Archive for December, 2014

Science Says Lasting Relationships Come Down To 2 Basic Traits

Saturday, December 13th, 2014

– I like it when science ends up saying what many of us have known intuitively.  

– There’s a lot of wisdom in this piece and, if you can see that your relationship isn’t likely to endure after reading this, I’d suggest you deal with your relationship ASAP by making it your highest priority.  

– Either mend it or end it.  

– Life is far too short to waste a significant part of it enduring a relationship rather than reveling in it.  

– It’s your life.  Make it into what you want it to be and remember, there’s no more powerful technique to shape your life than to give away that which you want to get.

– dennis

= = = = = = = = = = = = = = = = = = = = = = = = = = =

Science says lasting relationships come down to—you guessed it—kindness and generosity.

Every day in June, the most popular wedding month of the year, about 13,000 American couples will say “I do,” committing to a lifelong relationship that will be full of friendship, joy, and love that will carry them forward to their final days on this earth.

Except, of course, it doesn’t work out that way for most people.

The majority of marriages fail, either ending in divorce and separation or devolving into bitterness and dysfunction.

Of all the people who get married, only three in ten remain in healthy, happy marriages, as psychologist Ty Tashiro points out in his book “The Science of Happily Ever After,” which was published earlier this year.

Social scientists first started studying marriages by observing them in action in the 1970s in response to a crisis: Married couples were divorcing at unprecedented rates. Worried about the impact these divorces would have on the children of the broken marriages, psychologists decided to cast their scientific net on couples, bringing them into the lab to observe them and determine what the ingredients of a healthy, lasting relationship were.

Was each unhappy family unhappy in its own way, as Tolstoy claimed, or did the miserable marriages all share something toxic in common?

Psychologist John Gottman was one of those researchers. For the past four decades, he has studied thousands of couples in a quest to figure out what makes relationships work. I recently had the chance to interview Gottman and his wife Julie, also a psychologist, in New York City. Together, the renowned experts on marital stability run The Gottman Institute, which is devoted to helping couples build and maintain loving, healthy relationships based on scientific studies.

John Gottman began gathering his most critical findings in 1986, when he set up “The Love Lab” with his colleague Robert Levenson at the University of Washington. Gottman and Levenson brought newlyweds into the lab and watched them interact with each other.

With a team of researchers, they hooked the couples up to electrodes and asked the couples to speak about their relationship, like how they met, a major conflict they were facing together, and a positive memory they had. As they spoke, the electrodes measured the subjects’ blood flow, heart rates, and how much they sweat they produced. Then the researchers sent the couples home and followed up with them six years later to see if they were still together.

From the data they gathered, Gottman separated the couples into two major groups: the masters and the disasters. The masters were still happily together after six years. The disasters had either broken up or were chronically unhappy in their marriages.

When the researchers analyzed the data they gathered on the couples, they saw clear differences between the masters and disasters. The disasters looked calm during the interviews, but their physiology, measured by the electrodes, told a different story. Their heart rates were quick, their sweat glands were active, and their blood flow was fast. Following thousands of couples longitudinally, Gottman found that the more physiologically active the couples were in the lab, the quicker their relationships deteriorated over time.

But what does physiology have to do with anything? The problem was that the disasters showed all the signs of arousal — of being in fight-or-flight mode — in their relationships. Having a conversation sitting next to their spouse was, to their bodies, like facing off with a saber-toothed tiger.

Even when they were talking about pleasant or mundane facets of their relationships, they were prepared to attack and be attacked. This sent their heart rates soaring and made them more aggressive toward each other. For example, each member of a couple could be talking about how their days had gone, and a highly aroused husband might say to his wife, “Why don’t you start talking about your day. It won’t take you very long.”

– More…

 

 

This Physicist Has A Groundbreaking Idea About Why Life Exists

Friday, December 12th, 2014

– An interesting idea and one, I think, that needs to be pushed. But, I don’t think it is original in any real sense.

– One of the most insightful and influential books I’ve ever read is “Into the Cool – Energy flow, Thermodynamics and Life” (2005) by Schneider and Sagan.

– In it, they very effectively make the point that the logic and the fundamental nature of the Second Law of Thermodynamics explains how and why matter tends to assemble itself into ever more complex forms in the presence of excess energy. Part of what they were saying, I worked out for myself years ago but the final bit they provided to pull it all together and I find it more convincing than anything else I’ve heard.

– dennis

= = = = = = = = = = = = = = = = = = = =

Why does life exist?

Popular hypotheses credit a primordial soup, a bolt of lightning, and a colossal stroke of luck.

But if a provocative new theory is correct, luck may have little to do with it. Instead, according to the physicist proposing the idea, the origin and subsequent evolution of life follow from the fundamental laws of nature and “should be as unsurprising as rocks rolling downhill.”

From the standpoint of physics, there is one essential difference between living things and inanimate clumps of carbon atoms: The former tend to be much better at capturing energy from their environment and dissipating that energy as heat.

Jeremy England, a 31-year-old assistant professor at the Massachusetts Institute of Technology, has derived a mathematical formula that he believes explains this capacity. The formula, based on established physics, indicates that when a group of atoms is driven by an external source of energy (like the sun or chemical fuel) and surrounded by a heat bath (like the ocean or atmosphere), it will often gradually restructure itself in order to dissipate increasingly more energy. This could mean that under certain conditions, matter inexorably acquires the key physical attribute associated with life.

“You start with a random clump of atoms, and if you shine light on it for long enough, it should not be so surprising that you get a plant,” England said.

England’s theory is meant to underlie, rather than replace, Darwin’s theory of evolution by natural selection, which provides a powerful description of life at the level of genes and populations. “I am certainly not saying that Darwinian ideas are wrong,” he explained. “On the contrary, I am just saying that from the perspective of the physics, you might call Darwinian evolution a special case of a more general phenomenon.”

His idea, detailed in a paper and further elaborated in a talk he is delivering at universities around the world, has sparked controversy among his colleagues, who see it as either tenuous or a potential breakthrough, or both.

England has taken “a very brave and very important step,” said Alexander Grosberg, a professor of physics at New York University who has followed England’s work since its early stages. The “big hope” is that he has identified the underlying physical principle driving the origin and evolution of life, Grosberg said.

– More…

 

Powerful, highly stealthy Linux trojan may have infected victims for years

Wednesday, December 10th, 2014

Backdoor tied to espionage campaign that has targeted governments in 45 countries.

Researchers have uncovered an extremely stealthy trojan for Linux systems that attackers have been using to siphon sensitive data from governments and pharmaceutical companies around the world.

The previously undiscovered malware represents a missing puzzle piece tied to “Turla,” a so-called advanced persistent threat (APT) disclosed in August by Kaspersky Lab and Symantec. For at least four years, the campaign targeted government institutions, embassies, military, education, research, and pharmaceutical companies in more than 45 countries. The unknown attackers—who are probably backed by a nation-state, according to Symantec—were known to have infected several hundred Windows-based computers by exploiting a variety of vulnerabilities, at least two of which were zero-day bugs. The malware was notable for its use of a rootkit that made it extremely hard to detect.

Now researchers from Moscow-based Kaspersky Lab have detected Linux-based malware used in the same campaign. Turla was already ranked as one of the top-tier APTs, in the same league as the recently disclosed Regin for instance. The discovery of the Linux component suggests it is bigger than previously thought and may presage the discovery of still more infected systems.

“The [Turla] operations are being carried out in broader environments than we previously knew,” Kaspersky Lab expert Kurt Baumgartner told Ars. “All the other stuff we’ve seen from Turla has been windows based. This piece of the puzzle shows us that they do not limit themselves.”

…More:  

 

Exposed: NSA program for hacking any cell phone network, no matter where it is

Monday, December 8th, 2014

– Worth noting how high the percentage is for New Zealand in the chart which you can find in the original article.

– dennis

= = = = = = = = = = = = = = = = = = = =

The National Security Agency has spied on hundreds of companies and groups around the world, including in countries allied with the US government, as part of an effort designed to allow agents to hack into any cellular network, no matter where it’s located, according to a report published Thursday.

Armed with technical details of a specific provider’s current or planned networks, agents secretly attempt to identify or introduce flaws that will make it possible for communications to be covertly tapped, according to an article published by The Intercept. Security experts warned that programs that introduce security flaws or suppress fixes for existing vulnerabilities could cause widespread harm, since the bugs can also be exploited by criminal hackers or governments of nations around the world.

“Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,” Karsten Nohl, a cryptographer and smartphone security expert, told The Intercept. “Because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.”

t’s not the first time the US agency has been reported to introduce backdoors into widely used technologies. Last year documents provided by former NSA subcontractor Edward Snowden—the same source for documents supporting Thursday’s story by The Intercept—showed that the NSA worked with standards bodies to adopt encryption technologies with known vulnerabilities in them. Two weeks later, the RSA division of EMC warned customers to stop using the default configuration of its BSAFE BSAFE toolkit and Data Protection Manager because it contained code reported to contain an NSA-engineered vulnerability.

The program reported Thursday, codenamed AURORAGOLD, has monitored messages sent and received by more than 1,200 email accounts associated with large cell phone operators around the world. One surveillance target is the GSM Association (GSMA), a UK-based group that works with Microsoft, Facebook, AT&T, Cisco Systems, and many other companies to ensure their hardware and software related to cellular technology is compatible. At the same time the NSA has been monitoring the group, other arms of the US government has funded GSMA programs designed to boost privacy on mobile networks. According to The Intercept:

The NSA focuses on intercepting obscure but important technical documents circulated among the GSMA’s members known as “IR.21s.”

Most cellphone network operators share IR.21 documents among each other as part of agreements that allow their customers to connect to foreign networks when they are “roaming” overseas on a vacation or a business trip. An IR.21, according to the NSA documents, contains information “necessary for targeting and exploitation.”

The details in the IR.21s serve as a “warning mechanism” that flag new technology used by network operators, the NSA’s documents state. This allows the agency to identify security vulnerabilities in the latest communication systems that can be exploited, and helps efforts to introduce new vulnerabilities “where they do not yet exist.”

The IR.21s also contain details about the encryption used by cellphone companies to protect the privacy of their customers’ communications as they are transmitted across networks. These details are highly sought after by the NSA, as they can aid its efforts to crack the encryption and eavesdrop on conversations.

Last year, The Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3.

The documents note that the agency intercepts information from cellphone operators about “the type of A5 cipher algorithm version” they use, and monitors the development of new algorithms in order to find ways to bypass the encryption.

NSA documents show that AURORAGOLD focuses on collecting details about virtually all technical standards used by cell phone operators.

– to the original article: