paulgorman.org

< ^ txt

Mon Dec 21 06:00:01 EST 2020 ======================================== Slept from midnight to seven-thirty without waking. Cloudy. Snow likely late in the morning. Snow, possibly mixed with rain in the afternoon. Accumulations less than an inch. Near steady temperature in the mid 30s. South winds up to 10 mph. Chance of precipitation 80 percent. Winter solstice! https://ebiten.org/ > Ebiten (/ebíteɴ/) is an open source game library for the Go programming language. Ebiten's simple API allows you to quickly and easily develop 2D games that can be deployed across multiple platforms. Worked more on Gneto, my Gemini to HTTP proxy. https://www.3dprintingmedia.network/3d-printing-boats-is-becoming-standard-practice/ > A new project just published by Emil Johansson, Research Scientist Additive Manufacturing at RISE Research Institutes of Sweden, demonstrated a functional fully 3D printed boat (shown in the video above). This is the latest of a long string of projects that has shown how new large-format extrusion systems—either based on cartesian or multi-axis robotic architectures—are making the process of 3D printing boats a fairly standardized (or, at least, standardizable) practice. > In this application case, the researchers tested a 3D printed motorboat on the Swedish west coast in the middle of December, while live-streaming the event. The 3D printed boat handled the water perfectly. > While the continuous fiber extrusion process may still be a bit farther away in terms of achieving the necessary cost-efficiency and speed, chopped fiber composite extrusion systems have now been shown to be more than effective in printing very large structures, such as boat hulls, in a single run. This is a gigantic achievement and it now seems pretty clear that this will become a more widely adopted technology in the boat manufacturing industry in the years to come. > Another large format cartesian 3D printing manufacturer, Thermwood, has demonstrated this by 3D printing several sections from a 51-foot long yacht hull mold to show how a single hull mold may be sufficient to manufacture even larger vessels, such as yachts. The printed sections of the test mold were made of carbon fiber reinforced ABS from Techmer PM. In this case, ABS was chosen because of its physical properties and relatively low cost compared to other reinforced thermoplastics. https://arstechnica.com/information-technology/2020/12/russias-hacking-frenzy-is-a-reckoning/ https://www.gao.gov/assets/720/711266.pdf > Dependence on the global supply chain can significantly limit federal agencies’ visibility into, understanding of, and control over how the technology they acquire is developed, distributed, and deployed. Agencies’ understanding of the procedures and practices used to ensure the integrity, security, resilience, and quality of ICT products and services can also be limited. Typically, an acquirer (such as a federal agency) will only know about the participants directly connected to it in the supply chain. For example, a program office at a federal agency may rely on a prime contractor to acquire, develop, and maintain an information system. In turn, the prime contractor may obtain the equipment, software, and services that constitute the system through various means, including the reuse of existing equipment or legacy software; outsourcing of system development to an additional supplier; development of the capability in- house; or acquisition of the capability directly from a supplier or commercial off-the-shelf vendor, 9 or through open source 10 means. > Supply chains are being targeted by increasingly sophisticated and well- funded threat actors, 13 including leading foreign cyber threat nations such as Russia, China, Iran, and North Korea. 14 Attacks by such entities are often especially sophisticated and difficult to detect. In addition, threat actors attack all tiers of the supply chain and at each phase of the system development life cycle and, thus, pose significant risk to federal agencies. 15 > The following are examples of attacks carried out using counterfeit products: > • A major software company in the United States investigated counterfeit software and found malware 20 preinstalled on 20 percent of the devices they tested. The malware was installed on new desktops and laptop computers after these products had been shipped from a factory to a distributor, transporter, or reseller. 21 > • A U.S. citizen imported and resold thousands of counterfeit integrated circuits from China and Hong Kong to customers that included contractors for the Department of Defense. 22 The contractors were supplying the circuits to the U.S. Navy for use in nuclear submarines. 23 > In addition, threat actors can substitute genuine products with counterfeit or genuine products that have been tampered with to include malicious functionality. For example: > • A manufacturer in the United States sourced firmware for its cell phones from a foreign company. This firmware was designed to make encrypted records of the cell phones’ call and text histories, phone details, and contact information. The data were then transmitted to a foreign server every 72 hours. 24 > • A factory that manufactured switches 25 for a company in the United States installed malicious logic into memory storage devices during production that could compromise systems and spread malware across a computer network. 26 > For example, agency 10 used an automated tool to provide insights into the agency’s existing supply chain. The tool leveraged artificial intelligence and an underlying algorithm to analyze, among other things, publicly available information about suppliers (company and product), including company summaries. The tool also provided real-time alerts for specific suppliers within the agency’s environment. An AI read company summaries to evaluate supply chain risk? Well, that sounds like hokum. > Officials in agency 11’s Office of the CIO stated that they did not identify their supply chain maps and, as of February 2020, did not have plans to do so. These officials also stated that they had limited insight into subordinate suppliers, including their parts and locations (i.e., transportation networks and distribution centers), and that any such data on these suppliers would quickly become out-of-date. Jeez. https://news.ycombinator.com/item?id=25483693 https://speps.fr/articles/torus-trooper-part1/ https://torustrooper.xyz/ I like shoot em' ups. Ed was relieved when I told him Russia was responsible for the supply-chain attack rather than China. He considers Russia essentially a non-threat to the United States compared to China. I disagree. Russia is only a lesser threat than China to the extent the United States has shifted it's foreign policy focus from eastern Europe to the Pacific. Certainly, Russia posses less threat than China in terms of economic and conventional military might. Also, Russia's foreign policy objectives are likely more modest than China's. However, over (at least) the last five years, Russia has learned they can advance their foreign policy goals through softer power — propaganda, cyber operations, and traditional espionage. With these methods, they kept their adversaries (including the United Stated) sufficiently off balance to prevent or forestall effective counters to their moves. Russia faced, for example, no significant consequences to their aggression in Crimea or Putin officially ensconcing himself as ruler for life. If these moves are not troubling enough, see the above GAO comment about supply chain attacks against U.S. nuclear submarine components. Russia is the new Ottoman Empire. Chatted with Mom for a couple minutes. Twenty-minute walk. Overcast, damp. Chatted with Jay and Ed on Signal a bit. Hmm, maybe I need to rethink the tone of my megadungeon. Somewhat inspired by MÖRK BORG, maybe a 70's Satanic phantasmagoria would be fun, rather than a 50's Plan 9 From Outer Space vibe. Heard and liked Monkeyland by The Chameleons on TildeRadio. https://en.wikipedia.org/wiki/The_Chameleons https://www.youtube.com/watch?v=I0REiSMcEec Servings: grains 7/6, fruit 1/4, vegetables 2/4, dairy 1/2, meat 2/3, nuts 0/0.5 Breakfast: cheese curls Brunch: banana, coffee Lunch: wrap with sausage, egg, avocado, and tomatoes Dinner: curry (from a jar) and noodles with onion and pepper, mint tea

< ^ txt