardening is a form of mutation breeding where plants are exposed to radioactive sources, typically cobalt-60, in order to generate mutations, some of which have turned out to be useful.

The practice of plant irradiation has resulted in the development of over 2000 new varieties of plants, most of which are now used in agricultural production. One example is the resistance to verticillium wilt of the "Todd's Mitcham" cultivar of peppermint which was produced from a breeding and test program at Brookhaven National Laboratory from the mid-1950s. Additionally, the Rio Star Grapefruit, developed at the Texas A&M Citrus Center in the 1970s, now accounts for over three quarters of the grapefruit produced in Texas.

Discussed on

πŸ”— Piri Reis Map

πŸ”— Maps πŸ”— Turkey πŸ”— Paranormal

The Piri Reis map is a world map compiled in 1513 by the Ottoman admiral and cartographer Piri Reis (pronounced [piːˈɾiː ɾeis]). Approximately one third of the map survives; it shows the western coasts of Europe and North Africa and the coast of Brazil with reasonable accuracy. Various Atlantic islands, including the Azores and Canary Islands, are depicted, as is the mythical island of Antillia and possibly Japan.

The map's historical importance lies in its demonstration of the extent of global exploration of the New World by approximately 1510, and in its claim to have used a map of Christopher Columbus, otherwise lost, as a source. Piri also stated that he had used ten Arab sources and four Indian maps sourced from the Portuguese. More recently, the map has been the focus of claims for the pre-modern exploration of the Antarctic coast.

The Piri Reis map is in the Library of the TopkapΔ± Palace in Istanbul, Turkey, but is not usually on display to the public.

Discussed on

πŸ”— Zombie Zero

πŸ”— Computer Security πŸ”— Computer Security/Computing

Zombie Zero is an attack vector where a cyber attacker utilized malware that was clandestinely embedded in new barcode readers which were manufactured overseas.

It remains unknown if this attack was promulgated by organized crime or a nation state. Clearly there was significant planning and investment in order to design the malware, and then embed it into the hardware within the barcode scanner. Internet of things (IoT) devices may be similarly preinstalled with malware that can capture the network passwords and then open a backdoor to attackers. Given the high volume of these devices manufactured overseas high caution is to be exercised before placing these devices on corporate or government networks.

Discussed on

πŸ”— Kakistocracy

πŸ”— Politics

A kakistocracy [kΓ¦kΙͺ'stΙ‘krΙ™si] is a system of government that is run by the worst, least qualified, and/or most unscrupulous citizens. The word was coined as early as the seventeenth century, but gained significant use in the first decades of the 20th century to criticize populist governments emerging in different democracies around the world.

Discussed on