Free Daily Podcast Summary
by Buzz Skyline
Get key takeaways, quotes, and insights from The Dark Net in a 5-minute read. Delivered straight to your inbox.
The most recent episodes — sign up to get AI-powered summaries of each one.
Is this a hot cup of tea? Or the power supply for the computer of the future?Researchers in Singapore have shown, in principle at least, that it will soon be possible to create thermal logic gates, including AND, OR, and NOT gates. Once you have all those pieces, you've got the basic ingredients of a computer that runs directly on heat, with no need for electricity at all.Lei Wang and Baowen Li of the National University of Singapore propose that their logic gates could soon be built of recently developed thermal transistors or related designs, which control heat flow in the same way that conventional transistors control electricity. A thermal transistor turns on or off depending on whether the temperature at its input gate is above or below a critical temperature. Constant temperature heat baths would take the place of power supplies in operating the thermal transistors and logic gates. In theory, any heat source could be used to run a thermal computer - sunlight, the heat from a campfire, etc.In addition to proving that thermal gates can perform all the basic functions of electronic gates, the authors of the research soon to be published in the journal Physical Review Letters point out that the work may also help us to understand the complex heat flow in biological cells and systems in terms of thermal logic.To get a look at the research before it's officially published, you can download a preprint of paper from the online science archives.
CNN is reporting that the Department of Homeland Security managed to blow up an electrical generator in a simulated cyber attack. It's a vivid demonstration of how the growing dependence on networked control systems links virtual world actions with real world effects.This shouldn't really surprise anyone. Power grids are already too complex and interconnected to be controlled in any way other than by remote networked systems. Heck, pilots don't really fly jets much anymore - they just use the stick to tell the computer to take the plane in a particular direction. In fact, I doubt planes will even have pilots in 50 years, they'll be just like the automated trams that already haul people around on the ground at airports.I can currently monitor my home through a web cam, and it won't be long before I have the ability to turn on the lights remotely and crank the air conditioning or heat from the office so things will be nice an comfy when I get home. Someday, I imagine someone could hack my house and do all sorts of annoying things. And if someone were to hack a plane, train, hydroelectric plant, or a nuclear power plant, things could get bad pretty quick.The experts in the CNN story say that "a lot of the risk has already been taken off the table, " by finding ways to prevent the transformer hacks, but that it could take months to fix them all. That means our power grids are suffering from a classic zero day vulnerability. That is, the powers-that-be have publicly pointed out the flaw and announced fix, but anyone with the motivation has plenty of time to find unprotected systems to attack.An expert interviewed on CNN claims that shutting down power to 1/3 of the country would have the economic and social devastation comparable to the nation being simultaneously hit by 40-50 major hurricanes.Will there be an attack? Probably not. On the other hand, this is just one vulnerability. No doubt every networked machine or system, just like every networked computer, will eventually face similar threats.-Buzz
In Chapter 26 of the Dark Net blog, I wrote about Max and Joel practicing with various weapons as they prepared to make an attack on one particular corner of the online world.They were armed with fork bombs, zip bombs, denial of service attacks, and something I call a Ctrl-Alt-Del grenade. Max and Joel took turns wreaking havoc on a bunch of characters based on the Office Assistants from Microsoft Office. The victims included Microsoft Bob and Clippit, that annoying paper clip thing that always wants to know if it can help you write a letter, edit a resume, etc.I decided make use of my recent obsession with Yahoo Widget programming to make a game out of Chapter 26. I call it Dark Net Target Practice. You can download it from the Yahoo Widget gallery.If you've never used a widget, but want to try out mine or one of the many other cool widgets, you can learn everything you need to know on the widgets info page. The goal of the Dark Net Target Practice widget is to shoot all the characters except the little penguin. You Linux folks ought to recognize the little fella.Clippy in particular is worth double points for a kill. I hate that guy.As your score goes up, the characters move faster.Send me a screen shot of your score, if you manage to get really good at it.Have fun.-Buzz
The Dark Net is now available on Amazon for only $14.95 $10.17 (a 32% discount over the retail price)!Check out the Amazon page and please leave a review if you've read the book. You can preview The Dark Net in it's entirety on Lulu, in case you'd like to review it but don't want to buy a copy at the moment.
The Japanese news site Daily Yomiuri is reporting that a woman was murdered in a robbery concocted with the aid of dark Web sites set up to help criminals find accomplices.Kenji Kawagishi, and unemployed 40 year-old man in Aichi Prefecture, sent messages from his cell phone to the "Dark Employment Security Web," which hooked him up with two other men who were also hard-up for cash. Tsukasa Kanda, a 36 year-old sales agent for the Japanese newspaper Asahi Shimbun, and Yoshitomo Hori, an unemployed man of 32, joined with Kawagishi in kidnapping Rie Isogai while she was on her way home from work. The men robbed her of 70,000 yen (about $600), murdered her and dumper her in the woods of Mizunami, Gifu Prefecture. The Dark Employment Security Web has been closed, but the Japanese authorities say there's no way to know how many more are out there. Although the police shut them down as soon as they learn of the criminal equivalents of MySpace, new sites replace the deleted ones almost immediately.
It's amazing what I have time for, now that I finished The Dark Net, at least until I start on my next book.In the meantime, I've updated a clock for your desktop that tells time by displaying resistor color codes. Each color represents a number. In the image above, it reads 0740 06, or 6 seconds past 7:40 AM. You can download the clock by clicking here. Don't worry if you don't have the colors memorized -- if you right-click the clock and select 'about' you will see a chart to help you learn them.To run the widget, you'll have to install the Yahoo Widgets engine, which is available for free on the Yahoo Widgets page. While you're there, check out all the other cool widgets people have made. Like the Resistor Clock, they're all made by amateurs and distributed for free. But lots of them are impressively sophisticated.
The National Science Foundation (NSF) is funding the University of Arizona in developing a project they call the Dark Web to track down terrorists on the net.When I read the NSF press release that my friend Randy A. pointed out to me, I could have sworn some of it was describing chapters of The Dark Net.Here's an excerpt from the release that reminds me of Chapter 6. The Maelstrom"They can put booby-traps in their Web forums," Chen explains, "and the spider can bring back viruses to our machines." This online cat-and-mouse game means Dark Web must be constantly vigilant against these and other counter-measures deployed by the terrorists.And this sounds like it has something to do with Chapter 11. AOD HQDark Web's capabilities are also being used to study the online presence of extremist groups and other social movement organizations. Chen sees applications for this Web mining approach for other academic fields."What we are doing is using this to study societal change," Chen says. "Evidence of this change is appearing online, and computational science can help other disciplines better understand this change."Freaky, isn't it.
*** Note to readers: This is the final chapter of The Dark Net blognovel. Download the entire book from Lulu.com, or email me at BuzzSkyline at gmail.com and I can send you the PDF (280 pages). *** Max piloted the motorcycle-and-sidecar rig up an embankment and onto the dirt maintenance road that ran along the superhighway. Linda giggled and clapped her hands. It always made her laugh when the rig heeled over precariously. He had to smile at her infantile joy, despite the sweat rolling down his spine as he wrestled with the handlebars to prevent the overloaded rig from tumbling down the hill and onto the roadway strewn with immobile vehicles. Listen to the Chapter 35 podcast with roboreader Sangeeta. The motorcycle was archaic, a motorized dinosaur from before the days of GPS, stability control, and basic safety equipment. But at least it worked, chugging along slowly and relentlessly, unlike the millions of modern vehicles that had depended on their networked processors for everything from climate control to automated guidance, and which now sat moldering on the roads. He’d found the machine meticulously preserved in an abandoned tourist-trap museum outside of York that had been dedicated to World War II relics. It had taken him a few weeks to get the engine back in running order and adjusted to handle the ethanol he’d gotten from a moonshiner in exchange for the last of the Freedom Club’s medical supplies. The trade had been a tough call – drugs and medical instruments were valuable commodities now that nearly all commerce had shut down. If you couldn’t make something, or get it from a neighbor, you simply had to learn to do without it, and folk medicine was a lost art to nearly everyone but the Amish.Linda was coming along well. After ten months, she’d learned several dozen words, mostly having to do with food, toys, animals and the need to defecate and urinate. Joel had been less fortunate, despite Dr. Murray’s attempts to resuscitate him. A life-support system might have kept him going for a while, but because his basic motor functions had been scrambled, he wouldn’t have lasted long. Besides, like the cars, planes, and countless appliances that were now no more than piles of inert machinery, any modern life-support devices would not have functioned after the massive network failure. When the Freedom Club residents packed up their farm implements and animals, they simply left Joel behind and dispersed into the hills as they had planned.Linda would have died as well, an infant deserted in the wilderness, if Max hadn’t stayed with her. He attributed her rapid progress – crawling after a few weeks and taking her first tottering steps only days later – to the fact that the neural connections in her brain were intact, even though her memories and experiences had been thoroughly erased.It wouldn’t be long, Max guessed, before she would develop to the intellectual level of a kindergartener, and would begin asking the questions that naturally occur to any curious child. He wondered what he should tell her when she finally raised the issue of her origins and the reasons for the technological ruins all around them, particularly because he only barely understood everything himself. In the days before the Freedom Club finally disbanded, Dr. Murray had attempted to explain it. The confetti-filled cube, he’d said, represented minuscule bits of data that did not disrupt PCs and servers directly as most previous viruses had, but instead triggered suicide code embedded in machines and systems over the course of decades. The Freedom Club, beginning with their founder Ted, had distributed the code with conventional Trojans and worms, but because it was meaningless and benign on its own, it had not come to the attention of network security experts. It was designed to appear to be the programming equivalent of junk DNA, the inert filler in living genomes. Only when the equally inscrutable data Herman had hidden inside Betty was released did the parts come together to disrupt infected systems, fulfilling Ted’s vision of using technological attacks to destroy the technology that he believed enslaved humanity.As clever as the two-part virus was, it would have done little damage if Neumann had not existed. Networks like the Internet are very robust against most attacks. Destroying a random set of servers is no more destructive than snipping a portion out of a spider web – ther
Free AI-powered daily recaps. Key takeaways, quotes, and mentions — in a 5-minute read.
Get Free Summaries →Free forever for up to 3 podcasts. No credit card required.
Listeners also like.
The Dark Net is a serialized science fiction blognovel and podcast. Follow Max, Betty and their penguin buddy Linus as they explore the hidden recesses of the Internet.
AI-powered recaps with compact key takeaways, quotes, and insights.
Get key takeaways from The Dark Net in a 5-minute read.
Stay current on your favorite podcasts without falling behind.
It's a free AI-powered email that summarizes new episodes of The Dark Net as soon as they're published. You get the key takeaways, notable quotes, and links & mentions — all in a quick read.
When a new episode drops, our AI transcribes and analyzes it, then generates a personalized summary tailored to your interests and profession. It's delivered to your inbox every morning.
No. Podzilla is an independent service that summarizes publicly available podcast content. We're not affiliated with or endorsed by Buzz Skyline.
Absolutely! The free plan covers up to 3 podcasts. Upgrade to Pro for 15, or Premium for 50. Browse our full catalog at /podcasts.
The Dark Net publishes every few days. Our AI generates a summary within hours of each new episode.
The Dark Net covers topics including Science, Technology, Arts, Medicine. Our AI identifies the specific themes in each episode and highlights what matters most to you.
Free forever for up to 3 podcasts. No credit card required.
Free forever for up to 3 podcasts. No credit card required.