БЛОГ

Archive for the ‘hacking’ category: Page 2

Sep 4, 2016

‘Abolish artificial scarcity’: @KevinCarson1

Posted by in categories: disruptive technology, economics, futurism, government, hacking, hardware, policy, transhumanism

Predicting an economic “singularity” approaching, Kevin Carson from the Center for a Stateless Society writes in The Homebrew Industrial Revolution (2010) we can look forward to a vibrant “alternative economy” driven less and less by corporate and state leviathans.

According to Carson, “the more technical advances lower the capital outlays and overhead for production in the informal economy, the more the economic calculus is shifted” (p. 357). While this sums up the message of the book and its relevance to advocates of open existing and emerging technologies, the analysis Carson offers to reach his conclusions is extensive and sophisticated.

With the technology of individual creativity expanding constantly, the analysis goes, “increasing competition, easy diffusion of new technology and technique, and increasing transparency of cost structure will – between them – arbitrage the rate of profit to virtually zero and squeeze artificial scarcity rents” (p. 346).

An unrivalled champion of arguments against “intellectual property”, the author believes IP to be nothing more than a last-ditch attempt by talentless corporations to continue making profit at the expensive of true creators and scientists (p. 114–129). The view has significant merit.

Continue reading “'Abolish artificial scarcity': @KevinCarson1” »

Feb 22, 2016

Is San Bernardino iPhone Fully Encrypted?

Posted by in categories: encryption, government, hacking, law enforcement, mobile phones, policy, privacy, security

Here is a question that keeps me up at night…

Is the San Bernardino iPhone just locked or is it properly encrypted?

Isn’t full encryption beyond the reach of forensic investigators? So we come to the real question: If critical data on the San Bernardino iPhone is properly encrypted, and if the Islamic terrorist who shot innocent Americans used a good password, then what is it that the FBI thinks that Apple can do to help crack this phone? Doesn’t good encryption thwart forensic analysis, even by the FBI and the maker of the phone?

iphone-01In the case of Syed Rizwan Farook’s iPhone, the FBI doesn’t know if the shooter used a long and sufficiently unobvious password. They plan to try a rapid-fire dictionary attack and other predictive algorithms to deduce the password. But the content of the iPhone is protected by a closely coupled hardware feature that will disable the phone and even erase memory, if it detects multiple attempts with the wrong password. The FBI wants Apple to help them defeat this hardware sentry, so that they can launch a brute force hack—trying thousands of passwords each second. Without Apple’s help, the crack detection hardware could automatically erase incriminating evidence, leaving investigators in the dark.

Continue reading “Is San Bernardino iPhone Fully Encrypted?” »

Oct 15, 2015

Billions in Change — Official Film

Posted by in categories: complex systems, energy, ethics, hacking, health, materials, sustainability, water

https://www.youtube.com/watch?v=YY7f1t9y9a0

“The world is facing some huge problems. There’s a lot of talk about how to solve them. But talk doesn’t reduce pollution, or grow food, or heal the sick. That takes doing. This film is the story about a group of doers, the elegantly simple inventions they have made to change the lives of billions of people, and the unconventional billionaire spearheading the project.”

Sep 4, 2015

Changing the World Panel—Singularity Summit 2009—Peter Thiel, Eliezer Yudkowsky, Aubrey de Grey — MIRI | Vimeo.com

Posted by in categories: hacking, innovation, life extension, robotics/AI, Singularity University

Aug 18, 2015

FDA approved the first 3D-printed prescription drug

Posted by in categories: 3D printing, disruptive technology, drones, hacking

How 3D printing is changing the way we manufacture and produce is already a fact, step by step, in different areas, from aerospace to the medical areas.

How will this impact the established processes, the economy, the patient …

Is this the dawn of personalized medicine? patients will be able to print their own pills at home? Will 3D printing represent an enhancement to distribution processes?

Continue reading “FDA approved the first 3D-printed prescription drug” »

Jun 9, 2015

World’s first biolimb … By Akshat Rathi | Quartz

Posted by in categories: biological, biotech/medical, DNA, education, ethics, futurism, genetics, hacking, hardware, health

The idea is simple. First, they take an arm from a dead rat and put it through a process of decellularization using detergents. This leaves behind a white scaffold. The scaffold is key because no artificial reconstructions come close to replicating the intricacies of a natural one.

Read more

Jun 3, 2015

How the Tech Behind Bitcoin Could Stop the Next Snowden — Klint Finley Wired

Posted by in categories: bitcoin, encryption, government, hacking, information science, privacy, security

The National Security Agency knows Edward Snowden disclosed many of its innermost secrets when he revealed how aggressive its surveillance tactics are. What it doesn’t know is just how much information the whistleblower took with him when he left.

For all of its ability to track our telecommunications, the NSA seemingly has little clue exactly what documents, or even how many documents, Snowden gave to the media. Like most large organizations, the NSA had tools in place to track who accessed what data and when. But Snowden, a system administrator, apparently was able to cover his tracks by deleting or modifying the log files that tracked that access. Read more

Jun 2, 2015

The Arctic’s Internet Is So Expensive That People Mail the Web on USB Drives — Via Motherboard

Posted by in categories: business, computing, economics, finance, governance, hacking, policy, strategy

Unknown

“Canada’s domestic digital divide, with the North as its epicenter, has been a point of growing concern over the last several years. Much of the internet in the northernmost regions of the country is still beamed down by satellites, but a plan to link Europe and Asia with fiber optic cable via Nunavut is currently being negotiated by a Toronto-based company called Arctic Fibre.”

Read more

May 2, 2015

WikiLeaks Finally Brings Back Its Submission System for Your Secrets

Posted by in categories: hacking, open access, open source, privacy

— Wired
It’s taken close to half a decade. But WikiLeaks is back in the business of accepting truly anonymous leaks.

On Friday, the secret-spilling group announced that it has finally relaunched a beta version of its leak submission system, a file-upload site that runs on the anonymity software Tor to allow uploaders to share documents and tips while protecting their identity from any network eavesdropper, and even from WikiLeaks itself. The relaunch of that page—which in the past served as the core of WikiLeaks’ transparency mission—comes four and a half years after WikiLeaks’ last submission system went down amid infighting between WikiLeaks’ leaders and several of its disenchanted staffers. Read more

Apr 25, 2015

A Way to Hide Corporate Data from Hackers

Posted by in categories: business, hacking

By Tom Simonite — MIT Technology Review
Social-security and credit-card numbers frequently leak or are stolen from corporate networks—and surface on the black market. Adam Ghetti, founder of Ionic Security, says he has invented technology that could largely end the problem. His software keeps corporate data such as e-mails and documents encrypted at all times, except for when someone views it on an authorized computer or mobile device.

Workers at a company using Ghetti’s system can create and exchange e-mails or documents as normal. But Ionic’s software invisibly encrypts what they type on the fly. If someone tries to load a stolen document on a computer outside the company’s network, they would see only the encrypted data—a jumbled string of letters. “A network breach no longer has to mean a data breach,” says Ghetti.

Read more

Page 2 of 41234