Monthly Archive: November 2014

What is your online name? Is it a safe …

What is your online name? Is it a safe name? Make sure you make up an alternate name that doesn’t give away any information about who you really are! NSA advice to kids (View on gamamb.tumblr.com)

aynes argues that before this recent emergence of consciousness, …

aynes argues that before this recent emergence of consciousness, humanity experienced the world in a manner similar to the Borg. There was not a holistic self with free will, but rather a two-part psyche, or “bicameral mind,” in which one part gave “orders” to a second part that acted on those orders. For bicameral humans, “volition came as a voice that was in the nature of a neurological command, in which the command and the action were not separated, in which to hear was to obey.” Jaynes says these commands were often perceived as coming from gods, and that they...

Gödel and Einstein developed a strong friendship, and were …

Gödel and Einstein developed a strong friendship, and were known to take long walks together to and from the Institute for Advanced Study. The nature of their conversations was a mystery to the other Institute members. Economist Oskar Morgenstern recounts that toward the end of his life Einstein confided that his “own work no longer meant much, that he came to the Institute merely … to have the privilege of walking home with Gödel”. Kurt Gödel – Wikipedia, the free encyclopedia (View on gamamb.tumblr.com)

(imgur.com)

(imgur.com) (View on gamamb.tumblr.com)

(View on gamamb.tumblr.com)

We didn’t want to interfere with NSA/GCHQ operations,” he …

We didn’t want to interfere with NSA/GCHQ operations,” he told Mashable, explaining that everyone seemed to be waiting for someone else to disclose details of Regin first, not wanting to impede legitimate operations related to “global security. Ronald Prins, a security researcher from the Dutch company Fox IT (View on gamamb.tumblr.com)

Der BND unterscheide nun zu einem “sehr frühen Zeitpunkt”, …

Der BND unterscheide nun zu einem “sehr frühen Zeitpunkt”, ob es sich bei einer eingesaugten Kommunikation um einen “G10-geschützten Verkehr” handle. Sei dies nicht der Fall, kämen die Daten in “Routineprofile”. Diese unterlägen dem allgemeinen Datenschutz, müssten also etwa nach dem Grundsatz der Verhältnismäßigkeit und ohne Willkür verarbeitet werden. Das G10-Gesetz sei demgegenüber “grundrechtsfreundlicher” und strenger. Prinzipiell steht für den Rechtsexperten, der teils als Sachgebietsleiter für den G10-Schutz im Bereich Technische Aufklärung in der BND-Zentrale in Pullach zuständig war, außer Frage, dass der Dienst auch entsprechende “Routineverkehre” erheben darf. Hier gelte ein “Erst-recht-Schluss”: Wenn der BND G10-bereinigte Kommunikation verarbeiten dürfe,...

Freizeitdrogen richten sich an gesunde Menschen.” Dabei liegt die …

Freizeitdrogen richten sich an gesunde Menschen.” Dabei liegt die Betonung auf gesund. “Verwenden Sie bewusstseinsverändernde Substanzen, um durch die Finanzkrise, die Bevölkerungsexplosion, die Wirrungen des modernen Lebens verursachte psychologische Schäden zu mildern, dann dienen sie tatsächlich der Korrektur einer Störung, in die uns der Fortschritt getrieben hat. Wie man Designerdrogen macht: Dr. Z im Interview mit Technology Review (View on gamamb.tumblr.com)

My attack was complete. If a blackhat hacker had …

My attack was complete. If a blackhat hacker had somehow obtained root access to a server with this drive, he could use fwtool to remotely dump the flash of the disk, modify it and flash it back. Eventually, the owner of the box will find out I am using his box for nefarious purposes and will probably re-install the system, securing the way the hacker orginally entered the machine. With the firmware hack in place, however, the attacker could tell the hard disk to do something nefarious with the new install. Sprites mods – Hard disk hacking with JTAG (View...