Page 2,600«..1020..2,5992,6002,6012,602..2,6102,620..»

This Mid-Cap Altcoin Is Surging As Most of the Crypto Market Crashes – The Daily Hodl

As the cryptocurrency market experiences an overall drawdown, one mid-cap altcoin is defying the trend.

The two bellwether cryptocurrencies, Bitcoin (BTC) and Ethereum (ETH), are down by around 5% and 10%, respectively, over the past seven days.

But Celo (CELO), a mobile-first platform focused on crypto payments and financial dApps (decentralized applications), has gone against the trend and is up by around 30% over the past week,according to CoinGecko.

CELOs rise amid a market meltdown coincides with the Celo Foundations head of ecosystem growth Xochitl Cazador revealing that the Celo blockchain is recording approximately 500,000 daily transactions.

Cazador also said that the Celo ecosystem now has over 2,000 builders spread across 113 countries.

In late August, leading decentralized finance (DeFi) projects built on Ethereum announced an initiative aimed at taking DeFi to mobile smart devices by incentivizing building on Celo.

The Ethereum DeFi projects in the initiative include Aave (AAVE), Curve (CRV), and Sushi (SUSHI). Over $100 million in educational initiatives, grants, and incentives was also announced.

CELOs recent surge follows another big 2021 milestone. In June, cryptocurrency exchange Coinbase listed CELO on its trading platforms.

At the time, CELO was ranked 122nd by market cap according to CoinGecko. CELO is currently ranked 65th.

Featured Image: Shutterstock/coka

Link:
This Mid-Cap Altcoin Is Surging As Most of the Crypto Market Crashes - The Daily Hodl

Read More..

Polkadot, Avalanche, and Two Additional Altcoins Are the Top Crypto Assets To Watch, Says Trader Jason Pizzino – The Daily Hodl

Crypto strategist and trader Jason Pizzino says hes keeping a close watch on Polkadot (DOT), Avalanche (AVAX) and two more crypto assets as the altcoin markets continue to flash signs of strength.

In a new strategy session, Pizzino tells his 210,000 YouTube subscribers that he expects interoperable blockchain Polkadot to continue surging to around $50 after a brief cooldown period.

One, we want to see consolidation for the move up or two, back [to $28], consolidate, and then the move up. Theyre the options that Im looking for for a positive outcome for a DOT trade.

Looking at smart contract platform Avalanche, Pizzino says that hes waiting for AVAX to consolidate before igniting the next leg up.

If we get the correction lower into previous zones ($45), then it just means that were going to need more time in a consolidation period before we can take off again You want to see the consolidation before the next move. Get in on that breakout. That is a stronger-looking cryptocurrency.

Next up is Cosmos (ATOM), a crypto asset powering an ecosystem of blockchains designed to scale and interoperate with each other. According to the crypto strategist, he wants to see ATOM trade between $30 and $37 before resuming its price expansion.

If we get that nice consolidation, give us some rest period, then we take off again. Were looking sweet. Thats exactly what we want to see.

The last coin on the traders radar is automated market maker SushiSwap (SUSHI). Pizzino says SUSHI must stay above crucial levels to sustain its uptrend.

This is in a reasonable setup, provided we hold these levels, so around $14. Of course, I dont want to see it go lower than $12 and at the very worst, this level here, which is at about $9.50 because that is your higher lows If the lows start to breakdown, then that is considered a downtrend.

I

Featured Image: Shutterstock/Tithi Luadthong

Read more here:
Polkadot, Avalanche, and Two Additional Altcoins Are the Top Crypto Assets To Watch, Says Trader Jason Pizzino - The Daily Hodl

Read More..

Former Gartner Analyst and Cybersecurity Pioneer Joins SessionGuardian’s Advisory Board – PRNewswire

NEW YORK, Sept. 23, 2021 /PRNewswire/ -- SessionGuardian, an industry leader in endpoint security for distributed workforces, announced today that Rob Smith, former Gartner analyst, has joined the company's advisory board.

"We're pleased to welcome Rob to our board," said Jordan Ellington, CEO and Founder of SessionGuardian. "It's an honor to have a globally recognized expert in endpoint and remote security on our team to help us maintain our leading position in the cybersecurity industry."

Mr. Smith currently provides advisory and consulting services to multiple internet security vendors, including SessionGuardian. Previously, he worked at Gartner for eight years. As the senior director analyst, he advised on endpoint security, digital workplace infrastructure and operations, security and risk management, and infrastructure security. With a career spanning 33 years, Mr. Smith has also founded and/or co-founded four companies.

During his initial advisory meetings with SessionGuardian, Mr. Smith identified the company's unique positioning in the cybersecurity landscapeVDI/DaaS endpoint protection. Recognizing the company's ability to prevent breaches through persistent biometric user authentication during remote sessions, their innovative software is theonly product that eliminates uncertainty around who's viewing your data. Mr. Smith now joins the advisory board to help SessionGuardian keep their edge in this emerging tech space.

"I've seen hundreds of cyber security products, and SessionGuardian is the only one that utterly eliminates uncertainty about who is viewing your data. It's a total evolution in data protection for companies with remote workers, and it arrived just in time to combat increasingly sophisticated attacks that MFA alone simply can't defend against. SessionGuardian adds the final layer of security that IT leaders have been demanding," said Mr. Smith.

Mr. Smith's addition to SessionGuardian's advisory board affirms the company's mission to pioneer software solutions that mitigate risk and create limitless opportunity for the evolving global economy.

Visit http://www.sessionguardian.com to learn how SessionGuardian blocks endpoint security threats.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission.

About SessionGuardianSessionGuardian is a software development company with proven success in the endpoint security landscape, with a focus on organizations navigating the risks of a distributed workforce. SessionGuardian pioneered the adoption of persistent biometric technology and offers a preemptive, zero-trust approach to cybersecurity, empowering organizations to operate fearlessly in the evolving global economy.

SOURCE SessionGuardian

http://www.sessionguardian.com

Read the rest here:
Former Gartner Analyst and Cybersecurity Pioneer Joins SessionGuardian's Advisory Board - PRNewswire

Read More..

Does Your Organization Have a Security.txt File? Krebs on Security – Krebs on Security

It happens all the time: Organizations get hacked because there isnt an obvious way for security researchers to let them know about security vulnerabilities or data leaks. Or maybe it isnt entirely clear who should get the report when remote access to an organizations internal network is being sold in the cybercrime underground.

In a bid to minimize these scenarios, a growing number of major companies are adopting Security.txt, a proposed new Internet standard that helps organizations describe their vulnerability disclosure practices and preferences.

An example of a security.txt file. Image: Securitytxt.org.

The idea behind Security.txt is straightforward: The organization places a file called security.txt in a predictable place such as example.com/security.txt, or example.com/.well-known/security.txt. Whats in the security.txt file varies somewhat, but most include links to information about the entitys vulnerability disclosure policies and a contact email address.

The security.txt file made available by USAA, for example, includes links to its bug bounty program; an email address for disclosing security related matters; its public encryption key and vulnerability disclosure policy; and even a link to a page where USAA thanks researchers who have reported important cybersecurity issues.

Other security.txt disclosures are less verbose, as in the case of HCA Healthcare, which lists a contact email address, and a link to HCAs responsible disclosure policies. Like USAA and many other organizations that have published security.txt files, HCA Healthcare also includes a link to information about IT security job openings at the company.

Having a security.txt file can make it easier for organizations to respond to active security threats. For example, just this morning a trusted source forwarded me the VPN credentials for a major clothing retailer that were stolen by malware and made available to cybercriminals. Finding no security.txt file at the retailers site using gotsecuritytxt.com (which checks a domain for the presence of this contact file), KrebsonSecurity sent an alert to its security@ email address for the retailers domain.

Many organizations have long unofficially used (if not advertised) the email address security@[companydomain] to accept reports about security incidents or vulnerabilities. Perhaps this particular retailer also did so at one point, however my message was returned with a note saying the email had been blocked. KrebsOnSecurity also sent a message to the retailers chief information officer (CIO) the only person in a C-level position at the retailer who was in my immediate LinkedIn network. I still have no idea if anyone has read it.

Although security.txt is not yet an official Internet standard as approved by the Internet Engineering Task Force (IETF), its basic principles have so far been adopted by at least eight percent of the Fortune 100 companies. According to a review of the domain names for the latest Fortune 100 firms via gotsecuritytxt.com, those include Alphabet, Amazon, Facebook, HCA Healthcare, Kroger, Procter & Gamble, USAA and Walmart.

There may be another good reason for consolidating security contact and vulnerability reporting information in one, predictable place. Alex Holden, founder of the Milwaukee-based consulting firm Hold Security, said its not uncommon for malicious hackers to experience problems getting the attention of the proper people within the very same organization they have just hacked.

In cases of ransom, the bad guys try to contact the company with their demands, Holden said. You have no idea how often their messages get caught in filters, get deleted, blocked or ignored.

So if security.txt is so great, why havent more organizations adopted it yet? It seems that setting up a security.txt file tends to invite a rather high volume of spam. Most of these junk emails come from self-appointed penetration testers who without any invitation to do so run automated vulnerability discovery tools and then submit the resulting reports in hopes of securing a consulting engagement or a bug bounty fee.

This dynamic was a major topic of discussion in these Hacker News threads on security.txt, wherein a number of readers related their experience of being so flooded with low-quality vulnerability scan reports that it became difficult to spot the reports truly worth pursuing further.

Edwin EdOverflow Foudil, the co-author of the proposed notification standard, acknowledged that junk reports are a major downside for organizations that offer up a security.txt file.

This is actually stated in the specification itself, and its incredibly important to highlight that organizations that implement this are going to get flooded, Foudil told KrebsOnSecurity. One reason bug bounty programs succeed is that they are basically a glorified spam filter. But regardless of what approach you use, youre going to get inundated with these crappy, sub-par reports.

Often these sub-par vulnerability reports come from individuals who have scanned the entire Internet for one or two security vulnerabilities, and then attempted to contact all vulnerable organizations at once in some semi-automated fashion. Happily, Foudil said, many of these nuisance reports can be ignored or grouped by creating filters that look for messages containing keywords commonly found in automated vulnerability scans.

Foudil said despite the spam challenges, hes heard tremendous feedback from a number of universities that have implemented security.txt.

Its been an incredible success with universities, which tend to have lots of older, legacy systems, he said. In that context, weve seen a ton of valuable reports.

Foudil says hes delighted that eight of the Fortune 100 firms have already implemented security.txt, even though it has not yet been approved as an IETF standard. When and if security.txt is approved, he hopes to spend more time promoting its benefits.

Im not trying to make money off this thing, which came about after chatting with quite a few people at DEFCON [the annual security conference in Las Vegas] who were struggling to report security issues to vendors, Foudil said. The main reason I dont go out of my way to promote it now is because its not yet an official standard.

Has your organization considered or implemented security.txt? Why or why not? Sound off in the comments below.

Read the original here:
Does Your Organization Have a Security.txt File? Krebs on Security - Krebs on Security

Read More..

Stop worrying that crims could break the ‘net, say cyber-diplomats only nations have tried – The Register

The Global Commission on the Stability of Cyberspace (GCSC) is worried its guidance on preventing the internet and all it connects becoming a casualty of war is being misinterpreted, perhaps wilfully.

The GCSC works to create global behavioural norms that hopefully find their way into the diplomatic documents that govern nation-states' behaviour. The organisation does so because conventions governing kinetic warfare prohibit attacks on hospitals or schools, but many nations are yet to formalise recognition that information warfare could easily disrupt hospitals. The GCSC therefore wants nations to recognise that information warfare needs rules that match the intent of those governing kinetic conflict.

The Commission has had considerable success in those efforts, having defined eight norms. The first, the Norm on non-interference with the public core of the Internet, seeks to forbid attacks on the Domain Name System, DNSSEC, WHOIS information services, systems operated by the Internet Assigned Numbers Authority and of Regional Internet Registries.

The norm also calls for "naming and numbering protocols themselves and the integrity of the standardization processes and outcomes for protocol development and maintenance" to be off-limits during conflict.

The organisation is pleased with progress towards its goals.

"We are delighted that the concept of the public core of the Internet has been fully integrated in such diverse texts as the Paris Call for Trust and Security in Cyberspace and the Cyber Security Act of the European Union," reads a new statement [PDF] from the group.

But the statement suggests the norm is being misinterpreted.

"Fundamentally we believe that the norm of non-interference with the public core is an issue of governance 'on' the Internet, and primarily a matter of moderating malicious state behaviour, and not an issue of governance 'of' the Internet, and therefore of Internet governance" the statement declares.

"Despite recent attempts to cast the main threat to the public core as resulting from cybercriminals, it is in fact states and their affiliates whose activities pose the greatest risks," the document adds, citing an International Telecommunications Union document that suggests nation-states could guarantee the 'net's safety from a criminal attack.

That document [PDF], submitted by the Russian Federation, suggests that nation states need to safeguard the internet core because the GCSC model doesn't offer a good model for coordinating defenses. The Russian document also suggests criminals are gathering strength with the intention to attack the internet.

The GCSC statement also points out that most internet governance organisations are not run by governments.

"There is nothing in the GCSC norm to suggest that these key elements of the public core are not being well cared for by these actors," the statement adds. "However, no extent of care is sufficient to address an unlimited reservoir of potentially malicious behaviour. As described above, the only evidence of repeat behaviour points to state-affiliated activity, and not cybercrime."

The statement therefore concludes that the GCSC's approach of setting norms for nations regarding the bodies that define, operate, and administer the internet is therefore more appropriate than trying to stop criminals attacking its core.

"Even if governments maintain a de jure monopoly over the legitimate use of force in cyberspace, they no longer have a practical monopoly on attacking and protecting this domain, nor can they prevent the proliferation and use of powerful cyber weapons," the statement declares.

"Rather, the technical community, civil society, and individuals also play a major role in the protection of cyberspace, including the promulgation of standards."

Continued here:
Stop worrying that crims could break the 'net, say cyber-diplomats only nations have tried - The Register

Read More..

HSE was in ‘uniquely vulnerable position’ at time of cyberattack Smyth – The Irish Times

The HSE was in a uniquely vulnerable position at the time it was attacked by cyberhackers, Minister of State Ossian Smyth has said.

He told the Oireachtas communications committee that large healthcare systems, which are under the pressure of life and death situations, are often vulnerable to attack and the HSE had made improvements in its cybersecurity in the run-in to the attack.

However, the combined workloads associated with the pandemic and the vaccine rollout meant it was in a uniquely vulnerable position at the time.

He said two consultants reports are underway into the hack, and they will be published shortly. A Garda investigation, he said, has established when and how the network was compromised, he told Fianna Fil senator Gerry Horkan.

Sinn Fin communications spokesman Darren ORourke said a capacity review of the National Cyber Security Centre (NCSC) a redacted version of which was shared with the committee was a very damning indictment of its capacities. Mr ORourke said it found it was under resourced and overtasked. Mr ORourke also questioned whether it could recruit 20 new staff in 18 months, with Mr Smyth conceding it would be challenging to compete against other states and organisations seeking similarly skilled workers.

Mr Smyth told the committee that a new headquarters for the NCSC is likely to cost in the single digit millions and will take over a full floor of the new Departmental headquarters in Dublins Beggars Bush but not until 2023. Before then, the team is set to move to a temporary facility identified by the Office of Public Works. An internship programme is also underway.

Smyth said the HSE is in a much stronger position when it was hacked compared to its previous readiness on cybersecurity, but that healthcare organisations are innately vulnerable to attack as they are large organisations encompassing multiple different bodies and groups, with people under life-and-death pressure whose attention is not always focused on things like password strength.

You cant say to someone who is trying to save a patients life, you need to have a better password to go and look up a patients file, he said. Financial resourcing for cybersecurity, he said, is not an issue - dismissing it as a red herring. He argued that instead the cultural emphasis placed on it by organisations and the political support for it is key.

He also argued that the ongoing use of outdated software packages on HSE computers - such as Windows 7, which was still in use in the health service at the time of the attack - was not the reason the attack was successful. He said it didnt help but definitely didnt cause the hack to take place, and it would not have been prevented if they had all been upgraded. He said efforts had been made prior to the hack to keep machines running that system off other parts of the network as they werent receiving security patches, but that sometimes they were needed to run older pieces of medical hardware which did not work with newer systems.

Windows 7 is one risk of many and it is not the sole reason this attack happened, he said. Smyth said Ireland wasnt particularly targeted for HSE hack, and that hospitals have been attacked around the world, even countries which have the best cyber defences

Mr Smyth said that new powers of the NCSC were unlikely to include offensive capacity - or the capacity to carry out cyber attacks, but rather having the ability to act defensively and disrupt attacks. He said that there had been a sixfold increase in cyber attacks during the pandemic and, rejecting the suggestion the NCSC was unfit for purpose, he accepted that any organization undergoing such an increase in workload is going to be challenged. However, new people to work in the NCSC could not be magicked out of thin air. Staff at the organization had not reported low morale to him, he said.

He also committed to giving the full capacity review of the NCSC to the committee in the coming weeks.

On budget, he said 7mn is not an issue that is up for dispute, money is not a constraining factor... and I honestly think the money is a red herring. He told the committee that comparisons to the UKs GCHQ budget were not apt, as Ireland had no desire to run a similar scale operation, examining internet, call and email traffic at such a level.

On the hacking of Simon Coveneys phone, he said that it was reported to the NCSC who took it extremely seriously. In no regard was this treated as a trivial manner, he says, and that all the correct statutory measures were taken. Regarding the European Court challenge taken by Graham Dwyer on data protection and retention regarding his original murder conviction, he said that the implications and the outcome are both unknown, but that scenario planning is of course done.

the Oireachtas committee that new legislation providing for intelligence gathering for the NCSC is to be brought forward.

The agency is at the centre of reforms which will involve significant extra resources and manpower being directed at it in the wake of the successful data hack of the HSE earlier this year.

Mr Smyth told the committee on Wednesday that an inter-departmental committee met to consider new legislation that might be needed to strengthen the NCSC.

To empower the NCSC to carry out its necessary functions, it is inevitable that the proposed legislation will provide for intelligence gathering, which will bring with it certain governance requirements as well as requirements on the legislative process, he told the committee.

Officials are working on a consultation over the process which will lead to heads of a Bill being drafted and legislation passing through the Oireachtas before the end of next year, Mr Smyth said.

Applications are to be sought for a new director of the States National Cyber Security Centre this week, with a bumped-up salary of 184,000 attached.

The higher salary, which was approved earlier this year following the HSE data hack, followed criticism over the States failure to fill the position prior to the most damaging cyberattack it ever experienced.

Mr Smyth gave evidence on Wednesday to the Oireachtas communications committee on the future of the NCSC. Committee members were also given access to a redacted version of a consultants report which identified significant shortcomings in the capacities and resources of the NCSC.

Mr Smyth told the committee good progress is being made adding to the headcount for the NCSC, which is set to rise by 20 full-time roles approved earlier this year. That is due to take place within the next 18 months, with headcount to rise to at least 70 within five years. In July, just 25 staff were employed full time at the NCSC.

The Government has approved an extra 2.5 million for this purpose in 2022. Open competitions are being run and civil servants are also being invited to redeploy from other positions into the NCSC, Mr Smyth told committee.

Read the rest here:
HSE was in 'uniquely vulnerable position' at time of cyberattack Smyth - The Irish Times

Read More..

Britney Spears’ dad monitored her phone and internet use: report – National Post

Breadcrumb Trail Links

Her security staff were subsequently asked to put 'parental control' on her iPhone so other people could gain access to her texts, calls, and browser history, according to the Controlling Britney Spears documentary

Author of the article:

National Post Wire Services

WENN

Publishing date:

Britney Spears phone and internet use were monitored by her father, a new documentary has claimed.

The Baby One More Time singer who has been outspoken about wanting Jamie Spears to lose his position as conservator of her affairs reportedly worried her team when she requested a new iPhone.

Her security staff were subsequently asked to put parental control on the device so other people could gain access to her texts, calls, and browser history, according to the Controlling Britney Spears documentary.

Speaking in the film which was released on Friday (Sept. 24) Alex Vlasov, who worked for Black Box Security from 2012 to 2021, said: Britney wanted to get an iPhone and that was a big deal. Everybody was worried.

(My boss) Edan (Yemini) approached me and asked me, Is there any monitoring services for an iPhone that you are aware of? And Im like, What do you mean? And hes like, Well, parental controls. Is there any way you can put parental controls on an iPhone?

And thats when Edan explained to me that Britneys communication is monitored for her own security and protection.

Alex questioned the legality of the request and was told the court were aware of the monitoring of her communications, which eventually led to Britneys phone being cloned onto an iPad, which was kept in a safe.

He continued: (Edan) said, Yes, the court is aware of this. Britneys lawyer is aware of this. This is for her safety. Its for her protection.

And then Robin (Greenhill of Britneys management team at Tri Star Sports & Entertainment Group) came up with the idea of, Why dont we just take an iPad, sign in with an iCloud on there, the same iCloud that Britney would use on her phone, and that would mirror all activity? You would be able to see all messages, all FaceTime calls, notes, browser history, photographs.

Their reason for monitoring was looking for bad influence, looking for potential illegal activity that might happen, but they would also monitor conversations with her friends, with her mum, with her lawyer Sam Ingham. If theres anybody that should be off limits, it should be Britneys lawyer.

Tri Star Sports & Entertainment group branded the allegations false, but Jamies lawyer, Vivian Lee Thoreen, insisted his actions were done with the knowledge and consent of Britney, her court-appointed attorney and/or the court.

Edans lawyer said: Black Box have always conducted themselves within professional, ethical and legal bounds, and they are particularly proud of their work in keeping Ms. Spears safe for many years.

The singers new attorney, Mathew Rosengart, has vowed to fully and aggressively investigate these matters.

He added: Intercepting or monitoring Britneys communications, especially sacrosanct attorney-client communications, represents a shameful and shocking violation of her privacy rights and civil liberties. (CDG/BAN/CDG)

Read this article:
Britney Spears' dad monitored her phone and internet use: report - National Post

Read More..

How to Build a Satellite-Powered, Raspberry Pi Security Camera for Off-the-Grid Locations – Tom’s Hardware

A friend of mine recently had a break in at his cabin up north. He wanted to know if I had any recommendations on technology that could let him keep an eye on things from far away. The only challenge is his cabin is relatively remote, and cell service or internet isnt available in the area. With that in mind, I wanted to design a solution that would keep an eye on things using a Raspberry Pi, a bit of edge computing, and a satellite connection.

For this project Im using the Swarm satellite constellation; its a low cost solution for providing satellite connectivity for internet-of-things devices in remote locations. Where one solution would be to livestream images from a camera using a high-bandwidth connection for off-site processing, this project does on-site processing (edge computing) instead sending only the results, letting us keep this project running for a long time at the low cost of $5 a month. Heres how to build a remote cabin monitoring and alerting system with a Raspberry Pi, a camera, and the Swarm Eval Kit.

Before you get started, get your Raspberry Pi set up. If you havent done this before, see our article on how to set up a Raspberry Pi for the first time or how to do a headless Raspberry Pi install (without the keyboard and screen). For this project, we recommend a headless Raspberry Pi install.

1. Install git. Well need it to download the code from GitHub.

2. Clone the repository to your home directory. This will download all the necessary source code for person detection and communicating with the Swarm tile.

3. Run the make install command to install all project dependencies. This script will take care of installing lower level dependencies, as well as the Python libraries you need for the project to run. The machine learning library were using to detect people is packaged within one of the Python libraries, so it may take a few minutes to install.

4. Connect your Raspberry Pi Camera to the Raspberry Pi and mount it in the desired location.

5. Test your Raspberry Pi Camera by taking a snapshot with the following command.

6. Assemble and register your Swarm Eval Kit using the instructions in the quickstart guide. This will get it connected to the network for transmitting data.

7. Turn on your Swarm Eval Kit system with the button on the side.

8. Set your Raspberry Pi Wi-Fi to the Swarm Evaluation Kit SSID. This will need to be done directly on the pi with an external monitor and keyboard. Any SSH connections to the pi will be dropped when the pi switches to the Swarm SSID.

The easiest way to do this is by using raspi-config (sudo raspi-config), navigating to System Options->WIreless LAN and then entering the Swarm Eval Kits SSID (youll have to find this on another device where it will be swarm-xxxx) and entering a default password of 12345678.

9. Run the application to test it. If the Raspberry Pi is connected to the Swarm Kit successfully, it will send a startup email over the network. Depending on your satellite availability it can take some time to arrive in your inbox; use this pass checker to determine when a satellite will be overhead.

10. Configure the application to run on boot by adding a line to the /etc/rc.local file.

11. Place the Swarm Eval Kit in view of the sky, and mount the Raspberry Pi and camera in your desired location.

When running, the Raspberry Pi will continuously pull images from the camera and check them for the presence of a person. If a person is detected, the Pi will send a message to the Swarm Eval Kit, which will then communicate with a constellation of satellites via VHF. The satellites will relay the message to a downlink, and youll then receive an email indicating a person has been detected. The Pi will also send an email every 24 hours that no people have been detected in order to let you know its still working.

This type of system can also be modified to send more than just person-detection data. Leak detection, fire detection, and any kind of sensor that can communicate with a Raspberry Pi are all possible to send over the network.

Read more here:
How to Build a Satellite-Powered, Raspberry Pi Security Camera for Off-the-Grid Locations - Tom's Hardware

Read More..

When Political Relationship Between Two Countries Turns Confrontational, It Is Impossible To Keep Other Spheres Intact Embassy of the People’s…

On September 22, 2021, Ambassador Qin Gang was invited to attend an online conversation jointly held by The Carter Center and The George H.W. Bush Foundation for US-China Relations and delivered a speech. The Ambassador also answered questions from the participants. The Q&A is as follows:

Q1: How to interpret and handle public mutual criticisms and blaming from China and the US?

A: A very important thing between China and the US is mutual respect. China is open and inclusive. We welcome and readily accept various suggestions or criticisms, as long as they are objective, truthful, well-intentioned and constructive, and we will make improvements according to them. As Chinese Ambassador to the US, a very important job of mine is to communicate and listen. However, we do not accept baseless slander and disinformation. We do not accept condescending lecturing. And we do not accept words or deeds that undermine China's sovereignty, unity and territorial integrity. Citizens must abide by the law. Likewise, countries must abide by the basic norms governing international relations. US law prohibits secession and racial hatred, but why do some Americans want to treat China in this way?

Q2: What is China's reaction to the cooperation between Australia, the UK and the US about nuclear submarines?

A: China has expressed concerns to the US side. Foreign Ministry spokesperson has made it clear. In fact, not only China, but also many other regional countries have stated their concerns and even opposition. The nuclear submarine cooperation between the US, the UK and Australia will intensify arms race, undermine regional peace and stability, and sabotage international nuclear non-proliferation efforts. It is extremely irresponsible. We urge these countries to discard Cold-War zero-sum mentality and narrow-minded geopolitical perception, and not to gang up. Security affairs of the Asia-Pacific should be jointly decided by people in the region, and not be dominated by the Anglo-Saxons. China will closely monitor the developments of the situation.

Q3: What is the role China will play in Asia-Pacific regional economic integration?

A: First, as the world's second biggest economy and the number one trading partner of over 120 countries, especially Asian countries, China has maintained stable economic growth. This is in itself a powerhouse and a source of confidence for the growth of Asian and world economy and trade. China is a strong link in the global supply chain.

Second, China is striving towards common prosperity. It is committed to high-level opening-up. This means it will provide a broader market and greater development opportunities for Asian countries.

Third, China is committed to economic globalization and regional economic integration. We have joined the RCEP (Regional Comprehensive Economic Partnership), and are applying to join the CPTPP (Comprehensive and Progressive Agreement for Trans-Pacific Partnership). We will also upgrade FTA arrangements with the Republic of Korea and Singapore, and speed up negotiations of a China-Japan-ROK FTA. These initiatives will inject strong impetus into regional economic integration of the Asia-Pacific, advance integrated development of regional industrial chain, supply chain and value chain, boost trade and investment, and promote development and prosperity of the Asia-Pacific.

Q4: What are the concrete measures that can be taken by the US and China to promote mutual confidence, especially on the resumption of effective cooperation in educational, scientific and technological fields?

A: China-US relations were seriously damaged during the previous US administration. Our educational, technological and people-to-people exchanges also suffered. Some Americans say Chinese students are spies, and Confucius Institutes are engaging in cultural infiltration. Many Chinese students and scholars have been repatriated, denied visas, interrogated, and harassed for no reason. Scientific and technological exchanges between the two sides have almost been cut off. Educational, technological and cultural exchanges serve the interests of both countries. They are critical for our mutual understanding and trust. Since I assumed office, over 10 American universities and educational institutions have written to me, expressing their hope for continued US-China educational exchanges and cooperation. We hope that the Biden administration will turn this around as soon as possible. I noticed that the US side has recently issued visas to 85,000 Chinese students, but still some Chinese students' applications got rejected. We hope that the US side will do more things to lift the iron curtain between our people, and allow our students, scholars, scientists and artists to talk and work together without fear and obstacles. For example, our scientists could cooperate on major infectious diseases and on climate change. China also welcomes American students to study in China.

Not long ago, President Xi Jinping spoke with President Joe Biden on the phone. They had candid, in-depth and strategic communication and exchanges, sending out positive signals. They have agreed to maintain frequent contact by multiple means and instructed officials at the working level to conduct extensive dialogue, tap the potential of cooperation, effectively manage differences so as to avoid conflict and create conditions for the further development of China-US relations. President Xi stressed that the two sides should advance coordination and cooperation on the basis of respecting each other's core concerns and properly managing differences. To be frank, what I worry about is that the US uses competition to define China-US relations, while competition on the US side often takes the form of confrontation, especially on major issues concerning China's core interests. If this does not change, it will undermine China's efforts to promote our mutual trust and cooperation. There isn't any example in the history of international relations where the political relationship between two countries is in competition or even confrontation but other spheres remain safe and sound.

Q5: At present, non-Chinese citizens need to wait several weeks or even months to get their visas to travel to China for emergent humanitarian reasons. Will the embassy re-consider expediting the processing of such visa at the shortest timeline possible in days? Have the US and China begun discussion on reopening the Consulates in Chengdu and Houston?

A: Due to the pandemic, in-person visa application has been replaced by a mail-in process. This has caused inconveniences to the applicants and affected the processing speed. In July last year, the US suddenly and unilaterally demanded China shut down the Consulate General in Houston. This is against the China-US Consular Convention, international law and basic norms governing international relations. It has seriously damaged China-US relations. Visa applications which used to be processed by Chinese Consulate General in Houston have been transferred to the Embassy, so there has been a sharp increase of workload for us, which makes the processing time somehow longer. Our staff at the Embassy will do their best to speed up. We also hope that visa applicants will provide complete and accurate information as required to avoid hiccups and delays.

Facing the abrupt closure of the Consulate General in Houston, the Chinese side had no choice but to reciprocate and close the US Consulate General in Chengdu. Let the person who tied the bell on the tiger take it off. This is something unilaterally started by the US side, and the US side must act first to resolve it.

Q6: Over the next decades, global issues where the United States and China must work together (global warming, nuclear proliferation, limits on cyber-warfare, and new technologies) will likely become more salient and their solutions more complex. What should be done to ensure that the next generation of US and Chinese diplomats are well equipped to handle these issues?

A: During the telephone conversation between President Xi Jinping and President Biden, President Xi emphasized that with the international community facing many common challenges, China and the US need to show broad vision and shoulder great responsibilities. On the basis of respecting each other's core concerns and properly managing differences, the two countries need to continue their engagement and dialogue to advance coordination and cooperation on major international and regional issues.

On climate change, China and the US must first do their own things well. Both sides have announced their NDC goals, so we must honor our words with real actions. The international community has misgivings about whether the US can fulfill its promises and whether it will flip again.

Both China and the US should practice multilateralism, and safeguard the international system with the UN as the core and the international order based on international law. For example, on nuclear non-proliferation, the US cooperation with Australia on nuclear submarines give people reasons to question their sincerity and ability to honor international responsibilities and obligations, including non-proliferation commitments. If a country likes to talk about safeguarding a rules-based international order, but does not follow the rules set by itself, or only follows them selectively, or keeps flip-flopping, how can you expect other countries to trust this country?

The Internet and other new technologies have enabled progress, but also brought about risks and challenges. The international community must have new norms and standards to regulate them, so as to maximize their pros and minimize their cons. China and the US can negotiate and coordinate in this field. For example, China has put forward a Global Digital Security Initiative. We welcome the response from the US side, so that we can jointly maintain global digital and cyber security.

Q7: The US-China relationship is inching toward the danger of a conflict. What can China unilaterally do to deescalate the tensions in this relationship, so as to avoid conflict and confrontation between the two countries?

A: China has great sincerity in starting up a dialogue with the United States to deescalate the tensions in bilateral relationship. We will continue to work with the US side, as long as there are opportunities for cooperation. However, the cooperation between the two countries must be conducted in the principle of mutual respect. And the United States should not expect China's cooperation in areas where only the US has demand and interests, while neglecting or even undermining China's interests at the same time, in particular on these core issues concerning China's sovereignty and territorial integrity.

Here is the original post:
When Political Relationship Between Two Countries Turns Confrontational, It Is Impossible To Keep Other Spheres Intact Embassy of the People's...

Read More..

Cobie Smulders Learned to Play Impeachments Ann Coulter as the Only One Who Gets to Have a Good Time – Vanity Fair

Despite the 90s nostalgia, the elaborate wigs, and the occasional knowing jokes about the political future to come, Impeachment: American Crime Story is not exactly a fun showit is, after all, the chronicle of a deeply traumatizing time in a young womans life, made with her participation.

But if anyone was having a good time when the Bill Clinton impeachment saga was playing out, it was certainly Ann Coulter. The conservative pundit made her name in the wake of the Clinton scandal with her first book, 1998s High Crimes and Misdemeanors: The Case Against Bill Clinton. And as Impeachment: American Crime Story lays out, she was involved in the conservative efforts to promote Paula Joness lawsuit against the president, meeting nightly with the elves who worked out legal strategies to keep Joness suit going. The shows version of Coulter, played by Cobie Smulders in a mile-long blonde wig and array of skintight dresses, walks into every room armed with zingers and visible disdain for the president. The law lets him slide, the press lets him slide, she says in the shows third episode. Even Nixon was capable of shame. But after this just think what kind of flabby con men will see a path to the White House.

The third episode of Impeachment also finds Coulter at a Washington cocktail party meeting Matt Drudge, sizing him up with the merciless line, Nice hat. Is it serious? On this weeks episode of the Still Watching podcast, Smulders tells Vanity Fairs Katey Rich that she came away from her research on Coulter with the sense that she loves to play with people. I think shes a very intelligent person and I think she likes to play and manipulate situations. And, for whatever reason, she never enters a room without a drink in her hand.

Listen to this weeks episode of Still Watching, in which Katey Rich, Richard Lawson, and Joanna Robinson break down the shows third episode, Not to Be Believed, and look back at the conservative media that was just starting at the time, and remains with us today. Below, find a partial transcript of the Cobie Smulders interview.

You can submit questions to be read on the show to stillwatchingpod@gmail.com, and subscribe to Still Watching at Apple Podcasts or anywhere else you get your podcasts.

Vanity Fair: What are your memories from this period? I think you were fairly young, you were living in Canada, so you might not have been as closely involved in following the story as some other people, but what do you remember from this entire scandal?

Cobie Smulders: Honestly, not much. I think I was still in high school, I was 16, 17. And in Canada, not to say that this story didnt reach Canada, because it certainly did, but I think I got more of my knowledge about it through pop culture, through like the SNL sketches that they did. I knew like the headlines, like I knew about the blue dress, like I have Monica very clearly in my brain from that time from newspapers and magazines, but not understanding the complexity of the story at all.

See the rest here:
Cobie Smulders Learned to Play Impeachments Ann Coulter as the Only One Who Gets to Have a Good Time - Vanity Fair

Read More..