USMC: Marines want their phones and tablets to handle classified data

USMC: Marines want their phones and tablets to handle classified data

The Marine Common Handheld program will provide secure mobile computing at the tactical edge. (Lance Cpl. Harrison C. Rakhshani/Marine Corps)   The Marine Corps has selected several companies to bid on task orders that will allow warfighters to transmit secure on-the-move command-and-control and situational awareness data, including sending classified information through commercial smartphones and tablets.…

Chinese E-Commerce Giant JD.com Applied for 200+ Blockchain Patents, Alibaba: 262, Tencent: 80 – China Total: 4,435

Chinese E-Commerce Giant JD.com Applied for 200+ Blockchain Patents, Alibaba: 262, Tencent: 80 – China Total: 4,435

Chinese e-commerce giant JD.com has applied for over 200 blockchain patents, according to a report by Securities Daily News on May 20. The report also notes that major e-commerce competitor Alibaba has applied for 262 blockchain patents, and Chinese internet titans Tencent and Baidu have applied for 80 and 50 such patents, respectively, as recorded…

Reality Mining: How Mass Surveillance Works in Xinjiang, China

Reality Mining: How Mass Surveillance Works in Xinjiang, China

(Articles below updated last: 05 JUN 2019) ‘Reverse Engineering’ Police App Reveals Profiling and Monitoring Strategies (Synapsis; full report further below) New York, May 2, 2019 Chinese authorities are using a mobile app to carry out illegal mass surveillance and arbitrary detention of Muslims in China’s western Xinjiang region. The Human Rights Watch report, “China’s…

Dependency on Centralized Services: Massive Outage at SalesForce.com

Dependency on Centralized Services: Massive Outage at SalesForce.com

Salesforce Woes Linger as Admins Clean Up After Service Outage An accidental permissions snafu caused a massive outage for all Salesforce customers that continues to affect some businesses. After a massive service outage on Friday, software-as-a-service giant Salesforce restored partial access to its affected customers over the weekend, while admins continued with cleanup into Monday.…

Intel MDS Vulnerabilities: ZombieLoad, RIDL (Rogue In-Flight Data Load), Fallout, and Store-to-Leak Forwarding – affect almost every Intel chip since 2011

Intel MDS Vulnerabilities: ZombieLoad, RIDL (Rogue In-Flight Data Load), Fallout, and Store-to-Leak Forwarding – affect almost every Intel chip since 2011

Tech giants have published security advisories and blog posts in response to the Microarchitectural Data Sampling (MDS) vulnerabilities affecting most Intel processors made in the last decade. Remedy? The microcode updates, like previous patches, would have an impact on processor performance. The vulnerabilities are related to speculative execution and they can be exploited for side-channel…

RIF Labs: Bitcoin Is The Real Ethereum Killer

RIF Labs: Bitcoin Is The Real Ethereum Killer

This is the second major protocol to be implemented on the RIF OS platform. 14 MAY 2019 RIF Labs anticipateS Bitcoin (BTC) will be able to scale to upwards of 60M users within the next few years, as the project launches Lumino Network, a new protocol for off-chain transactions on the Lightning Network. “Using RSK…

Difference Between SideChains and State Channels

Difference Between SideChains and State Channels

A complete comparison of the two scaling methods June 2018 State Channels and Sidechains are the two terms in Ethereum community that are often used interchangeably, thus causing mass confusion. But today we will get it clear. Go make a cup of coffee first, it’s going to be a long one. The purpose of this article…

What is China’s SKYNET (yes: it is what you think it is)

What is China’s SKYNET (yes: it is what you think it is)

UPDATED 15 JUN 2020 (scroll to the bottom) What is “Skynet”: China’s massive video surveillance network Skynet is the Chinese government’s video surveillance system, which it claims is for tracking criminals. Under the project, more than 20 million cameras have been set up in public spaces across the country. It’s said to be able to…

Reality Mining: China’s “three-dimensional portrait and integrated data doors” vacuum up MAC addresses, IMEI numbers, and more

Reality Mining: China’s “three-dimensional portrait and integrated data doors” vacuum up MAC addresses, IMEI numbers, and more

These data doors include facial recognition sensors, ID scanners and sensors for collecting electronic device information. At the Aq Mosque in Urumqi, 2018.   Surveillance China’s ‘data doors’ scoop up information straight from your phone The security screeners scan more than your face, picking up MAC addresses and IMEI numbers Facial recognition devices have become…

Public Beta: Google’s Scalable 100+ PetaFLOP Supercomputers For Machine Learning: Cloud Tensor Processing Unit (TPU) Pods

Public Beta: Google’s Scalable 100+ PetaFLOP Supercomputers For Machine Learning: Cloud Tensor Processing Unit (TPU) Pods

(a full Cloud TPU v3 Pod — right-click to “view image” in full size)   To accelerate the largest-scale machine learning (ML) applications deployed today and enable rapid development of the ML applications of tomorrow, Google created custom silicon chips called Tensor Processing Units (TPUs). When assembled into multi-rack ML supercomputers called Cloud TPU Pods,…

North Korea: Bitten by Bitcoin Bug – New Dimension Lazarus Hacking

North Korea: Bitten by Bitcoin Bug – New Dimension Lazarus Hacking

A report from ProofPoint by Darien Huss   Executive Summary With activity dating at least to 2009, the Lazarus Group has consistently ranked among the most disruptive, successful, and far-reaching state-sponsored actors. Law enforcement agencies suspect that the group has amassed nearly $100 million worth of cryptocurrencies based on their value today. The March 20,…