"U.S. attorney general William Barr has said consumers should accept the risks that encryption backdoors pose to their personal cybersecurity to ensure law enforcement can access encrypted communications." 🙄 https://techcrunch.com/2019/07/23/william-barr-consumers-security-risks-backdoors/
I like the idea.. a processor inside a memory
Will In-Memory Processing Work?
Changes that sidestep von Neumann architecture could be key to low-power ML hardware.
A privacy win last week as the California Senate Judiciary Committee blocked Big-Tech-backed efforts to weaken the privacy protections secured by the California Consumer Privacy Act! https://www.eff.org/deeplinks/2019/07/californias-senate-judiciary-committee-blocks-efforts-weaken-californias-privacy
Shrinking Linux Attack Surfaces
Often, a kernel developer will try to reduce the size of an attack surface against #Linux, even if it can't be closed entirely. It's generally a toss-up whether such a patch makes it into the kernel...
New breach: Invitations website Evite had 101M unique email addresses breached this year from a 2013 archive (most were invite recipients). Members also had names, phones, DoBs & plain text passwords exposed. 65% were already in @haveibeenpwned. Read more: https://www.evite.com/security/update?usource=lc&lctid=1800182
Goodbye Aberration: Physicist Solves 2,000-Year-Old Optical Problem
When you look through your viewfinder and things seem a little bit blurry or lacking definition, it's probably because you are using an “el cheapo” lens.
how to have fun with gaming engines
🚨 Foreigners crossing certain Chinese borders are being forced to install malware on their Android phones.
"The malware downloads a tourist’s text messages, calendar entries, and phone logs, as well as scans the device for over 70,000 different files." https://www.vice.com/en_us/article/7xgame/at-chinese-border-tourists-forced-to-install-a-text-stealing-piece-of-malware
@dmknght hello my friend
Sysadmin | Pentester | Gopher | Pythonist | Parrot OS Team Leader
I love free software and hacking.
Dance like no one is watching, encrypt like everyone is.