Toggle light / dark theme

The U.S. Food and Drug Administration (FDA) currently has several ongoing trials testing immunotherapy cancer treatments like CPG and checkpoint inhibitor drugs. In fact, the internet was up in arms last year when Stanford University doctors cured 87 out of 90 mice with a “vaccine” that stimulated the immune system to attack cancerous cells. It was described as a “breakthrough treatment,” but the truth is, a very similar treatment was already being used to treat human patients at a hospital in Mexico.

CHIPSA Hospital, which is located in Tijuana, is an integrative immunotherapy hospital that offers patients access to several cutting-edge therapies and nutritional regimens. Many of our treatments have been long discounted by mainstream medical communities, only to be later approved and legitimized in the United States. CPG is one of them.

Dr. Anton Escobedo, the hospital’s medical director, said the clinical study was actually music to his hears. “When the study came out,” he said, “I was pleased to see they were using CPG. We have a lot of experience with a form of CPG so we weren’t surprised to see it work well in combination with checkpoint inhibitors. We love when science proves what we’re doing is right. 10 years ago, they wouldn’t even acknowledge it.

What are the problematics of infrastructure? What criterias can one enunciate and argue to understand the status of a country’s infrastructure?


Lee explains America’s failing infrastructure.

Click here to subscribe to VICE: http://bit.ly/Subscribe-to-VICE

About VICE:
The Definitive Guide To Enlightening Information. From every corner of the planet, our immersive, caustic, ground-breaking and often bizarre stories have changed the way people think about culture, crime, art, parties, fashion, protest, the internet and other subjects that don’t even have names yet. Browse the growing library and discover corners of the world you never knew existed. Welcome to VICE.

Connect with VICE:
Check out our full video catalog: http://bit.ly/VICE-Videos
Videos, daily editorial and more: http://vice.com
More videos from the VICE network: https://www.fb.com/vicevideo
Click here to get the best of VICE daily: http://bit.ly/1SquZ6v
Like VICE on Facebook: http://fb.com/vice
Follow VICE on Twitter: http://twitter.com/vice
Follow us on Instagram: http://instagram.com/vice

The VICE YouTube Network:
VICE: https://www.youtube.com/VICE
MUNCHIES: https://www.youtube.com/MUNCHIES
VICE News: https://www.youtube.com/VICENews
VICELAND: https://www.youtube.com/VICELANDTV
Broadly: https://www.youtube.com/Broadly
Noisey: https://www.youtube.com/Noisey
Motherboard: https://www.youtube.com/MotherboardTV
VICE Sports: https://www.youtube.com/NOC
i-D: http://www.youtube.com/iDmagazine
Waypoint: https://www.youtube.com/Waypoint

How dictators work in the 21st century.


The new president of Kazakhstan is now proving that he will keep the old, oppressive systems alive for the 21st century, using advanced technical tools.

The man in the middle: Beginning last week, Kazakhstan’s government is intercepting all HTTPS traffic inside the country, ZDNet reports. HTTPS is a protocol meant to offer encryption, security, and privacy to users, but now the nation’s internet service providers are forcing all users to install certificates that enable pervasive interception and surveillance.

On Wednesday, Kazakh internet users were redirected to web pages instructing them to install the government’s root certificate in their web browser, which enables what’s called “man in the middle” interception of internet traffic, decryption, and surveillance.

A new wireless transceiver invented by electrical engineers at the University of California, Irvine boosts radio frequencies into 100-gigahertz territory, quadruple the speed of the upcoming 5G, or fifth-generation, wireless communications standard.

Labeled an “end-to-end transmitter-receiver” by its creators in UCI’s Nanoscale Communication Integrated Circuits Labs, the 4.4-millimeter-square silicon chip is capable of processing digital signals significantly faster and more energy-efficiently because of its unique digital-analog architecture. The team’s innovation is outlined in a paper published recently in the IEEE Journal of Solid-State Circuits.

“We call our chip ‘beyond 5G’ because the combined speed and data rate that we can achieve is two orders of magnitude higher than the capability of the new wireless standard,” said senior author Payam Heydari, NCIC Labs director and UCI professor of electrical engineering & computer science. “In addition, operating in a higher frequency means that you and I and everyone else can be given a bigger chunk of the bandwidth offered by carriers.”

The internet is rife with myths and articles making dubious claims about certain foods and their anti-cancer properties. We have all seen the articles of questionable scientific merit gracing social media suggesting that such-and-such foods can cure cancer, the majority of which are highly questionable. A new study offers a unique kind of insight into the potential true effectiveness of food in fighting cancer [1].

Investigating molecules in food with machine learning

There is no doubt that there are many foods that contain a myriad of active molecules, and perhaps some of these food myths may have a grain of truth to them. A team of researchers decided to do some real myth-busting and put a variety of bioactive molecules found in foods to the test to see if they might potentially help to combat cancer.

As with many of my recent posts, this was originally a reply to a member of Quora, a Q&A web forum. But, it fits within Lifeboat’s educational mission and our fascination to push the limits of creativity and tech.

Is there a theoretical speed limit to WiFi devices over the next 10 years?

Because of four recent practices,* it is difficult to predict an upper limit for future overall throughput:

  1. Channel bonding
  2. Beam steering (MIMO shaping and directing the antenna pattern)
  3. Mesh Networking (i.e. subdividing a service area into micro-cells). Residential examples: Google WiFi, Netgear Orbi or TP-Link Deco
  4. Ultra wideband or Ultra-high frequency: In 2017, both Netgear and Asus introduced routers with 802.11ad WiFi (‘WiFi AD’). Although it still not widely adopted, it adds a 60 GHz radio to the existing 2.4 and 5 GHz radios, supporting 7 Gbps network speed).

Note that none of these techniques demands a high output power per channel. They all use ‘tricks’ to achieve higher speeds. But the tricks are scaleable. There really is no upper limit to any of these techniques.

Mesh networks don’t increase overall bandwidth, but by reducing the signal power and service area (and having many more access points), there is more bandwidth available for each device.

The 60 GHz used by WiFi AD is so high, that it cannot pass through walls in a typical home—just within a room. On the other hand ultra-wideband transmission has been demonstrated and recently blessed by the FCC, but it is not yet a WiFi standard. With this method, it will be possible to send insanely high-speed, low power signals through walls to cover small areas.

How fast are ultra-wideband radios? How about terabytes per second, depending on distance? It’s difficult to imagine future applications that may need that speed. It dwarfs the real world data input capacity of our senses. Perhaps, someday, you will need to transfer the entire literature of all known civilizations into your brain under under 2 milliseconds. I suppose that it would be good for that purpose.


* I called these technologies “recent developments”. But actually, three of four practices have a long history in military, commercial and industrial applications.

a) Beam steering

Focusing an antenna pattern has been around for more than 75 years. Yagi TV antennas (popular in 1960s and 70s) are highly directional. Some TV broadcast towers are situated near the edge of a service area. They split their broadcast signal, through a phase delay and deliver the waveforms to an array of antenna. This allows them to steer the signal without any mechanical movement. Directional lasers or infrared beams are often used for communications.

b) Channel bonding (or reverse multiplexing)

I had an exceptional router in the 1990s that could combine backhaul services (not just switch from one to the other in case of a drop out). It boosted speed by distributing internet packets over three separate networks):2 separate cable services and an early cell phone modem.

c) Mesh/Cellular coverage

The ‘full-blown’ implementation was developed by Motorola in the 1980s to accommodate growth in the mobile telephone market. I am not aware of an earlier implementations that included graceful, real-time hand-off of a device in motion. Of course, hotels and large convention centers have used mesh networking for more than a decade.


Philip Raymond co-chairs CRYPSA, hosts the Bitcoin Event and is keynote speaker at Cryptocurrency Conferences. He is a top writer at Quora.

Early this morning, I was asked this question at Quora. It’s a pretty basic request of network administrators, including parents, schools and anyone who administers a public, sensitive or legally exposed WiFi hot spot.

Is there a quick and easy way to view, log, or otherwise monitor the web sites visited by people on your home or office network?

Yes. It’s free and and it is pretty easy to do.

It gets a bit trickier, if the individual on your network is using a VPN service that they have configured on their device.[1] A VPN does not stop you from logging their browsing, but all of their activity will point to the VPN address instead of the site that they are actually visiting. In that case, there is another way to monitor their activity. See note #1, below.

Before getting into this, I should mention that I believe that using covert methods to monitor a family member’s online activity is a terrible method of parenting. In my opinion, there are better ways to deal with the issue—parenting techniques that don’t undermine trust as they deal with safety.

I can think of at least three methods for logging the websites that people on your network visit. In the explanation below, we will focus on #2. For more information, dig into the notes at the bottom of this answer.

You can either…

  1. Configure your router to store logs of visited IP addresses [2]
  2. Set your router to use the DNS server at opendns.com, instead of the default server offered by your internet service provider. This involves a simple setting available in all routers. (Replace default DNS server addresses with 208.67.222.222 and 208.67.220.220)
  3. You can set up a proxy which redirects web traffic to one of the computers in your house or a third-party service. This is how the monitoring software for parents and custodial services monitor or block web traffic.

In the remainder of this quick tutorial, we focus on method #2..

Once you configure your router to use the two DNS servers at OpenDNS.com, create a free account on their web site. Then, enable the logging feature. It not only shows you visited domains, it maps them into actual domain names and subdomains—making it easy to search, sort or analyze traffic.

You can download a spreadsheets and sort by number of visits or by the domains visited. Logs are maintained for only two weeks. So, if you wish to maintain a history, you will need to visit OpenDNS and download them regularly. (Check their user forum. Someone has created a safe, single-line DOS command that downloads these activity logs to your PC).


[1] VPN, Onion Routing and Encryption

If an individual in your home or office is using a Virtual Private Network [VPN], they are effectively covering their tracks with method #3, above. You can see their connection to the VPN service, but that service is either trusted to destroy logs of visited web sites, or anonymize traffic, by routing it through a chain of users that have no way to back-trace and identify the requester’s address.

Since their traffic originates on your network, there are other things you can do to monitor their activities. For example, if they are not using end-to-end encryption, you can use method #3 yourself, to route data in and out through your own PC or service.

[2] Logging the IP address or domain of visited web sites is not a feature of all routers. I have three recent model routers — and only one of them has a feature to log traffic in and out of the network.

[3] OpenDNS cannot discriminate the individual device in your home or office that has accessed websites that it logs. The logs include the traffic for all HTTP access that originates through your internet service subscription.

But some remarkable feature of OpenDNS (other than it being completely free):

a) It speeds up your overall internet experience noticeably! Like Google’s free DNS service, it is more robust and more redundant than the default DNS settings recommended by your internet service provider.

b) It maps every IP address into a domain name. So when you log in to check your logs and statistics, you don’t need to figure what the numbers mean. You view a list that makes sense. You can even search for certain words or web sites.

c) It permits you to block websites based on a very rich set of 100 criteria, including violence, adult content, hate speech, etc.

d) It offers graphs of your network access including overall volume. An example is shown here: