X-Men: Apocalypse May 27 2016 20th Century FOX



Since the dawn of civilization, he was worshiped as a god. Apocalypse, the first and most powerful mutant from Marvel's X-Men universe, amassed the powers of many other mutants, becoming immortal and invincible. Upon awakening after thousands of years, he is disillusioned with the world as he finds it and recruits a team of powerful mutants, including a disheartened Magneto, to cleanse mankind and create a new world order, over which he will reign. As the fate of the Earth hangs in the balance, Raven with the help of Professor X must lead a team of young X-Men to stop their greatest nemesis and save mankind from complete destruction. Written by 20th Century Fox


Jennifer Lawrence isn't sure she'll appear in more 'X-Men' roles, says Fox should 'be terrified'

Https%3a%2f%2fblueprint-api-production.s3.amazonaws.com%2fuploads%2fcard%2fimage%2f94009%2fjen

Jennifer Lawrence isn't quite ready to play Mystique again. 
In an interview with Entertainment Weekly, the actress shared that she's not sure if she'll do another X-Men flick. Her three-picture deal is up following the release of X-Men: Apocalypse and it might be the last we see of her as Mystique, in addition to costars Michael Fassbender (Magneto), James McAvoy (Professor X) and Nicholas Hoult (Beast).
“Fassbender and McAvoy and I were all talking,” she says, “Like, ‘Will you come back?’ ‘I dunno.’ ‘I’ll come back, if you come back.’ Fox should be terrified because the deal we made was like if one of us doesn’t come back, none of us are.”

SEE ALSO: Jennifer Lawrence had an embarrassing moment in front of the 'Star Wars' cast
Though she says she would "love to come back," and adores the fans, it's quite a time commitment. 
"You realize how important your year is, like how important three months out of your year is," she says. "I don’t know. I shouldn’t be that honest.”
Plus, there's no way to pretend it's fun putting on Mystique's body paint. 
"You go in and you realize you’re rock bottom and like this sucks and it could not suck more,” she says. 

Is Facebook too powerful for its own good?

Https%3a%2f%2fblueprint-api-production.s3.amazonaws.com%2fuploads%2fcard%2fimage%2f93468%2fmark_zuckerberg

For nearly two weeks, Facebook has been at the center of a media firestorm about whether its "human editors" have been inappropriately tampering with the "Trending Topics" seen by millions.
A U.S. senator has pressured Facebook for answers. Top Facebook executives have met with leading conservative figures like Glenn Beck to assure them that no systemic liberal bias reaches the users of its social network. And CEO Mark Zuckerberg has put his own integrity on the line to ensure everything is above board. 
This is Facebook in 2016: A sprawling $300 billion giant with 1.6 billion users and such intense scrutiny on it that even an unsubstantiated rumor about a possible political bias by one contracted editor managing a section many users don't even look at can set the political and media world on fire for weeks. 
The real takeaway from this controversy, according to some longtime Facebook watchers, is less about the whiff of bias than the reminder that Facebook is now in uncharted waters, with no clear guidebook for how to manage itself and the expectations of its community. 
"No matter how much you think, 'Some day, we'll get to everyone on the planet,' no company in any industry has ever been in that kind of position. Therefore there is no precedent for the structure, systems, responsibilities and controls that are necessary for an organization that has that degree of influence," David Kirkpatrick, author of The Facebook Effect, the definitive account of Facebook's rise, told Mashable's Biz Please podcast, which you can listen to below, or download on iTunes and Stitcher
"[Mark] is still a relatively young person who is learning as he goes," says Kirkpatrick, who also founded the Techonomy conference, "as are all the people there because nothing like this has ever existed before."
Should Facebook have a public editor to vet its media efforts, as Mashable has suggested? Should it invite government oversight, or push for radical transparency with the public on this and other projects? These are all fair questions, but there is little precedent for the right answer.
Facebook could change a few lines of code and impact the personal lives of millions, an extreme level of influence that it unintentionally demonstrated when it conducted an emotion manipulationstudy in 2014.
Zuckerberg, who famously wrote "I'm CEO, bitch" on his business cards in the early days, has remodeled himself in recent years as a younger statesmen, philanthropist and father of the year, effectively becoming a polished ambassador for the powerful business. Facebook, likewise, has attempted to build trust with an equal playing field paved by algorithms. More than anything, the reports about trending topic bias threatened that trust.
"I consider them a highly ethical company that takes issues like this deeply seriously," Kirkpatrick says. "The fact that Zuckerberg met with these conservative leaders.... is a sign of how seriously he takes it and how much he feels misunderstood and how much he wants to demonstrate that he is fair-minded."
It seems to have worked: Beck praised Zuckerberg for looking him in the eye and appearing "sincere" in the desire to create a fair public space. 
Perhaps that will end this particular controversy, perhaps not. Either way, this particular incident is still far from the worst that Zuckerberg and his team have experienced.
When Kirkpatrick first met Zuckerberg, it was for lunch in 2006 "right in the middle of the News Feed controversy," when a big chunk of its user base revolted over the introduction of the News Feed. "But he just rolled right through it. Because being the data geek he was, he knew that people were actually using this new feature, and what they said was much less important than what they did."
As Facebook continues to stretch deeper into media, politics and the very core of our lives, data may not be enough to weather the inevitable storms that come.

On June 1, 2016 Saturn Is Going To Be Very Close To The Earth And You Dare Not Miss It!



National Aeronautics and Space Administration (NASA) has confirmed the news that on June 1, 2016, Saturn will be closest to Earth than it has ever been in the past 10,000 years. This astronomical sight is going to be really special, especially for all astronomy lovers and students.

The last few years have been really incredible for NASA and other space agencies of the world, especially for Indian Space Research Organisation (ISRO). The search of life on Mars has been the major attraction in the last couple of years.

This sight is going to be 'unlike any other astronomical sight.'

NASA spokesperson George Pooler says-


Saturn does not often come this close to Earth, and this will be a sight no one currently living has ever seen.

He says that NASA hopes to see the opposite side of Saturn as it rotates by.


The other side of the second largest planet in our solar system has never been photographed yet.

This isn't going to be an ordinary space event!


We are extremely excited to be able to study this planet better, but also, that people will be able to get a glimpse of an amazing, ringed planet, which is not something normally able to happen," Pooler continues.

In 1930, Saturn came very close, but not as close as it will come this time


We have some images of Saturn from the last rotation, but this will be an amazing sight that will blow the last time out of the water.

We are expecting this worldwide spectacle on June 1st 2016.



NASA spokesman Pooler informed about the timing of the space event. "we will be able to see Saturn here in the United States at 4:45 PM EST and in the United Kingdom at 9:45 PM ET


The Internet of Drones Is Coming



Commercial aviation was born in the later years of World War I, and so too was the need for air traffic control. With a sudden post-war excess of military aircraft, Britain and France began converting their light, reliable bombers into mail planes. Consequently, air traffic density all of a sudden became an imminent hazard, a congested airscape whose danger peaked in 1922, when a Farman Goliath and a De Havilland DH-18 collided 60 nautical miles north of Paris, killing all on board.
Regulators and authorities responded by instituting air traffic corridors and beacon-based navigation systems—and eventually, around 1930, air traffic control towers began appearing in the UK. In 1935, the first Flight Monitoring Center appeared in Newark. It consisted of a clock, a notepad, some navigation charts, and a not-particularly-reliable radio setup. In a couple of decades there would be radar, too.
We can imagine the current state of drone affairs as analogous to the pre-ATC days of manned aviation. Suddenly, drones are cheap enough for hobbyists and advanced enough to conceivably be used for goods delivery, e.g. Amazon drones, pizza drones, etc. But a significant barrier remains in the form of drone traffic density. How do you keep your pizza drones from smashing into your news drones from smashing into your hobbyist drones?
As described in a paper published this week in IEEE Internet Computing, courtesy of Robert J Hall at AT&T Labs, the answer lies in an "internet of drones." Drones can best avoid each other if they know about each other, and this is the essence of Hall's Geocast Air Operations Framework (GAOF) prototype.
"The goal of the work is to demonstrate a path toward an improved system for the operation of drones, with the necessary secure command and control among all legitimate stakeholders, including drone operator, FAA, law enforcement, and private property owners and citizens," Hall writes. "While today there are drones and drone capabilities that work well with one drone operating in an area using a good communication link, there will be increased challenges when there are tens or hundreds of drones in an area."
GAOF is an extension of an existing AT&T technology known just as the Geocast System, which is being tested for similar traffic management applications on the ground, e.g. for people and cars. Obviously, adding a third dimension makes things a bit more complex.
The problem, however, is difficult whether we're talking about driverless cars or drones for the simple reason that an ideal medium doesn't exist for connecting them. Cellular networks are obvious, but these can change and drop out as a drone moves from place to place. Wireless ad-hoc networks, where drones connect to each other peer-to-peer, are an obvious solution, but carry with them the limitation of not being connected to the greater internet. This prevents the drones from accessing information about drones that are not within line-of-sight (and so can't be reached with a peer-to-peer wireless network), and general information about local airspace restrictions, should they exist.
The Geocast system works by automatically flipping between the two network tiers depending on availability. Crucially, should it only be able to access a an ad-hoc network, it can gain access to the greater internet via packets relayed via other drones.
"So, for example, if one drone has both tiers available, it can act as a relay, transferring long-range packets into the short-range tier (or vice versa), so that a single-tier drone can receive messages that come via the relay from sources on the other tier," Hall explains. "This is useful in many scenarios; for example, one could orbit a two-tier-capable drone at higher altitude above an area of operations in a valley where cell coverage was nonexistent, allowing remote awareness and control of drones operating at lower altitude within the valley."
The drone traffic control problem gets still more interesting. How in the first place can we send packets to a three-dimensional geographical space—that is, every drone within that space—rather than to a list of specific drone IP addresses?
The answer is in geographic addressing (GA), in which circles centered around different latitudes and longitudes are assigned their own address, which is shared among all drones within that circle. Every device that wishes to monitor an area comes with up a query message, which is then sent to a specific geographic address. The drones within that address region send their replies back to the geographic address of the querying drone. All of the said drone's neighbors get the reply, but if they know they didn't send the query, it's easy enough to just ignore it.
(This is a lot like how subnets work on the internet: Your computer sends and receives the same internet traffic as everyone else sharing the same network access point, it just filters it all down to the stuff meant for you.)
As Hall explains, this sort of collision avoidance could be extended beyond other drones and to buildings and towers and other things to be avoided. It's just a matter of outfitting them with a beacon connected to a geographic address.
"This prototype system has been implemented and tested using simulated drones," Hall notes. "Aerial field testing with real drones is being planned and will be conducted in accordance with the FAA guidelines."

An Admin's Foolish Errors Helped the FBI Unmask Child Porn Site 'Playpen'



Sites hosted on the so-called dark web are forcing law enforcement to use novel and powerful techniques to unmask them. But sometimes suspected criminals make it easier for the feds.
Recently unsealed court documents reveal that “Playpen,” one of the largest and most infamous dark web child pornography sites, was shut down partly owing to its administrator's own mistakes.
“Due to a misconfiguration of the server hosting the TARGET WEBSITE [Playpen], the TARGET WEBSITE was available for access on the regular Internet to users who knew the true IP address of the server,” a search warrant application for intercepting communications on Playpen from February 2015 reads. The search warrant and other documents were unsealed in the case of Richard Stamper, who was arrested on suspicion of child pornography charges.
“Basically, Playpen must have set their [child pornography] site to [a] default [web server setting], meaning if you typed in the IP address you could see the Playpen site,” Thomas White, a UK-based activist and technologist, explained in an encrypted chat. “Whereas if they set another default like ‘server not found,’ then you could only access Playpen by typing the correct .onion address.” This means that law enforcement could verify that an IP address belonged to a specific site.
“An FBI Agent, acting in an undercover capacity, accessed IP address 192.198.81.106 on the regular Internet and resolved to TARGET WEBSITE,” the document continues. That address pointed to a server in North Carolina, hosted by a company called CentriLogic.
The FBI was tipped off about Playpen’s IP address by a foreign law enforcement agency, as noted in other, redacted versions of the warrant. This recently unsealed version includes detail on how that IP address was left exposed.
It is not clear how the foreign law enforcement agency discovered Playpen's real IP address in the first place. But the main administrator of the site, who the FBI suspects is Steven Chase from Florida, was clearly aware of the problem and actively trying to fix it, according to the search warrant application.
“FBI agents know this by reading his private messages from the copy of the TARGET WEBSITE that was seized pursuant to the aforementioned search warrant,” the document continues.
Playpen’s suspected administrator apparently also leaked identifying information about himself.
Chase allegedly connected to the server, as well as to the PayPal account used to pay for the hosting provider, from an IP address assigned to his home in September and November 2014, instead of through the Tor network. This meant that a subpoena to Paypal revealed where the person paying for the server was likely located.
On top of this, Chase allegedly connected to a Playpen administrator account from his mother's house a number of times between December 2014 January 2015.
Mistakes are often what leads to the capture of suspected dark web criminals. In the case of drug marketplace Silk Road, creator Ross Ulbricht posted his personal email address in an advert asking for help with the site, and the FBI claimed the location of the site's server was identified because of a leaky CAPTCHA system.
Meanwhile Blake Benthall, a suspected administrator of the second iteration of Silk Road, registered a server with an identifying email address. One alleged dark web drug dealer even went so far as to trademark his brand in his own name.
The suspected owner of one of the largest dark web child pornography sites was evidently no different, and perhaps the most foolish of them all.

Pornhub Says Hack Was 'Merely a Hoax'



Over the weekend, a hacker only known as Revolver claimed to have hacked Pornhub. He tweeted alleged screenshots of what looked like a server’s backend and offered to sell access to one of the site’s servers for $1,000.
But as it turns out, the hacker’s story might have been made up.
“He didn't have any server access,” a Pornhub spokesperson told me via Twitter message.
The adult video website said it investigated Revolver’s claims and found that while Revolver’s screenshots to prove his feat “might look realistic to people without knowledge of the underlying infrastructure, the attack as described by the hacker is not technically possible.”
“This incident was merely a hoax and no Pornhub systems were breached during those recent events,” the company said in a statement. (Other than posting the screenshots, Revolver didn’t demonstrate he had access to Pornhub’s server in any other way.)
Pornhub ended with the customary boilerplate corporate statement reassuring viewers that “the safety and security of our users is Pornhub's top priority.” The company also noted that since last week, it has a bug bounty program in place, with which friendly hackers can warn the site of flaws and bugs, and get rewards of up to $25,000.
Revolver could not be reached for comment on Monday morning. But this looks like yet another example of an overblown, or even nonexistent, hack. Earlier this month, a hacker was allegedly selling a stash of 272 millions emails and passwords for $1. Reuters first reported the story, slapping a big “Exclusive” in front of it, which prompted countless blogs to pick it up. But as it turned out, that story was also a hoax, and the database was likely just a collection of credentials leaked as part of older data breaches.
In this case, it looks like Revolver either completely made up the story, or at least oversold it. But breaches like these aren’t uncommon, even on large, well known sites or services such as Uber, the toy company VTech, and countless others.
Correction: a previous version of this story said the hacker was 19 years old. The hacker, however, said he lied when he told Motherboard his age. He now refuses to reveal it.