Astronomers Just Found a Star Orbiting a Black Hole at 1 Percent the Speed of Light

ScienceAlert - ‎5 hours ago

Astronomers Just Found a Star Orbiting a Black Hole at 1 Percent the Speed of Light

The closest we've seen a star get to a black hole.
MIKE MCRAE
15 MAR 2017
Astronomers have just spotted a star whizzing around a vast black hole at about 2.5 times the distance between Earth and the Moon, and it takes only half an hour to complete one orbit.
To put that into perspective, it takes roughly 28 days for our Moon to do a single lap around our relatively tiny planet at speeds of 3,683 kilometres (2,288 miles) per hour, meaning this star is moving at some mind-boggling, break-neck speeds.
Using data from an array of deep space telescopes, a team of astronomers have measured the X-rays pouring from a binary star system called 47 Tuc X9, which sits in a cluster of stars about 14,800 light-years away.
The pair of stars aren't new to astronomers - they were identified as a binary system way back in 1989 - but it's now finally becoming clear what's actually going on here.
"For a long time, it was thought that X9 is made up of a white dwarf pulling matter from a low mass Sun-like star," said researcher Arash Bahramian.
When a white dwarf pulls material from another star, the system is described as a cataclysmic variable star. But back in 2015, one of the objects was found to be a black hole, throwing that hypothesis into serious doubt.
Data from Chandra has confirmed large amounts of oxygen in the pair's neighbourhood, which is commonly associated with white dwarf stars. But instead of a white dwarf ripping apart another star, it now seems to be a black hole stripping the gases from a white dwarf.
White dwarfs are super dense objects that are usually the remnants of a star - think of something with the mass of our Sun but only as big as our planet - so pulling material from its surface would require some impressive gravity.
"We think the star may have been losing gas to the black hole for tens of millions of years and by now has now lost the majority of its mass," said researcher James Miller-Jones from Curtin University and the International Centre for Radio Astronomy Research.
The real exciting news, however, is regular changes in the X-rays' intensity suggest this white dwarf takes just 28 minutes to complete an orbit, making it the current champion of cataclysmic dirty dancers.
"Prior to this discovery, the closest star around any likely black hole was a system known as MAXI J1659-152, which is in an orbit with a 2.4-hour period," said Miller-Jones.
"If the likely black holes in both systems have similar masses, this would imply an orbit three times larger in physical size than the one we found in X9."
To put it in perspective, the distance between the two objects in X9 is about 1 million kilometres (about 600,000 miles), or about 2.5 times the distance from here to the Moon.
Crunching the numbers, that's a journey of roughly 6.3 million kilometres (about 4 million miles) in half an hour, giving us a speed of 12,600,000 km/hr (8,000,000 miles/hr) - about 1 percent of the speed of light.
As exciting as those figures are, the research has yet to be peer-reviewed, with the paper awaiting feedback from the physics community on the pre-publish website arXiv.org. But it's already gaining interest in the field.
"Finding these rare black holes is important, as they are not only the end points of massive stars, produced in supernova explosions, they also continue to play a role in the evolution of other stars after their deaths," Geraint Lewis from the University of Sydney told Marcus Strom at The Sydney Morning Herald.
Our two star-crossed lovers aren't fated to collapse into each other's arms any time soon, at least, with the dance looking like it will continue without the white dwarf falling into the black hole or being ripped apart.
In fact, if anything, it seems the two objects were even closer together in the past and orbiting even faster.
For the black hole to overcome the white dwarf's own intense gravity, the bodies need to be fairly close together. Over time, as material is stripped away, the now-lighter white dwarf would slip a little further back.
"Eventually so much matter may be pulled away from the white dwarf that it ends up only having the mass of a planet," said researcher Craig Heinke. "If it keeps losing mass, the white dwarf may completely evaporate."
That's good news for future scientists keen to study gravitational waves; while the current technology used by the Laser Interferometer Gravitational-Wave Observatory isn't able to spot the slow pulses emitted by X9, it's not out of the question that progress in that field will one day allow us to detect lower frequency waves.
Of course, by then we might have found a new king and queen of cataclysmic variable stars, spinning the night away at even faster speeds.
This research was published in arXiv.org.
.









PIN and passcode -imperfect science

Frightening new way thieves can steal your PIN and passcode in seconds

Komando - ‎11 hours ago‎
Criminals are always looking for new ways to rip us off. Whether it's ransomware, phishing attacks or ATM skimmers, we constantly need to be on the lookout to stay protected.
Smartphone PIN Can Be Extracted From Heat Traces Of Fingers
Scam can steal your PIN code in seconds, say scientists

How thieves can steal your PIN

Researchers have discovered that covering your hand while typing in your PIN code isn't a secure enough procedure. That's because some high-tech thieves are using thermal cameras to steal your PIN.
How this works is, once you type in your PIN code, a thief can take a picture of the heat marks left behind on the screen with a thermal camera. They are then able to figure out the order that you typed the numbers in by the strength of the heat marks. The last number you enter will show up stronger and the first number will be lighter.
Image: Example of how criminals can steal your PIN using thermal cameras. (Source: University of Stuttgart)
This doesn't only expose the PIN code to unlock your phone either. Thieves can use this technique anywhere you type your credit or debit card PIN, such as a grocery store, gas station or ATM.
Researchers at the University of Stuttgart studied this technique of stealing PIN codes. They found that they were able to successfully decipher a users' PIN 90 percent of the time if the thermal image was captured in 15 seconds or less from the time the PIN was entered.
It's even worse for Android users. The researchers were able to figure out the correct pattern 100 percent of the time for those who use a finger-drawn pattern code. They even had more time to take the thermal image, up to 30 seconds after the pattern was drawn.
Watch the following video from a YouTuber demonstrating how simple it is for a thief to take a thermal image of a PIN.

How thieves can steal your PIN

Researchers have discovered that covering your hand while typing in your PIN code isn't a secure enough procedure. That's because some high-tech thieves are using thermal cameras to steal your PIN.
How this works is, once you type in your PIN code, a thief can take a picture of the heat marks left behind on the screen with a thermal camera. They are then able to figure out the order that you typed the numbers in by the strength of the heat marks. The last number you enter will show up stronger and the first number will be lighter.
Image: Example of how criminals can steal your PIN using thermal cameras. (Source: University of Stuttgart)
This doesn't only expose the PIN code to unlock your phone either. Thieves can use this technique anywhere you type your credit or debit card PIN, such as a grocery store, gas station or ATM.
Researchers at the University of Stuttgart studied this technique of stealing PIN codes. They found that they were able to successfully decipher a users' PIN 90 percent of the time if the thermal image was captured in 15 seconds or less from the time the PIN was entered.
It's even worse for Android users. The researchers were able to figure out the correct pattern 100 percent of the time for those who use a finger-drawn pattern code. They even had more time to take the thermal image, up to 30 seconds after the pattern was drawn.
Watch the following video from a YouTuber demonstrating how simple it is for a thief to take a thermal image of a PIN.

How to protect your PIN code

The researchers that discovered this PIN stealing possibility have a very simple solution to stop thieves from getting your code. Here are their suggestions:
  • Smartphone - Simply place your hand on the display screen after entering your PIN. This should remove all thermal traces.
  • Point-of-sale (POS) - When typing your PIN at locations such as a grocery store, gas station or ATM, place a few fingers on buttons that are not part of your code. Hold them there while you type your PIN in and leave them there for a few seconds after. This should make the digits that show up on an infrared picture useless to the scammer. They will not be able to figure out which buttons are actually part of the PIN and which were decoys.
Having a thief steal your PIN code by itself isn't a great danger to you. However, if they have installed a skimmer on a POS and get your PIN, your bank account is in serious trouble.
If it's the PIN to your phone, the thief would need to get their hands on it to cause problems. This is why you should never leave your gadget where someone can take it without your knowledge. Don't leave it on your desk at work, or anywhere for that matter, if you need to leave the room for any purpose.
Note: If you are reading this article using the Komando.com App, click here to watch the demonstration video.





remote hacking of electronic voting machine and democracy/WIKI LEAKS/CIA/

Electronic voting in India - Wikipedia

https://en.wikipedia.org/wiki/Electronic_voting_in_India
Electronic Voting Machines ("EVM") are being used in Indian General and State Elections to ... An EVM consists of two units, control unit and balloting unit.

CIA Warning: 'E-Voting Not Secure' - U.S. EAC Finally Releases ...

www.bradblog.com/?p=7021
Mar 27, 2009 - CIA Warning: 'E-Voting Not Secure' - U.S. EAC Finally Releases Complete ... of his complete control of the voting machines and their infrastructure, that .... machines can be interrogated electronically remotely on Election Day.

How can Electronic Voting Machines EVM be manipulated Part 1

www.e-pao.net › news section › 10th Manipur Legislative Assembly Election 2012
Apr 1, 2012 - India's Electronic Voting Machines (EVMs) have two main components (1) ... The system is powered by a battery pack inside the control unit.

Elections: How an Electronic Voting Machine Works - News18

www.news18.com/.../noida-up-uttar-pradesh-elections-how-an-electronic-voting-mac...
Feb 11, 2017 - The voting machines used in India are a combination of two components. ... the election process is not hindered even in the remote areas of the ... The results acquired by an EVM's control unit are not transmitted electronically.
Ans. An Electronic Voting Machine consists of two Units – a Control Unit and a Balloting Unit – joined by a five-meter cable. The Control Unit is with the Presiding ...

[PDF]Security Analysis of India's Electronic Voting Machines

https://indiaevm.org/evm_tr2010.pdf
by HK Prasad - ‎2010 - ‎Cited by 93 - ‎Related articles
Apr 29, 2010 - In this paper, we present a security analysis of a real Indian EVM .... off, and the control unit emits a loud beep to indicate that the vote has been cast. ..... Our solution is to keep the radio off until the display is blank, as it is ...

[PDF]Remote (Internet) Voting in Digital India - National Voter's Service Portal

www.nvsp.in/rvote/presentation/sarat_chandar_babu.pdf
Jul 21, 2015 - Indian Scenario. Various Stages ... Electronic Voting Machines (EVM) ... Remote control of client computer (Open source Back Orifice 2000).

[PDF]KNOW YOUR ELECTRONIC VOTING MACHINE

documents.gov.in/central/11946.pdf
When was the EVM introduced in India? ... register of voters in Form 17-A. The display system of the control unit shows the total .... is a stand alone machine which can not be connected to any network and controlled through network or remote.

Wikileaks Unveils 'Vault 7': "The Largest Ever Publication Of ...

www.zerohedge.com/.../wikileaks-hold-press-conference-vault-7-release-8am-eastern
3 days ago - Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' ... Wikileaks claims that the CIA lost control of the majority of its hacking .... parties and candidates in the lead up to the 2012 presidential election.

Frankfurt used as remote hacking base for the CIA: WikiLeaks ...

www.dw.com/en/frankfurt-used-as-remote-hacking...cia-wikileaks/a-37841830
3 days ago - WikiLeaks documents reveal CIA agents were given cover identities and diplomatic ... day' exploits, malware remote control systems and associated documentation." ... Experts warn of election cyberattacks threat in Germany.

WikiLeaks claims to expose CIA's ability to 'weaponise' smartphones ...

www.smh.com.au › Politics › Opinion
4 days ago - WikiLeaks claims the CIA has software that enables it to bypass encrypted ... CIA has been trying to be able to remotely control vehicles so they could .... May lost an important vote in the House of Lords which voted to give the ...
4 days ago - THE CIA looked at developing a system that could potentially assassinate vehicle drivers remotely by 'infecting vehicle control systems', the Wikileaks organisation ... Will Trump pardon Assange after WikiLeaks election help?

WikiLeaks: The CIA Can Hack Cars For "Undetectable Assassinations ...

https://milo.yiannopoulos.net/2017/03/wikileaks-cia-hack-cars/
4 days ago - The related portion of WikiLeaks' official press release on the leak reads: ... #CIA has tools to remote control chips in cars, trucks, planes ...

WikiLeaks Claims CIA Lost Control of 'Hacking Arsenal' - Breitbart

www.breitbart.com/tech/2017/03/.../wikileaks-claims-cia-lost-control-hacking-arsenal/
4 days ago - Explosively, WikiLeaks also claims that the CIA has lost control of their ... malware remote control systems and associated documentation.

WikiLeaks: The CIA Can Covertly Activate Your Mobile Device's ...

www.breitbart.com/tech/2017/03/07/cia-can-spy-virtually-device-even-switched-off/
4 days ago - According to the WikiLeaks, dump, the CIA has lost control of much of its ... malware remote control systems and associated documentation.

What the WikiLeaks CIA files say about your car - The Washington Post

https://www.washingtonpost.com/.../what-we-know-about-car-hacking-the-cia-and-those...
3 days ago - What we know about car hacking, the CIA and those WikiLeaks claims ... taking control of the device remotely and amplifying its signal, Wired ...

Wikileaks: CIA Explored Car Hacking to Carry Out "Undetectable ...

https://www.infowars.com/wikileaks-cia-explored-car-hacking-to-carry-out-undetecta...
4 days ago - Wikileaks: CIA Explored Car Hacking to Carry Out “Undetectable ... “As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern .... I never again will vote for a career politicians unless its someone ... It may not be able to be fully steered and controlled via remote, but ...

 

Diebold voting machines can be hacked by remote control - Salon.com

www.salon.com/2011/09/27/votinghack/
Sep 27, 2011 - Exclusive: A laboratory shows how an e-voting machine used by a third of all voters can be easily manipulated.

How I Hacked An Electronic Voting Machine | Popular Science

www.popsci.com/gadgets/article/2012-11/how-i-hacked-electronic-voting-machine
Nov 5, 2012 - A simple non-cyber attack on an electronic voting machine ... If you wanted a deluxe version where you can control it remotely from a half a mile ..

E-voting machines vulnerable to remote vote changing - CNET

https://www.cnet.com/news/e-voting-machines-vulnerable-to-remote-vote-changing/
Sep 28, 2011 - E-voting machines vulnerable to remote vote changing ... electronically, the remote hijacker could use a Radio Frequency remote control to ...
Sep 19, 2011 - Uploaded by TheBRADBLOG
A disturbing new attack on a Diebold touch-screen voting system, ...

Electronic voting in India - Wikipedia

https://en.wikipedia.org/wiki/Electronic_voting_in_India
Electronic Voting Machines ("EVM") are being used in Indian General and State Elections to ... An EVM consists of two units, control unit and balloting unit.

How can Electronic Voting Machines EVM be manipulated Part 1

www.e-pao.net › news section › 10th Manipur Legislative Assembly Election 2012
Apr 1, 2012 - India's Electronic Voting Machines (EVMs) have two main components (1) ... The system is powered by a battery pack inside the control unit.

Elections: How an Electronic Voting Machine Works - News18

www.news18.com/.../noida-up-uttar-pradesh-elections-how-an-electronic-voting-mac...
Feb 11, 2017 - The voting machines used in India are a combination of two components. ... the election process is not hindered even in the remote areas of the ... The results acquired by an EVM's control unit are not transmitted electronically.
Ans. An Electronic Voting Machine consists of two Units – a Control Unit and a Balloting Unit – joined by a five-meter cable. The Control Unit is with the Presiding ...

[PDF]Security Analysis of India's Electronic Voting Machines

https://indiaevm.org/evm_tr2010.pdf
by HK Prasad - ‎2010 - ‎Cited by 93 - ‎Related articles
Apr 29, 2010 - In this paper, we present a security analysis of a real Indian EVM .... off, and the control unit emits a loud beep to indicate that the vote has been cast. ..... Our solution is to keep the radio off until the display is blank, as it is ...

[PDF]Remote (Internet) Voting in Digital India - National Voter's Service Portal

www.nvsp.in/rvote/presentation/sarat_chandar_babu.pdf
Jul 21, 2015 - Indian Scenario. Various Stages ... Electronic Voting Machines (EVM) ... Remote control of client computer (Open source Back Orifice 2000).

[PDF]KNOW YOUR ELECTRONIC VOTING MACHINE

documents.gov.in/central/11946.pdf
When was the EVM introduced in India? ... register of voters in Form 17-A. The display system of the control unit shows the total .... is a stand alone machine which can not be connected to any network and controlled through network or remote."Man-in-the-Middle" Remote Attack on ...