Microsoft avverte: l’Ai è bella, ma gli attacchi di avvelenamento sono in aumento
📌 Link all'articolo : redhotcyber.com/post/microsoft…
#redhotcyber #news #microsoft #intelligenzaartificiale #cybersecurity #hacking #malware #ia
Microsoft avverte: l'Ai è bella, ma gli attacchi di avvelenamento sono in aumento
Microsoft segnala un aumento degli attacchi di IA Recommendation Poisoning, una tecnica che manipola le risposte degli assistenti AI tramite link e pulsanti.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
EDPB ed EDPS sul Digital omnibus: verso una massiccia semplificazione del GDPR
@Informatica (Italy e non Italy)
Il parere congiunto di EDPB ed EDPS sul pacchetto Digital omnibus ha una parola d’ordine: semplificazione senza rinunciare a innovazione e competitività. Ecco come semplificare il GDPR, cioè l’intero quadro normativo digitale della UE, per
Das Panda, il #cyberpandino e quella pazza idea!
#SocialDebug, come (quasi) sempre, di giovedì 🦄
signorina37.substack.com/p/soc…
Social Debug: Das Panda e perché è più cyber di una Tesla
L'auto migliore? L'ha guidata la generazione migliore ;)Claudia aka signorina37 (Rumore di Fondo)
reshared this
Meta condannata a pagare 30 milioni a Deutsche Telekom per l’uso della rete. Il “fair share” deciso dai giudici
Una corte tedesca ha condannato una filiale di Meta al pagamento di 30 milioni di euro a Deutsche Telekom per servizi di rete utilizzati dalle piattaforme del gruppo (Facebook, Instagram e Whatsapp). Sarà un precedente per le future dispute fra telco e OTT nell'ambito del Digital Networks Act?
key4biz.it/meta-condannata-a-p…
Meta deve pagare 30 milioni a Deutsche Telekom per uso della rete
Corte tedesca ha condanna Meta al pagamento di 30 milioni di euro a Deutsche Telekom per servizi di rete utilizzati dalle sue piattaforme.Paolo Anastasio (Key4biz)
reshared this
securityaffairs.com/187896/unc…
#securityaffairs #hacking #malware
LummaStealer activity spikes post-law enforcement disruption
Bitdefender reports a surge in LummaStealer activity, showing the MaaS infostealer rebounded after 2025 law enforcement disruption.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
AI startup Quesma has open-sourced BinaryAudit, an open-source benchmark for evaluating AI agents' ability to find backdoors hidden in compiled binaries
quesma.com/blog/introducing-bi…
github.com/quesmaOrg/BinaryAud…
We hid backdoors in binaries — Opus 4.6 found 49% of them
BinaryAudit benchmarks AI agents using Ghidra to find backdoors in compiled binaries of real open-source servers, proxies, and network infrastructure.Piotr Grabowski (Quesma)
reshared this
Hacker cinesi in tutte le telecom di Singapore: l’operazione segreta durata 11 mesi
📌 Link all'articolo : redhotcyber.com/post/hacker-ci…
#redhotcyber #news #cyberattacchi #sicurezzainformatica #hacking #malware #operazionicibernetiche #singapore
Hacker cinesi in tutte le telecom di Singapore: l’operazione segreta durata 11 mesi
Gli hacker del gruppo UNC3886 hanno infiltrato le reti di tutti e quattro i principali operatori di telecomunicazioni di Singapore. L'operazione di bonifica è durata 11 mesi.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
RE: techhub.social/@Techmeme/11605…
Polymarket is the new World of Tanks forum
reshared this
The Go Checksum Database guarantees that every Go build on the planet uses the same source for a given module version.
However, GitHub might not show you that code.
words.filippo.io/go-source/?so…
pkg.geomys.dev is a simple service to view the canonical source of a Go module, and it comes with Chrome/Firefox extensions to replace pkg.go.dev source links.
Inspecting the Source of Go Modules
Code hosts like GitHub don't necessarily show the correct source of Go modules. pkg.geomys.dev is a new convenient viewer for module source.words.filippo.io
Cybersecurity & cyberwarfare reshared this.
Here's a little demo of our new pkg.geomys.dev code viewer for Go modules!
Install the (minimal-permissions) extension from chromewebstore.google.com/deta… or addons.mozilla.org/en-US/firef… to link directly to it from pkg.go.dev.
pkg.geomys.dev Source Links - Chrome Web Store
Redirect pkg.go.dev source links to pkg.geomys.dev, which displays the canonical source from the Go Modules Mirror.chromewebstore.google.com
Google says a lot of APTs operationalized LLMs towards the end of last year.
Financially motivated threat actors also experimented with AI tools, but they "have not yet made breakthroughs in developing AI tooling."
cloud.google.com/blog/topics/t…
GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use
Our report on adversarial misuse of AI highlights model extraction, augmented attacks, and new AI-enabled malware.Google Threat Intelligence Group (Google Cloud)
reshared this
Hackers have hijacked the infrastructure of an abandoned Outlook add-in to phish users and steal their Microsoft credentials.
More than 4,000 users of the AgreeTo add-in were compromised in the attack.
koi.ai/blog/agreetosteal-the-f…
AgreeToSteal: The First Malicious Outlook Add-In Leads to 4,000 Stolen Credentials
A legitimate Outlook add-in was abandoned by its developer and silently taken over by a phishing operation. Over 4,000 credentials were stolen through Microsoft's own add-in store.www.koi.ai
reshared this
Omnibus digitale - Audizioni - Presidente del Garante per la protezione dei dati personali, Brando Benifei, Anitec-Assinform, Confcommercio, ANCE, AIxIA, Google, Asstel
La Commissione Politiche Ue della Camera, nell’ambito dell’esame congiunto, ai fini della verifica della conformità al principio di sussidiarietà, della proposta di regolamento del Parlamento europeo e del Consiglio che modifica i regolamenti (UE) 2024/1689 e (UE) 2018/1139
reshared this
Patch Tuesday febbraio 2026: 59 bug corretti, sei zero-day e un segnale chiaro per i CISO
@Informatica (Italy e non Italy)
In occasione del Patch Tuesday di febbraio 2026 Microsoft ha rilasciato gli aggiornamenti per 59 vulnerabilità, incluse sei zero-day che sarebbero state già sfruttate diffusamente in attacchi reali. Focus su RCE, privilege
Informatica (Italy e non Italy) reshared this.
"Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26."
support.apple.com/en-us/126346
About the security content of iOS 26.3 and iPadOS 26.3 - Apple Support
This document describes the security content of iOS 26.3 and iPadOS 26.3.Apple Support
reshared this
A security researcher has discovered 287 Chrome extensions that exfiltrate a user's browsing history.
The extensions have been installed more than 37 million times.
They range from ad blockers to AI assistants and office aids.
reshared this
287 Chrome extensions that exfiltrate a user's browsing history.
The extensions have been installed more than 37 million times.
They range from ad blockers to AI assistants and office aids.
qcontinuum.substack.com/p/spyi
You do not need extensions to get your data stolen while using chrome.
It is a trojan not a browser.
If you want chrome based and privacy
Oblomov reshared this.
VoidLink: il malware per Linux generato dagli hacker che non vogliono scrivere codice
📌 Link all'articolo : redhotcyber.com/post/voidlink-…
#redhotcyber #news #cybersecurity #hacking #malware #linux #intelligenzaartificiale #sicurezzainformatica
VoidLink: il malware per Linux generato dagli hacker che non vogliono scrivere codice
Scoperta una nuova minaccia informatica: VoidLink, un malware generato da AI capace di rubare credenziali e persistere in ambienti Linux.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
Making Effective, Affordable Water Level Monitors
Water wells are simple things, but that doesn’t mean they are maintenance-free. It can be important to monitor water levels in a well, and that gets complicated when the well is remote. Commercial solutions exist, of course, but tend to be expensive and even impractical in some cases. That’s where [Hans Gaensbauer]’s low-cost, buoyancy-based well monitor comes in. An Engineers Without Border project, it not only cleverly measures water level in a simple way — logging to a text file on a USB stick in the process — but it’s so low-power that a single battery can run it for years.The steel cable (bottom left) is attached to a submerged length of pipe, and inside the cylinder is a custom load cell. The lower the water level, the higher the apparent weight of the submerged pipe.
The monitor [Hans] designed works in the following way: suspend a length of pipe inside the well, and attach that pipe to a load cell. The apparent weight of the pipe will be directly proportional to how much of the pipe is above water. The fuller the well, the less the pipe will seem to weigh. It’s very clever, requires nothing to be in the well that isn’t already water-safe, and was designed so that the electronics sit outside in a weatherproof enclosure. Cost comes out to about $25 each, which compares pretty favorably to the $1000+ range of industrial sensors.
The concept is clever, but it took more that that to create a workable solution. For one thing, space was an issue. The entire well cap was only six inches in diameter, most of which was already occupied. [Hans] figured he had only about an inch to work with, but he made it work by designing a custom load cell out of a piece of aluminum with four strain gauges bonded to it. The resulting sensor is narrow, and sits within a nylon and PTFE tube that mounts vertically to the top of the well cap. Out from the bottom comes a steel cable that attaches to the submerged tube, and out the top comes a cable that brings the signals to the rest of the electronics in a separate enclosure. More details on the well monitor are in the project’s GitHub repository.
All one has to do after it’s installed is swap out the USB stick to retrieve readings, and every once in a long while change the battery. It sure beats taking manual sensor readings constantly, like meteorologists did back in WWII.
Making a Functional Control Panel of the Chernobyl RBMK Reactor
Top of an RBMK at the Leningrad plant.
Control panels of a pre-digitalization nuclear plant look quite daunting, with countless dials, buttons and switches that all make perfect sense to a trained operator, but seem as random as those of the original Enterprise bridge in Star Trek to the average person. This makes the reconstruction of part of the RBMK reactor control by the [Chornobyl Family] on YouTube a fun way to get comfortable with one of the most important elements of this type of reactor’s controls.
The section that is built here pertains to the control rods of the RBMK’s reactor, its automatic regulations and emergency systems like AZ-5 and BAZ. The goal is not just to have a shiny display piece that you can put on the wall, but to make it function just like the real control panel, and to use it for demonstrations of the underlying control systems. The creators spent a lot of time talking with operators of the Chornobyl Nuclear Plant – which operated until the early 2000s – to make the experience as accurate as possible.
Although no real RBMK reactor is being controlled by the panel, its ESP32-powered logic make it work like the real deal, and even uses a dot-matrix printer to provide logging of commands. Not only is this a pretty cool simulator, it’s also just the first element of what will be a larger recreation of an RBMK control room, with more videos in this series to follow.
Also covered in this video are the changes made after the Chernobyl Nuclear Plant’s #4 accident, which served to make RBMKs significantly safer, albeit at the cost of more complexity on the control panel.
youtube.com/embed/DDlrnJIbkds?…
The trial of Ilia D., a prolific affiliate for the Phobos ransomware, has begun in Paris
zdnet.fr/actualites/ce-busines…
Ce business juteux autour du rançongiciel Phobos - ZDNET
Le procès d’un russe de 39 ans accusé d’être un affilié du rançongiciel Phobos vient de débuter à Paris.Gabriel Thierry (ZDNET)
reshared this
securityaffairs.com/187890/sec…
#securityaffairs #hacking
Apple fixed first actively exploited zero-day in 2026
Apple fixed an exploited zero-day in iOS, macOS, and other devices that allowed attackers to run code via a memory flaw.Pierluigi Paganini (Security Affairs)
reshared this
📣 ISCRIVITI AL WEBINAR GRATUITO DI PRESENTAZIONE DEL CORSO "CYBER OFFENSIVE FUNDAMENTALS" – LIVELLO BASE 🚀
📅 Data Webinar: Martedì 17 Febbraio ore 18
🖥️ Google Meet
🔗 Programma: redhotcyber.com/linksSk2L/cybe…
🎥 Intro del prof: youtube.com/watch?v=0y4GYsJMoX…
Attraverso laboratori isolati e replicabili, potrai sperimentare:
✅Ricognizione e analisi delle vulnerabilità
✅Exploitation controllata e post-exploitation in sicurezza
✅Uso professionale di strumenti come Nmap, Metasploit, BloodHound e Nessus
Per ricevere il link al webinar e per iscrizioni: 📞 379 163 8765 ✉️ formazione@redhotcyber.com
#redhotcyber #formazione #pentesting #pentest #formazioneonline #ethicalhacking #cybersecurity #penetrationtesting #cti #cybercrime #infosec #corsi #liveclass #hackerhood #pentesting
Cyber Offensive Fundamentals - Corso ethical hacking, penetration test
Corso in Live Class di Cyber Offensive Fundamentals: scopri penetration testing, vulnerabilità e strumenti pratici per la sicurezza informatica offensiva.Red Hot Cyber
Cybersecurity & cyberwarfare reshared this.
La Russia alza muri digitali: WhatsApp nel mirino e la risposta di Stato
📌 Link all'articolo : redhotcyber.com/post/la-russia…
#redhotcyber #news #whatsapp #russia #censura #libertadigitali #cybersecurity #hacking #malware #bloccoapp
La Russia alza muri digitali: WhatsApp nel mirino e la risposta di Stato
La Russia tenta di bloccare WhatsApp per spingere gli utenti verso un'app di messaggistica governativa. Una mossa che restringe la libertà digitale.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
226 - Internet batte le leggi degli Stati? Forse sì - Marco Camisani Calzolari
Internet batte le leggi degli Stati? Forse sì. E spesso vincono le aziende. Ogni volta che uno Stato prova a imporre una regola su internet, emerge un fatto semplice: il potere tecnico non è più solo pubblico.Web Staff MCC (Marco Camisani Calzolari)
reshared this
il caso Notepad++: Quando fidarsi degli aggiornamenti è molto pericoloso
📌 Link all'articolo : redhotcyber.com/post/il-caso-n…
#redhotcyber #news #cybersecurity #hacking #malware #notepad #aggiornamentiautomatici #sicurezzainformatica
il caso Notepad++: Quando fidarsi degli aggiornamenti è molto pericoloso
Un gruppo di hacker ha compromesso l'infrastruttura di aggiornamento di Notepad++, un popolare editor di testo. Scopri come è avvenuto l'attacco e come proteggerti.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
securityaffairs.com/187882/unc…
#securityaffairs #hacking #malware
Multiple Endpoint Manager bugs patched by Ivanti, including remote auth bypass
Ivanti patched over a dozen Endpoint Manager flaws, including a high-severity auth bypass that let attackers steal credentials remotely.Pierluigi Paganini (Security Affairs)
Cybersecurity & cyberwarfare reshared this.
Sicurezza informatica in Italia: le tendenze e le minacce del 2025 dal CERT-AgID
📌 Link all'articolo : redhotcyber.com/post/sicurezza…
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #minacceinformatiche #phishing
Sicurezza informatica in Italia: le tendenze e le minacce del 2025 dal CERT-AgID
Il report del CERT-AGID rivela un aumento delle minacce informatiche in Italia nel 2025, con phishing, malware e uso dell'Intelligenza Artificiale.Bajram Zeqiri (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
La teoria delle 10.000 ore applicata alla cybersecurity: mito, realtà o limite superato dall’AI?
📌 Link all'articolo : redhotcyber.com/post/la-teoria…
#redhotcyber #news #teoriadelle10000ore #eccellenza #malcomgladwell #apprendimento #sviluppopersonale
La teoria delle 10.000 ore applicata alla cybersecurity: mito, realtà o limite superato dall’AI?
La teoria delle 10.000 ore spiegata nel contesto della cybersecurity: apprendimento, AI, falsi positivi e il ruolo centrale del fattore umano.Redazione RHC (Red Hot Cyber)
Cybersecurity & cyberwarfare reshared this.
RE: mastodon.social/@campuscodi/11…
No official report out yet, but users are reporting that Facebook and Instagram are now down too in Russia
reshared this
Chrome 145 is out
This is the formal launch of Device Bound Session Credentials in Chrome, a feature that tries to prevent infostealers from taking your cookies
developer.chrome.com/release-n…
Chrome 145 | Release notes | Chrome for Developers
Column wrapping for multicol, Device Bound Session Credentials, and more.Chrome for Developers
reshared this
Implementing 3D Graphics Basics
Plenty of our childhoods had at least one math teacher who made the (ultimately erroneous) claim that we needed to learn to do math because we wouldn’t always have a calculator in our pockets. While the reasoning isn’t particularly sound anymore, knowing how to do math from first principles is still a good idea in general. Similarly, most of us have hugely powerful graphics cards with computing power that PC users decades ago could only dream of, but [NCOT Technology] still decided to take up this project where he does the math that shows the fundamentals of how 3D computer graphics are generated.
The best place to start is at the beginning, so the video demonstrates a simple cube wireframe drawn by connecting eight points together with lines. This is simple enough, but modern 3D graphics are really triangles stitched together to make essentially every shape we see on the screen. For [NCOT Technology]’s software, he’s using the Utah Teapot, essentially the “hello world” of 3D graphics programming. The first step is drawing all of the triangles to make the teapot wireframe. Then the triangles are made opaque, which is a step in the right direction but isn’t quite complete. The next steps to make it look more like a teapot are to hide the back faces of the triangles, figure out which of them face the viewer at any given moment, and then make sure that all of these triangles are drawn in the correct orientation.
Rendering a teapot is one thing, but to get to something more modern-looking like a first-person shooter, he also demonstrates all the matrix math that allows the player to move around an object. Technically, the object moves around the viewer, but the end effect is one that eventually makes it so we can play our favorite games, from DOOM to DOOM Eternal. He notes that his code isn’t perfect, but he did it from the ground up and didn’t use anything to build it other than his computer and his own brain, and now understands 3D graphics on a much deeper level than simply using an engine or API would generally allow for. The 3D world can also be explored through the magic of Excel.
youtube.com/embed/yaG1fBNxjdE?…
DIY Wall-Plotter Does Generative Art, But Not As We Know It
[Teddy Warner]’s GPenT (Generative Pen-trained Transformer) project is a wall-mounted polargraph that makes plotter art, but there’s a whole lot more going on than one might think. This project was partly born from [Teddy]’s ideas about how to use aspects of machine learning in ways that were really never intended. What resulted is a wall-mounted pen plotter that offers a load of different ‘generators’ — ways to create line art — that range from procedural patterns, to image uploads, to the titular machine learning shenanigans.There are loads of different ways to represent images with lines, and this project helps explore them.
Want to see the capabilities for yourself? There’s a publicly accessible version of the plotter interface that lets one play with the different generators. The public instance is not connected to a physical plotter, but one can still generate and preview plots, and download the resulting SVG file or G-code.
Most of the generators do not involve machine learning, but the unusual generative angle is well-represented by two of them: dcode and GPenT.
dcode is a diffusion model that, instead of converting a text prompt into an image, has been trained to convert text directly into G-code. It’s very much a square peg in a round hole. Visually it’s perhaps not the most exciting, but as a concept it’s fascinating.
The titular GPenT works like this: give it a scrap of text inspiration (a seed, if you will), and that becomes a combination of other generators and parameters, machine-selected and stacked with one another to produce a final composition. The results are unique, to say the least.
Once the generators make something, the framed and wall-mounted plotter turns it into physical lines on paper. Watch the system’s first plot happen in the video, embedded below under the page break.
This is a monster of a project representing a custom CNC pen plotter, a frame to hold it, and the whole software pipeline both for the CNC machine as well as generating what it plots. Of course, the journey involved a few false starts and dead ends, but they’re all pretty interesting. The plotter’s GitHub repository combined with [Teddy]’s write up has all the details one may need.
It’s also one of those years-in-the-making projects that ultimately got finished and, we think, doing so led to a bit of a sigh of relief on [Teddy]’s part. Most of us have unfinished projects, and if you have one that’s being a bit of a drag, we’d like to remind you that you don’t necessarily have to finish-finish a project to get it off your plate. We have some solid advice on how to (productively) let go.
youtube.com/embed/8UEqEzWdhAY?…
Thermoforming: Shaping Curvy Grilles With No Supports
Making sure the heatgun is on ‘low’ and gloves are on while pushing on the mold. (Credit: Zion Brock)
Although hobbyists these days most often seem to use thermoplastics as a print-and-done material in FDM printers, there’s absolutely nothing stopping you from taking things further with thermoforming. Much like forming acrylic using a hot wire or hot air, thermoplastics like PLA can be further tweaked with a similar method. This can be much less complex than 3D printing the design with supports, as demonstrated by [Zion Brock].
For this classically styled radio project the front grille was previously 3D printed with the curved shape, but to avoid an ugly edge it had to be printed with most of the grille off the print bed, requiring countless supports and hours of printing time. To get around this, [Zion] opted to print the grille flat and then thermoform its curved shape. Of course, due to the unusual shape of the grille, this required a bit more effort than e.g. a spherical form.
This is similar to what is used with sheet metal to get detailed shaped, also requiring a mold and a way to stretch the flat shape over the mold. With the flat form designed to have all the material in the right places, it was able to be printed in less than an hour in PLA and then formed with a heatgun aimed at the part while the two-section mold is slid together to create the final form.
You can find the design files and full instructions on the website for the radio project.
youtube.com/embed/z20IXm1w-Fo?…
Ukraine's cyber police detained two men who tried to steal government funds from a local hospital.
The two allegedly hacked the PC of the hospital's accountant.
They then transferred more than $115,000 from the hospital's budget to their own company's accounts.
cyberpolice.gov.ua/news/zbytky…
Збитки у 5 мільйонів гривень: поліція Сумщини викрила кібератаку на медичний заклад — Департамент Кіберполіції
Департамент Кіберполіції Національної поліції Україниcyberpolice.gov.ua
reshared this
reshared this
neat, but I worry that this opens users up to self-XSS, if they get used to pasting into their browser console.
(not that I wish to imply the project is malware; I actually haven't read the script at all)
Stairwell: "over 80% of monitored environments contain vulnerable versions of WinRAR affected by CVE-2025-8088"
🙃🙃🙃🙃🙃 
stairwell.com/resources/stairw…
Stairwell detects widespread exposure to critical WinRAR vulnerability across customer environments - Stairwell
Stairwell recently identified a significant and concerning trend across our customer base: over 80% of monitored environments contain vulnerable versions of WinRAR affected by CVE-2025-8088.Alex Hegyi (Stairwell)
reshared this
CloudSEK says it intercepted the leaked credentials of a tech support and maintenance company that had access to the IT networks of more than 200 airports. The account also didn't have MFA enabled
cloudsek.com/blog/the-hidden-b…
The Hidden Backdoor to 200 Airports: A Supply Chain Failure in Aviation
A single leaked credential from a fourth-party vendor recently exposed the digital infrastructure of 200 global airports.Amruth Pothula (CloudSEK)
reshared this
@w00p nah, they're good people... they just don't know how to promote their work
this is why many former infosec journalists found their way into PR jobs at cybersecurity firms
I meant the stupid companies that don't secure their access/creds/missing 2fa properly.
FLOSS Weekly Episode 864: Work Hard, Save Money, Retire Early
This week Jonathan chats with Bill Shotts about The Linux Command Line! That’s Bill’s book published by No Starch Press, all about how to make your way around the Linux command line! Bill has had quite a career doing Unix administration, and has thoughts on the current state of technology. Watch to find out more!
youtube.com/embed/9zpSG6sAJiY?…
Did you know you can watch the live recording of the show right on our YouTube Channel? Have someone you’d like us to interview? Let us know, or have the guest contact us! Take a look at the schedule here.
play.libsyn.com/embed/episode/…
Direct Download in DRM-free MP3.
If you’d rather read along, here’s the transcript for this week’s episode.
Places to follow the FLOSS Weekly Podcast:
Theme music: “Newer Wave” Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 4.0 License
hackaday.com/2026/02/11/floss-…
Motorola’s Password Pill Was Just One Idea
Let’s face it; remembering a bunch of passwords is the pits, and it’s just getting worse as time goes on. These days, you really ought to have a securely-generated key-smash password for everything. And at that point you need a password manager, but you still have to remember the password for that.
Well, Motorola is sympathetic to this problem, or at least they were in 2013 when they came up with the password pill. Motorola Mobility, who were owned by Google at the time, debuted it at the All Things Digital D11 tech conference in California. This was a future that hasn’t come to pass, for better or worse, but it was a fun thought experiment in near-futurism.
Dancing with DARPA
Back then, such bleeding-edge research was headed by former DARPA chief Regina Dugan. At the conference, Dugan stated that she was “working to fix the mechanical mismatch between humans and electronics” by doing things such as partnering with companies that “make authentication more human”.Image by HeungSoon from Pixabay
Along with Proteus Digital Health, Dugan et. al created a pill with a small chip inside of it and a switch. Once swallowed, your various stomach acids serve as the electrolyte. The acids power the chip, and the switch goes on and off, creating an 18-bit ECG-like signal.
Basically, your entire body becomes an authentication token. Unlock your phone, your car door handle, and turn on your computer, just by existing near them.
It should be noted that Proteus already had FDA clearance for a medical device consisting of an ingestible sensor. The idea behind those is that medical staff can track when a patient has taken a pill based on the radio signal. Dugan said at the conference that it would be medically safe to ingest up to thirty of these pills per day for the rest of your life. Oh yeah, and she says the only thing that the pill exposes about the taker is whether they took it or not.
Motorola head Dennis Woodside stated that they had demonstrated this authentication technology working and authenticating a phone. While Motorola never intended to ship this pill, it was based on the Proteus device with FDA clearance, presumably so they could test it safely.
The story of Proteus Digital Health is beyond us here, but for whatever reason, their smart pills never took off. So we’re left to speculate about the impact on society that this past future of popping password pills would have had.
About That Government Influence
Redford and Poitier in Sneakers (1992). Image via IMDb
While it sounds sorta cool at first, it also seems like something a government might choose to force on a person sooner or later. Someone they wanted to insert behind enemy lines, perhaps, or just create an inside job that otherwise wouldn’t have happened.
Taking off my tin foil hat for a moment, I’ll compare this pill with existing modern biometrics. A face scan, a fingerprint, or even my voice is my passport, verify me are all momentary actions.
With these, you’re more or less in control of when authentication happens. A pill, on the other hand, must run its course. You can’t change the signal mid-digestive cycle. Plus, you’d have to guard your pills with your life, and if a couple pills pass through you every day, you’d better have a big pillbox.
Authentication Can Be Skin Deep
Image by MC10 via Slashgear
So the password pill never came to pass, but it’s worth mentioning that at the same conference, Dugan debuted another method of physical authentication — a temporary password tattoo they developed along with MC10, a company that makes stretchable circuits and has since been acquired by a company called Medidata.
More typically, their circuits are used to do things like concussion detection for sports, or baby thermometers that continuously track temperature.
Dugan said that the key MC10 technology is in the accordion-like structures connecting the islands of inflexible silicon. These structures can stretch up to 200% and still work just fine. The tattoos are waterproof, so go ahead and swim or shower. Of course, the password tattoo never came to be, either. And that’s just fine with me.
Vintage Film Editor Becomes HDMI Monitor
With the convenience of digital cameras and editing software, shooting video today is so easy. But fifty years ago it wasn’t electronics that stored the picture but film, and for many that meant Super 8. Editing Super 8 involved a razor blade and glue, and an editing station, like a small projector and screen, was an essential accessory. Today these are a relatively useless curio, so [Endpoint101] picked one up for not a lot and converted it into an HDMI monitor.
Inside these devices there’s a film transport mechanism and a projection path usually folded with a couple of mirrors. In this case the glass screen and much of the internals have been removed, and an appropriate LCD screen fitted. It’s USB powered, and incorporates a plug-in USB power supply mounted in a UK trailing socket for which there’s plenty of space.
There’s always some discussion whenever a vintage device like this is torn apart as to whether that’s appropriate. These film editors really are ten a penny though, so even those of us who are 8 mm enthusiasts can see beyond this one. The result is a pleasingly retro monitor, which if we’re honest we could find space for ourselves. The full video is below the break. Meanwhile it’s not the first conversion we’ve seen, here’s another Hanimex packing a Raspberry Pi.
youtube.com/embed/YTQoNQL0R9E?…
Russia has permanently blocked YouTube yesterday and WhatsApp today
Домен WhatsApp пропал из DNS-сервера Роскомнадзора
Домен мессенджера WhatsApp (принадлежит Meta, признанной экстремистской и запрещенной в РФ) исчез из записей Национальной системы доменных имен (НСДИ) — инфраструктуры, созданной в рамках закона о «суверенном Рунете».Коммерсантъ (Лента новостей (Москва))
reshared this
Questo account è gestito da @informapirata ⁂ e propone e ricondivide articoli di cybersecurity e cyberwarfare, in italiano e in inglese
I post possono essere di diversi tipi:
1) post pubblicati manualmente
2) post pubblicati da feed di alcune testate selezionate
3) ricondivisioni manuali di altri account
4) ricondivisioni automatiche di altri account gestiti da esperti di cybersecurity
NB: purtroppo i post pubblicati da feed di alcune testate includono i cosiddetti "redazionali"; i redazionali sono di fatto delle pubblicità che gli inserzionisti pubblicano per elogiare i propri servizi: di solito li eliminiamo manualmente, ma a volte può capitare che non ce ne accorgiamo (e no: non siamo sempre on line!) e quindi possono rimanere on line alcuni giorni. Fermo restando che le testate che ricondividiamo sono gratuite e che i redazionali sono uno dei metodi più etici per sostenersi economicamente, deve essere chiaro che questo account non riceve alcun contributo da queste pubblicazioni.
like this
reshared this
Datavizzard
in reply to Catalin Cimpanu • • •VessOnSecurity
in reply to Catalin Cimpanu • • •