technology
https://nitter.net/nypost/status/1707394622559846904
https://nypost.com/2023/09/28/meta-sparks-privacy-fears-with-smart-glasses-hidden-cameras/?utm_medium=social&utm_campaign=nypost&utm_source=twitter
https://www.engadget.com/a-food-delivery-robots-footage-led-to-a-criminal-conviction-in-la-190854339.html
- www.raspberrypi.com Introducing: Raspberry Pi 5! - Raspberry Pi
Announcing Raspberry Pi 5, coming in late October: over 2x faster than Raspberry Pi 4, featuring silicon designed in-house at Raspberry Pi.
Why is there no seekbar and why can you only pause?
Why does scrolling up or down on the mouse wheel bring up another video?
Why is it siloed off into its own thing anyway? They're just short videos.
- techcrunch.com Tinder snobs can now pay $499 per month to be matched with the 'most sought after' profiles | TechCrunch
Tinder has rolled out its promised high-end membership, a pricey $499 per month subscription dubbed "Tinder Select," which includes unique perks like the
???
Bonus points if you post a link or meme I can share with family and friends
- theconversation.com Online safety bill: why making the UK the 'safest place to go online' is not as easy as the government claims
The long-awaited legislation still has serious gaps.
YouTube Video
Click to view this content.
This looks lovely.
YouTube Video
Click to view this content.
- www.theregister.com China can't produce those 7nm Huawei phone chips 'at scale'
Or so says US Commerce Secretary
Surprisingly good comments section. Even got one poster saying “Comeonguys, stop being so anti-US.”
Thanks for ruining the rotating login screen photos you assholes, I actually liked those !owl-pissed
I'm sure everyone alive on Planet Earth already knew about Todd Howard's latest Gamebryo-powered mess
I love that this ad is presented just like a picture of a savannah or a castle
- vt.co Elon Musk Is Considering Making Everyone Pay To Use Twitter
Elon Musk's takeover of Twitter has been contentious since its outset and his latest proposal is set to ruffle even more feathers. The billionaire, 52, famously bought the social media platform last year for a reported $44 billion and immediately began implementing many controversial changes. As wel...
On this day in 1983, a patent was granted to MIT for a new cryptographic algorithm: RSA. "RSA" stands for the names of its creators Rivest, Shamir, and Adlemen. RSA is a "public-key" cryptosystem. Prior to the creation of RSA, public-key cryptography was not in wide use.
Public-key cryptography
Cryptography is the study and practice of secure communication. Throughout most of its historical use, cryptographic techniques were entirely dependent on the involved parties already sharing a secret that could be used to reverse an encryption process. In early cryptography, the secret was itself the encryption process (for example, a Caesar cipher that substitutes letters in a secret message with letters a fixed number of steps down the alphabet). As cryptography became more systematic and widespread in use, it became necessary to separate cryptographic secrets from the cryptographic techniques themselves because the techniques could become known by the enemy (as well as static cryptographic schemes being more vulnerable to cryptanalysis). Regardless, there is still the issue of needing to share secrets between the communicating parties securely. This has taken many forms over the years, from word of mouth to systems of secure distribution of codebooks. But this kind of cryptography always requires an initial secure channel of communication to exchange secrets before an insecure channel can be made secure by the use of cryptography. And there is the risk of an enemy capturing keys and making the entire system worthless.
Only relatively recently has this fundamental problem been addressed in the form of public-key cryptography. In the late 20th century, it was proposed that a form of cryptography could exist where the 2 parties, seeking to communicate securely, could exchange some non-secret information (a "public" key) derived from privately held secret information (a "private" key), and use a mathematical function (a "trap-door" function) that is easy to compute in one direction (encryption) but hard to reverse without special information (decryption) to encipher messages to each other, using each other's respective public keys, that can't be easily decrypted without the corresponding private key. In other words, it should be easy to encipher messages to each other using a public key but hard to decrypt messages without the related private key. At the time this idea was proposed there was no known computationally-hard trap-door function that could make this possible in practice. Shortly after, several candidates and cryptosystems based upon them were described publicly 👁, including one that is still with us today...
RSA
Ron Rivest, Adi Shamir, and Leonard Adleman at MIT had made many attempts to find a suitably secure trap-door function for creating a public-key cryptosystem over a year leading up to the publication of their famous paper in 1978. Rivest and Shamir, the computer scientists of the group, would create a candidate trap-door function while Adleman, the mathematician, would try to find a way to easily reverse the function without any other information (like a public key). Supposedly, it took them 42 attempts before they created a promising new trap-door function.
As described in their 1978 paper "A method for obtaining digital signatures and public-key cryptosystems", RSA is based upon the principle that factoring very large numbers is computationally difficult (for now!). The paper is a great read, if you're interested in these topics. The impact of RSA can't be overstated. The security of communications on the internet have been dependent on RSA and other public-key cryptosystems since the very beginning. If you check your browser's connection info right now, you'll see that the cryptographic signature attached to Hexbear's certificate is based on RSA! In the past, even the exchange of symmetric cipher keys between your web browser and the web server would have been conducted with RSA but there has been a move away from that to ensure the compromise of either side's RSA private keys would not compromise all communications that ever happened.
The future of RSA?
In 1994, a mathematician named Peter Shor, developed an algorithm for quantum computers that would be capable of factoring the large integers used in the RSA scheme. In spite of this, RSA has seen widespead and increasing use in securing communications on the internet. Until recently, the creation of a large enough quantum computer to run Shor's algorithm at sufficient scale was seen as very far off. With advances in practical quantum computers though, RSA is on its way out. Although current quantum computers are still a very long way off from being able to break RSA, it's looking more and more plausable that someone could eventually build one that is capable of cracking RSA. A competition being held by the US National Institute of Standards and Technology, similar to the one that selected the Advanced Encryption Algorithm, is already underway to select standard cryptographic algorithms that can survive attacks from quantum computers.
Megathreads and spaces to hang out:
- ❤️ Come listen to music and Watch movies with your fellow Hexbears nerd, in Cy.tube
- 💖 Come talk in the New Weekly Queer thread
- 💛 Read and talk about a current topics in the News Megathread
- ⭐️ September Movie Nominations ⭐️
reminders:
- 💚 You nerds can join specific comms to see posts about all sorts of topics
- 💙 Hexbear’s algorithm prioritizes comments over upbears
- 💜 Sorting by new you nerd
- 🌈 If you ever want to make your own megathread, you can reserve a spot here nerd
- 🐶 Join the unofficial Hexbear-adjacent Mastodon instance toots.matapacos.dog
Links To Resources (Aid and Theory):
Aid:
Theory:
- www.linkedin.com AI-enabled operations: K-LLMs, not LLMs. See how Palantir CTO Shyam Sankar's AIP product update. | Palantir Technologies posted on the topic | LinkedIn
The future of AI-enabled operations is not an LLM; it is K-LLMs. "You send the entirety of each of the responses to a synthesis stage to understand, rate, and… | 123 comments on LinkedIn
Couldn't have picked a better time to come up with an outrageously greedy change to an existing service huh
https://www.cnn.com/2022/03/12/business/walgreens-freezer-screens/index.html
https://www.businessinsider.com/elon-musk-hung-up-tesla-worker-inside-burning-factory-report-2023-9
YouTube Video
Click to view this content.
YouTube Video
Click to view this content.
they fixed it :(
cross-posted from: https://hexbear.net/post/621898
> In this photo, you can see how much the on-die cache has expanded compared to its predecessors and other contemporary embedded microprocessors. Really foreshadowing the kind of optimizations that would become commonplace today. In addition to its very large (for the time) 4-way set associative 256kb on-die secondary cache, it featured a 16k primary instruction cache and 16k primary data cache. It was fabricated at a 250 nanometer feature size and could be clocked up to 263 MHz. With its dual-issue superscalar 5-stage pipeline, it could achieve a Dhrystone score of 450 DMIPS at 263 MHz, a impressive score for embedded microprocessors of the time, although this benchmark really doesn't show off its cache performance. > > Anyway, hope you like the pretty die shot of this forgotten microprocessor.
- https:// archive.ph /XH8st
The article says it profiles people using standard adtech stuff and can then target devices for its malware.
YouTube Video
Click to view this content.
YouTube Video
Click to view this content.
YouTube Video
Click to view this content.
I like Mullvad but it doesn't support port forwarding, which I'd like in order seed torrents effectively. I have symmetrical up/down speeds but barely use the upload speed and I want to help out a lil more !kitty-cri-texas
Thanks in advance
- freemusicdemixer.com free-music-demixer
Free AI-based music demixer. Perform music demixing or stem separation with AI on your own computer, private, free, and with no usage limits
Would I have to run stock Android with Google stuff?
Because then I'm still in the !amerikkka ecosystem for software.
Or does it have a Huawei OS?
What lemmy clients for android do y'all use? I browse mainly with jerboa but I usually run into issues commenting or posting.
- news.drweb.com Pandora's box is now open: the well-known Mirai trojan arrives in a new disguise to Android-based TV sets and TV boxes
Doctor Web has identified a family of Android.Pandora trojans that compromise Android devices, either during firmware updates or when applications for viewing pirated video content are installed. This backdoor inherited its advanced DDoS-attack capabilities from its ancestor, the well-known <b>Linux...
cross-posted from: https://lemdro.id/post/1339609
> https://www.tomsguide.com/news/millions-of-cheap-android-tv-boxes-come-pre-infected-with-botnet-malware