TL;DR summary of stories on the internet
The CIA’s mind-control programs are connected to experiments on returning Korean War POWs in an untold history that is revealed in this article. Through extensive collaboration between CIA officials from Projects Bluebird, Artichoke and MKULTRA with U.S. biological warfare efforts, including the “processing” of high-ranking POWs who confessed to U.S. use of biological weapons, the […]
Read more »
A study involving 18 epileptic patients has discovered that providing electrical stimulation to two particular areas of the brain during non-REM sleep can improve memory recall. Dr Itzhak Fried, a professor of neurosurgery at the University of California, Los Angeles, says some patients “improved by 10% or 20%; some improved by 80%”. The study’s findings […]
Self-driving cars may have faced setbacks in recent years, but some well-funded projects have continued to push for progress, according to journalist Alex Roy. Google offshoot Waymo and Cruise, backed by General Motors, are testing autonomous vehicles in Phoenix and San Francisco, with both expecting to expand service in the coming months. Cruise also plans […]
In this in-depth blog post, the author explores the various methods used in GPS positioning systems. They begin by explaining the simple method of positioning using just three reference points, and move onto using drones and even sound waves to measure distance. The author then delves into the challenges that arise when adding a third […]
Internal corporate documents reveal that chemical giant Syngenta may have attempted to influence scientific research regarding the links between its top-selling paraquat weedkiller and Parkinson’s disease. Independent researchers have stated that paraquat can cause neurological changes that are hallmarks of Parkinson’s, but Syngenta has maintained that the evidence linking the herbicide to Parkinson’s is “inconclusive”. […]
Telnet was abandoned due to its lack of encryption, but it is still a useful tool for debugging remote connection problems. Telnet can be used to establish a connection to almost any protocol, including encrypted ones. This guide explores how to use telnet to troubleshoot connection issues. Four main errors can occur when trying to […]
Kisak-Strike is a project by a developer using the leaked CSGO source code to create an open-source version of the game. The post recounts the initial leak, the difficulty of building CSGO, and the transition to a new build system using CMake. The developer includes examples of the benefits of using CMake, such as code […]
In a recent blog post, an extreme case of bad naming that could have cost a lot if it weren’t for the resilience of the great operating system Linux is shared. It all started when a MySQL data directory was mounted inside /opt/redash – which also contained a Redash installation, a script to make a […]
Scientists at the University of Cambridge’s Comparative Cognition Lab have studied whether non-human primates can be fooled by a French-drop-style trick that uses sleight-of-hand. In the study patricipants included capuchin, squirrel and marmoset monkeys, who were rewarded with either peanuts, mealworms or marshmallows when they correctly guessed which of the magician’s hands held the hidden morsel after he […]
Deepfence has introduced eBPFGuard, its Rust library, and open-source tool, into its commercial product, ThreatStryker, for threat detection and mitigation. By integrating eBPFGuard, Deepfence aims to provide an advanced and robust solution for users seeking protection from increasingly complex and sophisticated cyber threats. eBPFGuard can selectively block specific kernel function calls based on user-defined policies, […]