cyph3rPunk

joined 2 years ago
MODERATOR OF
 

Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography

note1: Yes, it should have been 'Obi Wan' not 'Obi One' :) note2: The string of 'garbage' text in the two examples should have been different to illustrate more clearly that there are two different systems in use.

 

Sipeed Lichee Pi 4A RISC-V SBC review and Debian demo. This is the first RISC-V computer I’ve tested that's provided a usable desktop computing experience right out of the box. End-user RISC-V is starting to arrive! :)

You can learn more about the Lichee Pi 4A on its web page here: https://sipeed.com/licheepi4a

And the board has excellent documentation here: https://wiki.sipeed.com/licheepi4a.html

Note that the hardware I used in this video was purchased from AliExpress: https://www.aliexpress.com/item/10050...

I have reviewed four previous RISC-V SBCs, including the StarFive VisionFive 2, which also (after some messing around) provides a good desktop experience:

• VisionFive 2: RISC-V Quad Core Low Co...

I also have an 2023 update on RISC-V developments here:

• RISC-V 2023 Update: From Embedded Com...

And my general introduction to RISC-V is here:

• Explaining RISC-V: An x86 & ARM Alter...

For additional ExplainingComputers videos and other content, you learn about becoming a channel member here:

/ @explainingcomputers

More videos on computing and related topics can be found at:

/ @explainingcomputers

You may also like my ExplainingTheFuture channel at:

/ @explainingthefuture

Chapters: 00:00 Introduction 00:45 Unboxing 03:33 Specifications 07:26 First Boot 10:37 Debian Demo 18:10 Another Milestone

 

Slides - https://authress.io/l/codemotion

Conference: Codemotion Madrid 2023 https://talks.codemotion.com/why-you-...

Can someone recommend a more secure method? I've been told many times that using git for secret management would present a potential vulnerability.

 

Ethereum is a platform that makes it possible for any developer to write and distribute next-generation decentralized applications.

Borrowing the concept of distributed consensus and cryptographic proof that makes cryptocurrencies such as Bitcoin so effective in trustless payments, Ethereum extends the use of these technologies to trustless agreements. This allows developers to easily build innovative new products on a censorship and collusion-resistant foundation.

Ethereum will go live in Q4 2014, in the meantime we are regularly releasing alpha software so you can try your hand at building distributed applications.


Main site: https://www.ethereum.org/

Forums: https://forum.ethereum.org/

Github: https://github.com/ethereum

Blog: http://blog.ethereum.org/

Code Releases: https://code.ethereum.org/

Wiki: http://wiki.ethereum.org/

Meetups: http://ethereum.meetup.com/

Whitepaper: http://ethereum.org/ethereum.html

Facebook: https://www.facebook.com/ethereumproject

Google+: http://google.com/+EthereumOrgOfficial

IRC Freenode: #ethereum

 

Using blockchain for voting could be risky, as the technology could introduce “new vulnerabilities” to elections, according to a new Government Accountability Office report.

While some organizations have argued that blockchain-based systems would make elections more secure and easier to audit, “there might be added points of attack that could compromise elections,” the report said.

“We talked to a number of experts who all indicated that they did not believe blockchain was the magic bullet answer for making voting systems more secure,” Karen Howard, the GAO’s director of Science, Technology Assessment and Analytics, told Protocol.

The GAO report, titled “Blockchain: Emerging Technology Offers Benefits for Some Applications but Faces Challenges,” examined the potential of the technology, including in the public sector. Overall, the report “found that blockchain is useful for some applications but limited or even problematic for others.”

“For example, because of its tamper resistance, it may be useful for applications involving many participants who do not necessarily trust each other,” the report said. “But it may be overly complex for a few trusted users, where traditional spreadsheets and databases may be more helpful.”

One area where blockchain shows some promise is in supply chain management, Howard said.

“The federal government is a major purchaser and supply chain tracking is a major function,” she said. The GAO found that blockchain technology could potentially be used “to replace or make more efficient” certain processes such as supply chain tracking and recording contracts, Howard said.


I disagree with this tiny little article, of course. But, I wanted to play devil's advocate for a moment on this idea.


Top Teddit comment by /u/denverpilot:

"Summary of article:

Tracking things with a cryptographically solid chain of custody might be hard… because… hand wave… we like spreadsheets better and our admin level people are dumb.

And we’ll distract and talk about supply chains instead because… that sounds more interesting… even though we were tasked with looking at voting.

I don’t think the bureaucrat understood the assignment."

 

My first espresso machine, a rocket appartamento, has turned into a testbed for all my ideas of how much technology you can pack into an espresso machine. Let me share what I've done, and please ask about what you would like to hear more of!

↓PARTS↓

  • Dual Pressure Gauge: Bezzera 7432524 on 1st-line.com
  • 24 Power Supply: Mean Well SDR-120-24
  • Digital Thermometer: Eric's e61 thermometer, appears to be out of stock :(
  • Gear Pump: Fluid-O-tech MG304. Reach out to your local modbar technician
  • Temperature Sensor: La Spaziale Dream Temperature Probe from chriscoffee.com
  • Linear Potentiometer: BI model 404 from Mouser, TTI, etc
  • Controller: Arduino IoT 33
  • Capillary tube: Quick Mill RA0970CMN from chriscoffee.com
  • Stainless tube: 1/8" F to 1/8" F 30cm V_884 from EspressoParts.com
  • Flowmeter: Low Pressure NSF Flowmeter S_962 From EspressoParts.com
 

Kevin Mitnick (RIP) visits Google's NYC office to discuss his book "Ghost in the Wires: My Adventures as the World's Most Wanted Hacker" with Eran Feigenbaum, Google's Director of Security for Google Apps. This event took place on August 17, 2011, as part of the Authors@Google series.

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.

Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI's net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down.

Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.

 

Secret texts buried in a picture of your dog? Image Analyst Dr. Mike Pound explains the art of steganography in digital images.

27
submitted 2 years ago* (last edited 2 years ago) by [email protected] to c/[email protected]
 

In the early 1990s, a group of mathematicians, misfits, hackers, and hobbyists calling themselves "the cypherpunks" came together around a shared belief that the internet would either demolish society's artificial walls or lay the groundwork for an Orwellian state. They saw cryptography as a weapon against central planning and surveillance in this new virtual world.

The philosophical and technical ideas explored on the cypherpunks' widely read email list, which launched in 1992, influenced the creation of bitcoin, WikiLeaks, Tor, BitTorrent, and the Silk Road. The cypherpunks anticipated the promise and the peril that lay ahead when the internet went mainstream, including new threats to privacy and the possibility of building virtual platforms for communication and trade that would be impervious to government regulators.

 

In this video I explore an elaborate cryptographic internet puzzle orchestrated by a mysterious individual or group known as Cicada 3301.

Puzzle: The puzzle I hid in this video has been solved.

view more: ‹ prev next ›