The Linkielist

Linking ideas with the world

Apple Is Rushing to Fix the Telugu Bug as Assholes Use It to ‘Bomb’ People’s iPhones and Macs

While many bugs are relatively benign, often getting patched before the user knows anything is wrong, the latest plague to hit Apple devices is already wreaking havoc on internet. The issue, which has become known as the Telugu bug, gives people the ability to crash a wide range of iPhone, Mac, and iPad apps just Read more about Apple Is Rushing to Fix the Telugu Bug as Assholes Use It to ‘Bomb’ People’s iPhones and Macs[…]

A Hacker Has Wiped a Spyware Company’s Servers—Again

Last year, a vigilante hacker broke into the servers of a company that sells spyware to everyday consumers and wiped their servers, deleting photos captured from monitored devices. A year later, the hacker has done it again. Thursday, the hacker said he started wiping some cloud servers that belong to Retina-X Studios, a Florida-based company Read more about A Hacker Has Wiped a Spyware Company’s Servers—Again[…]

macOS may lose data on APFS-formatted disk images

This week we reported to Apple a serious flaw in macOS that can lead to data loss when using an APFS-formatted disk image. Until Apple issues a macOS update that resolves this problem, we’re dropping support for APFS-formatted disk images. Note: What I describe below applies to APFS sparse disk images only — ordinary APFS Read more about macOS may lose data on APFS-formatted disk images[…]

Missing data hinder replication of artificial intelligence studies

Last year, computer scientists at the University of Montreal (U of M) in Canada were eager to show off a new speech recognition algorithm, and they wanted to compare it to a benchmark, an algorithm from a well-known scientist. The only problem: The benchmark’s source code wasn’t published. The researchers had to recreate it from Read more about Missing data hinder replication of artificial intelligence studies[…]

A phishing attack scored credentials for more than 50,000 Snapchat users

In late July, Snap’s director of engineering emailed the company’s team in response to an unfolding privacy threat. A government official from Dorset in the United Kingdom had provided Snap with information about a recent attack on the company’s users: a publicly available list, embedded in a phishing website named klkviral.org, that listed 55,851 Snapchat Read more about A phishing attack scored credentials for more than 50,000 Snapchat users[…]

Pirates Crack Microsoft’s UWP Protection, Five Layers of DRM Defeated

Video games pirates have reason to celebrate today after scene cracking group CODEX defeated Microsoft’s Universal Windows Platform system on Zoo Tycoon Ultimate Animal Collection. While the game it was protecting isn’t exactly a fan favorite, it was reportedly protected by five layers of DRM within the UWP package, including the Denuvo-like Arxan anti-tamper technology Read more about Pirates Crack Microsoft’s UWP Protection, Five Layers of DRM Defeated[…]

New scanning technique reveals secrets behind great paintings

Researchers in the US have used a new scanning technique to discover a painting underneath one of Pablo Picasso’s great works of art, the Crouching Woman (La Misereuse Accroupie). Underneath the oil painting is a landscape of Barcelona which, it turns out, Picasso used as the basis of his masterpiece. The new x-ray fluorescence system Read more about New scanning technique reveals secrets behind great paintings[…]

Posted in Art

Facebook admits SMS notifications sent using two-factor number was caused by bug

The issue, which may have persisted for months or perhaps even longer, was flagged by Bay Area software engineer Gabriel Lewi, who tweeted about it earlier this week. Prominent technology critic and sociologist Zeynep Tufekci then used the situation as a springboard to criticize Facebook’s alleged unethical behavior, thinking the 2FA notifications may have been Read more about Facebook admits SMS notifications sent using two-factor number was caused by bug[…]

New AI model fills in blank spots in photos

The technology was developed by a team led by Hiroshi Ishikawa, a professor at Japan’s Waseda University. It uses convolutional neural networks, a type of deep learning, to predict missing parts of images. The technology could be used in photo-editing apps. It can also be used to generate 3-D images from real 2-D images. The Read more about New AI model fills in blank spots in photos[…]

0 A.D. | A free, open-source game of ancient warfare

0 A.D. (pronounced “zero-ey-dee”) is a free, open-source, historical Real Time Strategy (RTS) game currently under development by Wildfire Games, a global group of volunteer game developers. As the leader of an ancient civilization, you must gather the resources you need to raise a military force and dominate your enemies. […] We intend to portray Read more about 0 A.D. | A free, open-source game of ancient warfare[…]

LoopX Startup Pulls ICO Exit Scam and Disappears with $4.5 Million

A cryptocurrency startup named LoopX has pulled an exit scam after collecting around $4.5 million from users during an ICO (Initial Coin Offering) held for the past weeks. The LoopX team disappeared out of the blue at the start of the week when it took down its website and deleted its Facebook, Telegram, and YouTube Read more about LoopX Startup Pulls ICO Exit Scam and Disappears with $4.5 Million[…]

Telegram desktop app exploited for malware, cryptocurrency mining

Telegram has fixed a security flaw in its desktop app that hackers spent several months exploiting to install remote-control malware and cryptocurrency miners on vulnerable Windows PCs.The programming cockup was spotted by researchers at Kaspersky in October. It is believed miscreants have been leveraging the bug since at least March. The vulnerability stems from how Read more about Telegram desktop app exploited for malware, cryptocurrency mining[…]

Moth brain uploaded to computer, taught to recognise numbers

MothNet’s computer code, according to the boffins, contains layers of artificial neurons to simulate the bug’s antenna lobe and mushroom body, which are common parts of insect brains. Crucially, instead of recognizing smells, the duo taught MothNet to identify handwritten digits in the MNIST dataset. This database is often used to train and test pattern Read more about Moth brain uploaded to computer, taught to recognise numbers[…]

Roses are red, Facebook is blue. Think private means private? More fool you

In a decision (PDF) handed down yesterday, chief judge Janet DiFiore said that a court could ask someone to hand over any relevant materials as part of discovery ahead of a trial – even if they are private. The threshold for disclosure in a court case “is not whether the materials sought are private but Read more about Roses are red, Facebook is blue. Think private means private? More fool you[…]

Look out, Wiki-geeks. Now Google trains AI to write Wikipedia articles

A paper, out last month and just accepted for this year’s International Conference on Learning Representations (ICLR) in April, describes just how difficult text summarization really is. A few companies have had a crack at it. Salesforce trained a recurrent neural network with reinforcement learning to take information and retell it in a nutshell, and Read more about Look out, Wiki-geeks. Now Google trains AI to write Wikipedia articles[…]

Gfycat Uses Artificial Intelligence to Fight Deepfakes Porn

Gfycat says it’s figured out a way to train an artificial intelligence to spot fraudulent videos. The technology builds on a number of tools Gfycat already used to index the GIFs on its platform. [..] Gfycat’s AI approach leverages two tools it already developed, both (of course) named after felines: Project Angora and Project Maru. Read more about Gfycat Uses Artificial Intelligence to Fight Deepfakes Porn[…]

Consumers prefer security over convenience for the first time ever, IBM Security report finds

“We always talk about the ease of use, and not impacting user experience, etc, but it turns out that when it comes to their financial accounts…people actually would go the extra mile and will use extra security,” Kessem said. Whether it’s using two factor authentication, an SMS message on top of their password, or any Read more about Consumers prefer security over convenience for the first time ever, IBM Security report finds[…]

Do Not, I Repeat, Do Not Download Onavo, Facebook’s Vampiric VPN Service

There’s a new menu item in the Facebook app, first reported by TechCrunch on Monday, labeled “Protect.” Clicking it will send you to the App Store and prompt you to download a Virtual Private Network (VPN) service called Onavo. (“Protect” shows up in the iOS app. Gizmodo looked for it on an Android device and Read more about Do Not, I Repeat, Do Not Download Onavo, Facebook’s Vampiric VPN Service[…]

Fiat Chrysler Pushed A UConnect Update That Causes Constant Reboots With No Announced Fix

It appears that the over-the-air update to the UConnect system went out on Friday, and many, many owners have not had working center-stack systems since then. Many of these vehicles are nearly brand-new, which makes the issue even more maddening. […] The failure of the UConnect system isn’t just limited to not having a radio; Read more about Fiat Chrysler Pushed A UConnect Update That Causes Constant Reboots With No Announced Fix[…]

Announcing “Project Things” – An open framework for connecting your devices to the web.

Today, we are pleased to announce that anyone can now build their own Things Gateway to control their connected device directly from the web. We kicked off “Project Things”, with the goal of building a decentralized ‘Internet of Things’ that is focused on security, privacy, and interoperability. Since our announcement last year, we have continued Read more about Announcing “Project Things” – An open framework for connecting your devices to the web.[…]