The Factoring Dead: Preparing for the Cryptopocalypse
A talk at Black Hat USA 2013 discussing recent advances in academic research that imperils two critical algorithms upon which Internet trust rests: RSA and Diff
Hasnain has not yet written a summary for this.
Posted on 2013-08-04T17:35:42+0000
Sprites mods - Hard disk hacking - Intro
Apart from this article, I also gave a talk at OHM2013 about this subject. As soon as the video recordings made at that time are available, I'll link there.
Hasnain says:
Root-kit in the hard-disk itself, so it stays on after a reinstall. Pretty cool stuff.
Posted on 2013-08-04T13:04:54+0000
Michael Lewis: Did Goldman Sachs Overstep in Criminally Charging Its Ex-Programmer?
With Sergey Aleynikov in prison for lifting computer code from Goldman Sachs, Michael Lewis convenes a private “jury” to determine what he actually did wrong.
Scientific Breakthrough Lets SnappyCam App Take 20 Full-Res Photos Per Second | TechCrunch
Your standard iPhone camera app is actually pretty slow, taking just three to six photos per second at 8 megapixels each. But with SnappyCam 3.0 you can shoot 20 full-resolution photos per second thanks to a breakthrough in discrete cosine transform JPG science by its inventor. 20 frames per secon..
Hasnain says:
This is cool, though "thanks to a breakthrough in discrete cosine transform JPG science by its inventor." does indicate how good the reporting is.
Posted on 2013-08-01T17:00:03+0000
Your app makes me fat
In 1999, Professor Baba Shiv (currently at Stanford) and his co-author Alex Fedorikhin did a simple experiment on 165 grad students.They asked half to memorize a seven-digit number and the other half to memorize a two-digit number. After completing the memorization task, participants were told the e...
Hasnain has not yet written a summary for this.
Posted on 2013-07-30T11:04:48+0000
Computer scientists develop 'mathematical jigsaw puzzles' to encrypt software
(Phys.org) —UCLA computer science professor Amit Sahai and a team of researchers have designed a system to encrypt software so that it only allows someone to use a program as intended while preventing any deciphering of the code behind it. This is known in computer science as 'software obfuscation,'...
Hasnain has not yet written a summary for this.
Posted on 2013-07-30T09:38:22+0000
Why I willingly handed over my credit card and PIN to a fraudster
If scammers disguised themselves as your bank's fraud protection team, would you fall for it? Andy Welch did.
OSI: The Internet That Wasn’t - IEEE Spectrum
How TCP/IP eclipsed the Open Systems Interconnection standards to become the global protocol for computer networking
Why YouTube buffers: The secret deals that make—and break—online video
When ISPs and video providers fight over money, Internet users suffer.
Hasnain has not yet written a summary for this.
Posted on 2013-07-29T12:31:01+0000
A Race to Save the Orange by Altering Its DNA
Growers turned to genetics in hopes of building a tougher orange tree. But what intervention would the public accept?