Category: Tumblr

In other words, with well over 70% of stock …

In other words, with well over 70% of stock trading now done by robots, we have gotten to a point where robots write headlines and stories read, reacted to and traded by robots. Humans assisting robots to make humans obsolete. The Latest Market Craze: Stock Trading Robots Reacting To Stories Written By… Robots | ZeroHedge (via wiredvanity) (View on gamamb.tumblr.com)

(View on gamamb.tumblr.com, source: robotcosmonaut)

My goal isn’t to find and fix every security …

My goal isn’t to find and fix every security bug,” [Adobe security chief] Arkin argued. ”I’d like to drive up the cost of writing exploits. But when researchers go public with techniques and tools to defeat mitigations, they lower that cost. ZDNet: ‘Offensive security research community helping bad guys’ (View on gamamb.tumblr.com)

(View on gamamb.tumblr.com, source: facebook.com)

How secure are 128-bit keys? Imagine a computer that …

How secure are 128-bit keys? Imagine a computer that is the size of a grain of sand that can test keys against some encrypted data. Also imagine that it can test a key in the amount of time it takes light to cross it. Then consider a cluster of these computers, so many that if you covered the earth with them, they would cover the whole planet to the height of 1 meter. The cluster of computers would crack a 128-bit key on average in 1,000 years. Burt Kaliski, via John Callas (View on gamamb.tumblr.com)

(View on gamamb.tumblr.com)

Besorgniserregend sei die zunehmende Bedeutung von sozialen Netzwerken in …

Besorgniserregend sei die zunehmende Bedeutung von sozialen Netzwerken in der Islamisten-Szene. Facebook und YouTube hätten sich zu wichtigen Plattformen für die Verbreitung von Propaganda entwickelt und seien Katalysatoren für Radikalisierungsprozesse. Einzelpersonen würden durch Facebook sehr leicht Zugang zu islamistischer Propaganda erhalten und könnten sich dort über Chatrooms mit Gleichgesinnten austauschen. Symposium des Verfassungsschutzes in Berlin (View on gamamb.tumblr.com)

In short, I think “You -> VPN provider -> …

In short, I think “You -> VPN provider -> Tor network” can be a fine idea, assuming your VPN provider’s network is in fact sufficiently safer than your own network; but “You -> Tor network -> VPN provider” is generally a really poor plan. Roger Dingledine, Torproject (View on gamamb.tumblr.com)

(View on gamamb.tumblr.com, source: pic.twitter.com)