Archive for December, 2016 | Monthly archive page

Amazon refuses to let police access US murder suspect’s Echo recordings. Smart water readings were easy for cops. Just to remind you, the more smart devices you have, the more they listen to you. It’s just a totalitarian state away from being used against you. 


Bufferbloat is the undesirable latency that comes from a router or other network equipment buffering too much data. The Bufferbloat projects provide a webspace for addressing chaotic and laggy network performance. We have a number of projects in flight: The Request to FCC for Saner Software Policies is a response to Docket ET 15-170 which […]

Amazon Lumberyard – Free AAA Game Engine

Amazon Lumberyard is a free AAA game engine deeply integrated with AWS and Twitch – with full source. Source: Amazon Lumberyard – Free AAA Game Engine Build your own games for free!

Entrepreneurial experiences ‘no better than textbooks,’ says study

The common thought that learning by experience is most effective when it comes to teaching entrepreneurship at university has been challenged in a new study. An analysis of more than 500 graduates found no significant difference between business schools that offered traditional courses and those that emphasise a ‘learning-by-doing’ approach to entrepreneurship education. The research […]

Uber’s Latest Update seeks location and phone info from non Uber-using friends

Now, instead of plugging in an address, you can sync up your contacts and choose a friend’s name. The lucky buddy will receive a request from Uber—via push notification if they’re an Uber user, and via text message if they’re not—to provide their location. If they accept, their location is then transmitted to the driver, […]

Egypt has blocked encrypted messaging app Signal

Egypt has blocked its residents from accessing encrypted messaging app Signal, according to the application’s developer. Mada Masr, an Egypt-based media organization, reported yesterday that several users took to Twitter over the weekend to report that they could no longer send or receive messages while on Egyptian IP addresses. Open Whisper Systems, the team behind […]

IOActive Labs disects a Panasonic Inflight Entertainment System

These guys have had a poke around some publically available firmwares and describe how it works Source: IOActive Labs Research: In Flight Hacking System

Google releases crypto library checker tools

We’re excited to announce the release of Project Wycheproof, a set of security tests that check cryptographic software libraries for known weaknesses. We’ve developed over 80 test cases which have uncovered more than 40 security bugs (some tests or bugs are not open sourced today, as they are being fixed by vendors). For example, we […]

Charting All the Beer Styles

The Beer Judge Certification Program lists 100 styles with defined ranges of alcohol by volume (ABV), bitterness (measured in IBUs, or International Bittering Units), and color (measured using SRM, or Standard Reference Method).Below is a series of charts for all 100 styles. Mouseover any style for more details and commercial examples. Rectangles to the top […]

Hackers hit Thai sites to protest restrictive internet law

The new law would allow Thailand authorities to intercept private communication and to censor websites without a court order. “The bill is very broad and open to interpretation and we will have to see how the government will implement these laws,” said Arthit Suriyawongkul of the Thai Netizen Network, which promotes online freedom. Source: Hackers […]

Tor blocked in Turkey as government cracks down on VPN use

In late 2016 reports surfaced that Turkey had ordered ISPs to block access to Tor and several commercial VPN services. On 5 December, ISP industry representatives Turk Internet reported growing pressure to complete the ban, including demands for weekly progress reports on the status of the new technical restrictions. Users started reporting connectivity issues around […]

World Energy Hits a Turning Point: Solar That’s Cheaper Than Wind – Bloomberg

A transformation is happening in global energy markets that’s worth noting as 2016 comes to an end: Solar power, for the first time, is becoming the cheapest form of new electricity. This has happened in isolated projects in the past: an especially competitive auction in the Middle East, for example, resulting in record-cheap solar costs. […]

Yahoo Suffers World’s Biggest Hack Affecting 1 Billion Users ub 2013

Yahoo has discovered a 3-year-old security breach that enabled a hacker to compromise more than 1 billion user accounts, breaking the company’s own humiliating record for the biggest security breach in history. The digital heist disclosed Wednesday occurred in August 2013, more than a year before a separate hack that Yahoo announced nearly three months […]

The New and Improved Privacy Badger 2.0 Is Here | Electronic Frontier Foundation

Privacy Badger is a browser extension that automatically blocks hidden third-party trackers that would otherwise follow you around the web and spy on your browsing habits. Privacy Badger now has approximately 900,000 daily users and counting. Third-party tracking—that is, when advertisers and websites track your browsing activity across the web without your knowledge, control, or […]

Dear hackers, Ubuntu’s app crash reporter will happily execute your evil code on a victim’s box

To everyone else, get patching Source: Dear hackers, Ubuntu’s app crash reporter will happily execute your evil code on a victim’s box

Orbital ATK air launches Pegasus XL CYGNSS

Our Pegasus rocket successfully launched NASA’s Cyclone Global Navigation Satellite System (CYGNSS) from our L-1011 Stargazer aircraft this morning at 8:37 a.m. EST, and completed payload deployment at 8:52 a.m. To learn more about the CYGNSS mission, visit NASA’s blog here. About the Mission The three-stage Pegasus XL will be used to deploy eight small […]

Hacking: macOS FileVault2 Password Retrieval

macOS FileVault2 let attackers with physical access retrieve the password in clear text by plugging in a $300 Thunderbolt device into a locked or sleeping mac. The password may be used to unlock the mac to access everything on it. To secure your mac just update it with the December 2016 patches.Anyone including, but not […]

Radio Garden – Explore live radio by rotating the globe.

Source: Radio Garden

SWIFT confirms 1/5th of cyber attacks get through, steal money.

Cyber attacks targeting the global bank transfer system have succeeded in stealing funds since February’s heist of $81 million from the Bangladesh central bank as hackers have become more sophisticated in their tactics, according to a SWIFT official and a previously undisclosed letter the organization sent to banks worldwide. Source: Exclusive: SWIFT confirms new cyber […]

Deconvolution and Checkerboard Artifacts — Distill

When we look very closely at images generated by neural networks, we often see a strange checkerboard pattern of artifacts. It’s more obvious in some cases than others, but a large fraction of recent models exhibit this behavior. Mysteriously, the checkerboard pattern tends to be most prominent in images with strong colors. What’s going on? […]

How to Use t-SNE Effectively — Distill

A popular method for exploring high-dimensional data is something called t-SNE, introduced by van der Maaten and Hinton in 2008. The technique has become widespread in the field of machine learning, since it has an almost magical ability to create compelling two-dimensonal “maps” from data with hundreds or even thousands of dimensions. Although impressive, these […]

Attention and Augmented Recurrent Neural Networks — Distill

Recurrent neural networks are one of the staples of deep learning, allowing neural networks to work with sequences of data like text, audio and video. They can be used to boil a sequence down into a high-level understanding, to annotate sequences, and even to generate new sequences from scratch! Source: Attention and Augmented Recurrent Neural […]

Deep Learning An MIT Press book

The Deep Learning textbook is a resource intended to help students and practitioners enter the field of machine learning in general and deep learning in particular. The online version of the book is now complete and will remain available online for free. Source: Deep Learning

Neural networks and deep learning

Neural Networks and Deep Learning is a free online book. The book will teach you about: Neural networks, a beautiful biologically-inspired programming paradigm which enables a computer to learn from observational data Deep learning, a powerful set of techniques for learning in neural networks Neural networks and deep learning currently provide the best solutions to […]

Experiments in Handwriting with a Neural Network

Several interactive visualizations of a generative model of handwriting. Some are fun, some are serious. Source: Experiments in Handwriting with a Neural Network — Distill

Skip to toolbar