proof wrong but, sorry to say but… would it not be possible that messing with bacteria DNA that by accident scientists creates new pathogens? new deadly diseases? so it’s one thing to write a program that dos “hello world” and […]
“floating point arithmetic is considered an esoteric subject by many people” (src: What Every Computer Scientist Should Know About Floating Point Arithmetic – David Goldberg 1991.pdf) some even do “transcendental calculations” (src) make no mistake: computer make mistakes too! not […]
“In June of this year, “Ripple20” (not only) shook the Internet of things: 19 vulnerabilities in a TCP/IP Stack for Embedded devices made “hundreds of millions” devices vulnerable, according to their discoverers. Now, Stack analysis by another team of researchers […]
SecurityLab, [14.07.20 15:35] The Electronic Frontier Foundation (EFF) has unveiled a new database demonstrating how and where us law enforcement agencies use tracking technologies. A map of the use of tracking technologies in the United States is presented (https://www.securitylab.ru/news/510018.php) SecurityLab, […]
All SmartPhones are spies! that’s why Merkel keeps the Nokia from 1995 (even if that device is spied on as well, because it can not end2end encrypt sms or phone calls (*FAIL*! X-D)) Putin does not have a mobile phone […]
The Age of Surveillance Capitalism: “be careful what you reveal to your friend” (the internet) https://irlpodcast.org/season4/episode5/ what if – instead of security – Google wants mass surveillance and a direct uplink to the US-Pentagon to blow all “terrorists” (basically anyone […]
The Great A.I. Awakening: A Conversation with Eric Schmidt Feb 23, 2017 as user might have noticed, the battle Amazon vs Microsoft who will get the $10Billion DoD cloud computing contract is still hot. And maybe the contract is split. […]
sorry this post will have to do nothing with linux X-D (unless one is pretty sure all those corona overview and prediction dashboards run on gnu linux servers) … what Mr Gates probably underestimated, that because of globalization and maximizing […]
this is why high quality journalism and education are sooooo important: trust is so important & journalism should be about truth and trust context: media outlets that use numbers out of context (do those numbers apply to the US, or […]
As with all hot debated topics: Linus Torvald’s “show me the source” in this case, the source of one’s informations (always give the source!) is IMPORTANT for the information’s credibility. It is absolutely vital in science to give all sources […]
don’t be evil “Google controls about 62% of mobile browsers, 69% of desktop browsers, and the operating systems on 71% of mobile devices in the world. 92% of internet searches go through Google and 73% of American adults use YouTube. […]
servers/clients/computers/programs/services/webservers need accurate time… they usually get it from time servers that have an atomic clock attached to their USB port. (just guessing) ping time.google.com PING time.google.com (216.239.35.4) 56(84) bytes of data. 64 bytes from time2.google.com (216.239.35.4): icmp_seq=1 ttl=46 time=43.5 […]
Pwn2Own 2020: opening a pdf can be enough to compromise system! https://youtu.be/u1udr7j9MQA?t=359 thank you ccc you are doing a lovely work – make this planet more interesting by creativity and more informed about security 🙂 keep it up 🙂 https://cdn.media.ccc.de/events/gpn/gpn19/h264-hd/gpn19-45-eng-BADPDF_-_Stealing_Windows_Credentials_via_PDF_Files_hd.mp4 […]
google’s security lab “project zero“ has made itself a name. (you can subscribe to their rss feed with thunderbird.) Posted by Ben Hawkes, Project Zero (team lead) (2019-05-15) Project Zero’s team mission is to “make zero-day hard”, i.e. to make […]
as far as i understood the “string theory” and also Einstein’s Theory is that on the smallest building blocks Matter = is actually = Energy, in “string theory” this energy is resembled as a vibrating string, if it vibrates in […]
“The cost to companies from malware and “malicious insider”-related cyberattacks jumped +12 percent in 2018 and accounted for one-third of all cyberattack costs, according to new research published today by Accenture and the Ponemon Institute.” src: helpnetsecurity.com logical consequence: stop […]
it will kill “only” 15% of all cars, because electronics of cars/trucks already are “spark-resistant” designed, because sparky things with many many volts is going on under the hood. 2016: https://www.heise.de/tp/features/Schutz-vor-einem-EMP-Angriff-3222031.html there is nothing more annoying than a backup that […]
what to do to improve online privacy? use a privacy respecting DNS server by https://www.opennic.org/ for example: 195.10.195.195 (not google’s (8.8.8.8)) use Freifunk use a VPN such as: mullvad VPN https://mullvad.net/en/help/pricing-discounts/ https://mullvad.net/en/check/ Mozilla launched it’s own VPN service https://vpn.mozilla.org/ use tor […]
Is social media, facebook, twitter endangering democracy? Well if you bring in rich individuals such as Mr Mercer with the need to manipulate society: YES. “Cambridge Analytica is a Full Service Propaganda Machine” “In 2016 CA worked for Donald Trump’s […]
“Thinking is hard work and not worth the effort” (The Love Police) Ever wondered why WhatsApp is for free? It is a self-surveillance tool. Phones with closed-source wifi drivers are cheap. Because to know the last detail about you – […]
“You will constantly have to fight for even the most basic of rights – and build your own infrastructure – or your government will spy on you and lobbyists try to take away your freedoms.” Watch this video and this: […]
you can change to the last used directory by cd – # example cd; # go to home directory cd /; # go to root directory cd -; # again back to home directory cd -; # again in root […]
Is it an easter egg? No it’s a 100% Open Source Transparent “Free” Hardware Mobile Phone … why is nobody kickstarting this further to make it run android apps :-D? (okay this would mean it needs to run OpenJDK) Version […]