Mongersen Fails | In the Pipeline 

It doesn’t seem to have any particularly bad safety issues, so under some regulatory proposals, that would have been the time to let suffering Crohn’s patients take it on a risk basis, speed up development, get the regulatory barriers out of the way, all that stuff. But that would have given everyone three years of useless placebo, at a no doubt stiff price. And since more drugs in clinical trials fail than work, I’m still baffled at how giving people a chance to pay for them at that point is supposed to improve health or save anyone money. It certainly wouldn’t have in this case. Celgene stuffed well over $700 million in real money into the shredder on this effort, and a million Crohn’s patients could have joined them.

Court Has No Problem With All House Residents Being Forced To Hand Over Fingers To Law Enforcement | Techdirt 

What’s depicted here clearly falls in line with previous decisions related to the Fifth Amendment implications of providing fingerprints to unlock devices. Physical properties like fingerprints haven’t been considered testimonial because they’re apparent, visible, and clearly linked to the individual under suspicion. Handing over a fingerprint requires no “testimonial” effort, courts have decided, even if the non-testimonial action produces a wealth of incriminating evidence.

Government Drops Its Demand For Data On 6,000 Facebook Users | Techdirt 

In a court hearing today, the Department of Justice dropped its request for the names of an estimated 6,000 people who “liked” a Facebook page about an Inauguration Day protest, the American Civil Liberties Union said. The ACLU challenged several warrants related to protests against President Trump’s inauguration on Friday, one of which included the search, claiming they were over-broad.

Wi-Fi Security Has Been Breached 

US-CERT has become aware of several key management vulnerabilities in the 4-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol. The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others. Note that as protocol-level issues, most or all correct implementations of the standard will be affected. The CERT/CC and the reporting researcher KU Leuven, will be publicly disclosing these vulnerabilities on 16 October 2017.

I think we are all pretty well phucked now. This comes right at the point when Wi-Fi is pretty much the standard internet connection in homes and businesses. I knows plenty of people that never connect an Ethernet cable.

The Information Age is being hacked from the ground up. The future will be a pretty interesting place but I’m interested if anyone will trust computers by the time we get there.

View all of the posts in the archive or subscribe to the feed for all posts.