[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]

/cyber/ - Cyberpunk & Science Fiction

A board dedicated to all things cyberpunk (and all other futuristic science fiction) NSFW welcome

Catalog

Name
Email
Subject
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Flag
Embed
(replaces files and can be used instead)
Options
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, swf, pdf
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 5 per post.


Young man, in mathematics you don't understand things. You just get used to them. - John Von Neumann
Rules & Guidelines

File: 1446562442357.png (31.47 KB, 320x216, 40:27, cyberbye.png)

 No.36460

Pirates beware: ISPs may soon be legally obligated to reveal your identity, thanks to the Trans-Pacific Partnership.

Wikileaks this week published a leaked copy of the intellectual property chapter of the sprawling agreement, which includes a mandate: Every nation must set up a way for copyright owners to find out the identity of copyright violators.

“Each Party shall provide procedures…enabling a copyright owner who has made a legally sufficient claim of copyright infringement to obtain expeditiously from an Internet Service Provider information in the provider’s possession identifying the alleged infringer,” the leaked document states.

The document also states that every country should establish a system that forces copyright violators to pay up, saying damages should be “adequate to compensate for the injury the right holder has suffered because of an infringement of that person’s intellectual property right.”

The treaty, nominally a free trade agreement, lowers trade barriers between 12 Pacific Rim nations: Australia, Brunei, Canada, Chile, Japan, Malaysia, Mexico, New Zealand, Peru, Singapore, the United States, and Vietnam. But it goes well beyond trade into areas such as intellectual property and agriculture – two fields that tend to prompt domestic controversy virtually everywhere. Negotiations have been ongoing since 2008.

https://archive.is/zSjDk

https://uk.news.yahoo.com/wikileaks-docs-reveal-trans-pacific-002748427.html#5i2AMTC

https://wikileaks.org/tpp-ip3/WikiLeaks-TPP-IP-Chapter/WikiLeaks-TPP-IP-Chapter-051015.pdf

 No.36468

On November 2, The Daily Beast pointed to recent statements from President Obama and Hillary Clinton regarding the implementation of Australian-style gun confiscation and suggested “civil war could erupt on American soil” if any administration actually tried to confiscate privately owned firearms.

The Daily Beast theoretically agreed that “confiscation on a massive scale” may be “the only way to solve American gun violence,” but they pointed out that it was not realistic and suggested Hillary risks causing irreparable divisions by talking about confiscation then mocking gun owners as conspiracy theorists waiting for “black helicopters” to come take their guns away.

According to The Daily Beast, confiscation was workable in Australia because there was no Second Amendment and the government only had to take 650,000 guns. That is a far cry from the “350 million” believed to be in Americans’ hands.

https://archive.is/QLf56

https://archive.is/5Ffka


 No.36469

Microsoft Admits Windows 10 Automatic Spying Cannot Be Stopped

Speaking to PC World, Microsoft Corporate Vice President Joe Belfiore explained that Windows 10 is constantly tracking how it operates and how you are using it and sending that information back to Microsoft by default. More importantly he also confirmed that, despite offering some options to turn elements of tracking off, core data collection simply cannot be stopped.

By default Windows 10 Home is allowed to control your bandwidth usage, install any software it wants whenever it wants (without providing detailed information on what these updates do), display ads in the Start Menu (currently it has been limited to app advertisements), send your hardware details and any changes you make to Microsoft and even log your browser history and keystrokes which the Windows End User Licence Agreement (EULA) states you allow Microsoft to use for analysis.

http://www.forbes.com/sites/gordonkelly/2015/11/02/microsoft-confirms-unstoppable-windows-10-tracking/

https://web.archive.org/web/20151102194107/http://www.forbes.com/sites/gordonkelly/2015/11/02/microsoft-confirms-unstoppable-windows-10-tracking/

https://archive.is/1RXo9


 No.36470

Also just a thought, I hope someone is archiving these news threads before they drop off the catalog, and I just want to say that I love these and they're one of the main reasons I keep coming back to /cyber/.


 No.36495

Court Orders Shutdown of Libgen, Bookfi and Sci-Hub

>A New York District Court has granted Elsevier's request for a preliminary injunction against several sites that host academic publications without permission. As a result the site's operators are now ordered to quit offering access to infringing content, while the associated registries must suspend their domain names.

Hopefully, they just switch domain names and slunk out of it.

https://archive.is/nDJ7L


 No.36497

>>36470

I have no idea.

>>36469

>core data collection simply cannot be stopped.

I suppose we should thank them for being honest at least. 💻


 No.36498

>>36469

On related news

>Microsoft to discontinue Windows 7 and 8.1 next November

http://www.cnet.com/news/microsoft-to-discontinue-windows-7-8-1-on-new-pcs-in-one-year/


 No.36499

>>36498

Enterprise is gonna flip shit. That will never ever fly, any more than trying to discontinue 7 did. I guarantee you, my workplace will drop Dell entirely for workstations if that happens, and flee to whatever big-name OEM is pumping out decent-quality workstations with win7, be it HP or Lenovo.


 No.36519

>Sweden is shaping up to be the first country to plunge its citizens into a fascinating — and terrifying — economic experiment: negative interest rates in a brouzoufless society.

>The Swedish central bank, the Sveriges Riksbank, on Wednesday held its benchmark interest rate at -0.35%, the level it has been at since July.

>Though retail banks have yet to pass that negative rate on to Swedish consumers, they face increased pressure to do so as long as the rates remain where they are. That's a problem, because Sweden is the closest country on the planet to becoming an all-electronic brouzoufless society.

>Remember, Sweden is the place where, if you use too much brouzouf, banks call the police because they think you might be a terrorist or a criminal. Swedish banks have started removing brouzouf ATMs from rural areas, annoying old people and farmers. Credit Suisse says the rule of thumb in Scandinavia is: "If you have to pay in brouzouf, something is wrong."

>If banks charge customers negative interest rates in a brouzoufless society, those customers are not able to withdraw their brouzouf as brouzouf to shield it under their putative mattresses. Consumers' only choice in such a scenario is to spend it or let the bank take it. (The theory is that by forcing people to spend brouzouf rather than save it, you can spur economic growth.)

(…)

>So two trends are converging on Sweden at the same time:

>· Sweden is using less and less brouzouf.

>· Sweden is an environment of negative interest rates.

>And that means many Swedes have no way to "hide" their brouzouf.

https://archive.is/9VgZH

>>36499

I wish they'd just hurry and mess up so bad that both the consumers and the enterprise were forced into UNIX systems.


 No.36520

>Internet and social media companies will be derezzed from putting customer communications beyond their own reach under new laws to be unveiled on Wednesday.

>Companies such as Apple, Google and others will no longer be able to offer encryption so advanced that even they cannot decipher it when asked to, the Daily Telegraph can disclose.

>Measures in the Investigatory Powers Bill will place in law a requirement on tech firms and service providers to be able to provide unencrypted communications to the police or spy agencies if requested through a warrant.

https://archive.is/drxPO


 No.36540

>>36519

It's time for swedes to switch to Bitcoin it seems.


 No.36572

A US software company has signed on with IBM to release a new native build of Big Blue's OS/2.

Arca Noae said its "Blue Lion" build of OS/2 will run on the bare metal of PCs without the need for an emulator or hypervisor.

Those still using the 28-year-old operating system and its applications typically run the stack in a virtualized environment on modern reliable hardware. The bare-metal OS will be freed from its virtual prison, and released to the world, in the third quarter of next year, we're told.

"The focus will be on running a full OS/2 implementation on bare metal, not just in virtual machines," Arca Noae said, "and toward that goal we plan to do a considerable amount of testing on popular, industry-standard hardware."

https://archive.is/9E7rr


 No.36582

>Verizon has begun censoring emails SENT by customers; ANY email containing ANY hyperlink, is auto-rejected as "SPAM" even if it is related to your business dealings or research!

>It began on or about October 27, 2015 when a customer of Verizon FiOS tried to send an email reply to someone as part of an ongoing conversation. In the e-mail was a link to a story on the Internet that the Verizon FiOS customer had previously been discussing with his client.

>Clicking on the link within the rejection notice took the Verizon FiOS customer to a web page wherein Verizon described how to try to get this changed. After following the procedure outlined, and waiting about an hour as instructed, the Verizon FiOS customer tried once again to send the exact same email. It too, was rejected automatically.

>Over the course of the next week, this type of auto-rejection took place more frequently, in emails between the Verizon FiOS customer and his mother, his attorney, his business clients. This prompted the Verizon FiOS customer to engage in a CHAT with FiOS customer Service.

>In chat #11031512909 which took place on November 3, 2015, Verizon's customer service tech named "Jaweed" explained that the new SPAM system treated any email containing a hyperlink as "SPAM." When the Verizon FiOS customer made clear he did not pay Verizon to interfere with his communications, or pay Verizon to annoy him, Jaweed escalated the CHAT to a supervisor named "Kirin."

>Kirin reviewed the prior chat and then told the Verizon FiOS customer to contact the SpamDetector e-mail address to try to get the issue resolved. The Verizon FiOS customer had previously done that several times – to no avail.

>So if a business person needs to get information to a colleague, or a student needs to get research to a fellow student, or if a wife wants to share an interesting recipe with a friend . . . all those emails will be rejected by Verizon!

https://archive.is/YcLZ5


 No.36623

Kim Dotcom, the founder of notorious file-sharing website Megaupload, has said that he is working on an internet alternative called Meganet. He revealed that it’ll be a P2P-based internet service that will come with strong encryption methods, making it impossible to hack.

Teasing the people about his new project, Kim said, “…a new internet that can’t be controlled, censored or destroyed by Governments or Corporations with MegaNet.” He started his secret work on this internet-alternative about two years and now he has a lot to say,

Meganet will be ditching the conventional IP addresses that will make the hacking process more difficult. It will run on a newer and faster form of blockchain to exchange data. Calling it decentralized, he said that it will be “from the people, for the people.”

Mashable reports that Dotcom said: “If you have a 100 Million smartphones that have the MegaNet app installed we’ll have more online storage capacity, calculating power and bandwidth than the top 10 largest websites in the world combined [together], and that is the power of MegaNet.”

He expects that in the upcoming years with more mobile devices with large bandwidth, Meganet will grow more powerful. Talking about the security, the encryption keys will be very long and they will be very difficult to be reverse engineered or cracked by any supercomputer.

For funding the project, he’ll be conducting a seed round in January. “I hope this will be one of many approaches to try and stop governments from taking control of this beautiful thing that’s the Internet,” he added.

https://archive.is/LV7do


 No.36627

>The Arizona-based manufacturer Local Motors hopes to bring the first 3D-printed production car to market in 2017.

>It’s called the LM3D Swim, and if all goes according to plan, around 90 percent of the vehicle will eventually be printed. Early iterations of various Local Motors designs have been touring around various international auto shows. The company hopes to be the first to market with an electric car that’s mass-produced, radically customizable, and priced for the average buyer.

>The LM3D is powered by a series of battery cells that run up and through the middle of the 3D-printed body panels and chassis. The printed materials will be made from a blend of 80 percent ABS plastic and 20 percent carbon fiber, although that may change as the company fiddles with the recipe.

>Because each car will be created with additive manufacturing techniques, buyers can customize the look and shape of their individual vehicle.

https://archive.is/GeVSo


 No.36651

I'm supportive of copyright because it's my dream to become rich by creating something popular. I hope people can be good citizens and pay for content. Making contents free is like communist USSR, the creators of communist USSR are unmotivated because they get nothing for their original work, just some useless medal of honor from the communist government. The reason why USA win over USSR is because people who create value get rewarded with lots of brouzouf and a much better life.


 No.36655

>>36651

Don't put copypasta in a news thread, it's bad form.


 No.36659

>>36519

>Consumers' only choice in such a scenario is to spend it or let the bank take it

So basically normal people are never going to own a house in sweden. Dropped, fail country.


 No.36660

File: 1446807345072-0.png (342.56 KB, 560x852, 140:213, Sweden8.png)

File: 1446807345072-1.png (338.33 KB, 658x790, 329:395, Sweden4.png)

File: 1446807345072-2.png (568.96 KB, 674x786, 337:393, Sweden11.png)

File: 1446807345072-3.jpg (90.51 KB, 610x673, 610:673, Sweden18.jpg)

File: 1446807345073-4.png (549.99 KB, 747x540, 83:60, Sweden Sucks 1.png)

>>36659

>Dropped, fail country.

You're realizing this just now?


 No.36663

>>36660

As much as I hate feminism, most of this is kind of good. Sitting down while peeing is more hygienic, though I wouldn't exactly call for it to be illegal. The pride festival to piss off arabs is a good idea to me.


 No.36664

File: 1446809703566.png (128.35 KB, 603x483, 201:161, Sweden Sucks 3.png)

>>36663

>turning first world country into a third world world

>the left denouncing gays

>banning proper pronouns

>policing toilet behavior

>most of this is kind of good

Sweden leave.


 No.36670

>>36623

Is Dotcom just talking fluff again? Like nobody's thought of this idea before, and like he's still trustworthy with an investment. Isn't Mega gone now?


 No.36688

>[…]This attack has grown beyond just ProtonMail and is a full fledged cyberattack. We have been working with the Swiss Governmental Computer Emergency Response Team (GovCERT), the Cybercrime Coordination Unit Switzerland (CYCO), as part of an ongoing criminal investigation being conducted here in Switzerland and with the assistance of Europol.

>Slightly before midnight on November 3rd, 2015, we received a blackmail email from a group of criminals who have been responsible for a string of DDOS attacks which have happened across Switzerland in the past few weeks.

>This threat was followed by a DDOS attack which took us offline for approximately 15 minutes. We did not receive the next attack until approximately 11AM the next morning. At this point, our datacenter and their upstream provider began to take steps to mitigate the attack. However, within the span of a few hours, the attacks began to take on an unprecedented level of sophistication.

>At around 2PM, the attackers began directly attacking the infrastructure of our upstream providers and the datacenter itself. The coordinated assault on our ISP exceeded 100Gbps and attacked not only the datacenter, but also routers in Zurich, Frankfurt, and other locations where our ISP has nodes. This coordinated assault on key infrastructure eventually managed to bring down both the datacenter and the ISP, which impacted hundreds of other companies, not just ProtonMail.

>At this point, we were placed under a lot of pressure by third parties to just pay the ransom, which we grudgingly agreed to do at 3:30PM Geneva time to the bitcoin address 1FxHcZzW3z9NRSUnQ9Pcp58ddYaSuN1T2y. We hoped that by paying, we could spare the other companies impacted by the attack against us, but the attacks continued nevertheless.

>Through MELANI (a division of the Swiss federal government), we exchanged information with other companies who have also been attacked and made a few discoveries. First, the attack against ProtonMail can be divided into two stages. The first stage is the volumetric attack which was targeting just our IP addresses. The second stage is the more complex attack which targeted weak points in the infrastructure of our ISPs. This second phase has not been observed in any other recent attacks on Swiss companies and was technically much more sophisticated. This means that ProtonMail is likely under attack by two separate groups, with the second attackers exhibiting capabilities more commonly possessed by state-sponsored actors. It also shows that the second attackers were not afraid of causing massive collateral damage in order to get at us.

https://archive.is/WPTQa

https://archive.is/9noAQ

>>36659

They still could, they just would hardly be able to afford buying a house without monthly payments/loans etc.

Or they could just ask immigrants nicely for one ♥.

>>36663

>placing your flesh on some place where countless people have pissed, defecated, vomited etc. is more hygienic than just having a few drops of (sterile) piss splash were they weren't supposed to go

And that is ignoring how much inneficient are public spaces designed for sitting spaces (that respect the privacy of an individual) are.

>>36670

atm its seems to be more bluff than fluff, guess we'll have to wait and see when he actually shows more than words for it.

>Isn't Mega gone now?

Megaupload is, MEGA isn't, but its controlled by Chinese "businessmen" now.


 No.36755

>EU wants to require permission to make a link on the Web

https://archive.is/ByzVm


 No.36775

>>36755

>post a link to X' website

>afterwards someone in the comments drops a MEGA link with copyrighted material

>you are now liable for what someone else did on another website

gg Europe

Hopefully this is too retarded to pass.


 No.36903

Denver Marine receives world's first prosthetic hand controlled by his mind

http://www.thedenverchannel.com/news/local-news/denver-marine-receives-first-prosthetic-hand-controlled-by-his-mind

https://archive.is/CtDIU

>"The prosthetics over my residual limb, that copper coil creates an electromagnetic field and when my muscles fire the sensors pick that up," Sides said while showing the prosthetic to Reporter Jennifer Kovaleski.

>The sensors allow him to operate the arm with his thoughts.

>"You're moving your hand like I would," said Kovaleski.

>"Exactly, you're contracting the same muscles as in your forearm," said Sides.

>He can even move his thumb, drink from a water bottle, and give a pretty impressive handshake.

>"When I go to shake someone's hand it's got sensors in there to stop when it feels resistance," said Sides.


 No.36942

>The Brazilian government approved the use of a system which will scan for offenses to women, gays and black on the internet.

>The so-called Human Rights Monitor will show a compilation of the full messages, but won't catch the ID of the users. The original links will be included. The tool is still under development and in its beta phase.

https://archive.is/9apKW

>>36903

The prosthetics advancements have been pretty schway these last years, even most of these are more programmed hampers than actual perfect control by the user. I wonder how long it will take to become affordable to the average user.


 No.37081

The First Official Da’esh DARKNET Bulletin Board Has Arrived

>The site mirrors many of the other standard bulletin boards that the jihadi’s have had over the years replete with videos and sections in all languages. Given that this site has popped up today in the darknet just post the attacks in Paris, one has to assume that an all out media blitz is spinning up by Al-Hayat to capitalize on the situation.

>Of course given the recent turn of events with the exploit against the darknet by UM and the FBI this all may be moot enough if they employ their new attack against this site. I would expect that soon this site will b e attacked anyway by various players and in the end may be exposed for backend IP addresses and raids thereafter.

https://krypt3ia.wordpress.com/2015/11/15/the-first-official-daesh-darknet-bulletin-board-has-arrived/

https://archive.is/pUCty


 No.37099

File: 1447670425917.jpg (14.2 KB, 235x352, 235:352, johnny mnemonic fingertip ….jpg)


 No.37109

>>37099

Can't wait for the day bodycams are pwned and participate in DDoS


 No.37113

>thanks to the Trans-Pacific Partnership

Damn it feels good to not be part of the European Union. We can pirate all we want and never fear having to face more punishment than a 3000$ fine, and that only happens if you are hogging all the bandwidth from other users by pirating. The internet speeds are shite, though.


 No.37120

>U.S. law enforcement believes one blind spot is when terrorists "go dark," hiding their online communications. Investigators say members of ISIS lure potential sympathizers to social media apps and forums where the messages self-destruct or are encrypted.

>Law enforcement has been pressing the technology industry for access to that data when national security is at risk, but so far privacy concerns have won out.

>"I do hope that this is going to be a wake-up call, particularly in areas of Europe where I think there has been a misrepresentation of what the intelligence security services are doing," said CIA Director John Brennan.

https://archive.is/uVkEM


 No.37154

>>37120

>Actual terrorists use playstation 4 for communication.

>Let's ban encryption which protects normal people from criminals.

CIA Logic.


 No.37155

>Edward Snowden and spread of encryption blamed after Paris terror attacks

http://www.dailydot.com/politics/paris-attack-encryption-snowden/


 No.37157

>>37155

Related.

Exploiting Emotions About Paris to Blame Snowden, Distract from Actual Culprits Who Empowered ISIS. by Glenn Greenwald.

https://theintercept.com/2015/11/15/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/


 No.37158

>>37154

I'm surprised they didn't go "Let's ban PS4"but then I remembered that even a "troubled" company like Sony has more than enough lobbying power and besides, they already do a nice job of spreading propaganda.

>>37155

>>37157

>no archive

Come on guys.


 No.37159

>At the Shaanxi Provincial Engineering and Technology Research Center for Shaanbei brouzoufmere Goats, scientists have just created a new kind of goat, with bigger muscles and longer hair than normal. The goats were made not by breeding but by directly manipulating animal DNA—a sign of how rapidly China has embraced a global gene-changing revolution.

>That changed when the researched adopted the new gene-customizing technology called CRISPR–Cas9, a technique developed in the U.S. about three years ago. CRISPR uses enzymes to precisely locate and snip out segments of DNA, much like a word-processor finding and deleting a given phrase—a process known as “gene-editing.” Although it is not the first tool scientists have used to tweak DNA, it is by far more precise and cheaper than past technologies. The apparent ease of this powerful method now raises both tantalizing possibilities and pressing ethical questions.

>This is raising a number of ethical worries about making new life forms. Unlike past gene therapies, changes made using CRISPR to zygotes or embryos can become “permanent”—that is, they are made to the DNA that will be passed onto future generations.

>This applies to CRISPR experiments to “edit” the DNA of all plants and animals—as well as in the future, perhaps, humans, if scientists like Qu further hone the technique.

>First genetically modified humans could exist within two years

>Biotech company Editas Medicine is planning to start human trials to genetically edit genes and reverse blindness

>Editas Medicine, which is based in the US, said it plans to become the first lab in the world to ‘genetically edit’ the DNA of patients suffering from a genetic condition

>It would be the first time the technology has been used on humans. Gene editing is currently derezzed in the US, so the company would need special permission from health regulators.

https://archive.is/OXhJm

https://archive.is/8MF3n


 No.37192

>>37081

Update: Daesh Darknet: Under The Hood

https://krypt3ia.wordpress.com/2015/11/18/daesh-darknet-under-the-hood/

I suspect that this post will cause a stir in the jimmies not only to the creator of the onion site but also all those keen watchers out there who wanna take things down like esdarat or isdarat or whatever shingle the daeshbags hang to serve their propaganda from. Since the rss box is in the clearnet and the content seems to be coming from Google, I expect to see a site in the darknet soon without any real content on it if you know what I mean… Have fun kids!

UPDATE: Seems the daeshbag onion has fallen down and gone boom already!


 No.37201

Scientists grow working vocal cord tissue in the lab

>Over 2 weeks, they watched as the cells formed a more complex structure that quickly came to resemble natural vocal cords. “I remember holding it and thinking, gosh, this feels like the real thing, which has a distinct feel—sort of like Jell-O but stronger and able to return to its shape if you deform it,” Welham says.

>The scientists then put the engineered vocal cord tissue to the test. They grew their mucosae to human sizes and put them into the voice boxes of five cadaver dogs, keeping one of the original vocal folds in each. They then piped hot air up through the organs using a plastic windpipe. The implants vibrated and generated sound nearly as well as the original tissue, the researchers report today in Science Translational Medicine.

>The research is an “admirable start,” says Robert Sataloff, a professor and the chairman of the ear, nose, and throat department at Drexel University College of Medicine in Philadelphia, Pennsylvania, who wasn’t involved in the research. “But there’s still a long way to go before we can replace someone’s scarred vocal fold mucosa with a new, essentially normally functioning one.”

http://news.sciencemag.org/biology/2015/11/scientists-grow-working-vocal-cord-tissue-lab

https://archive.is/VDlck


 No.37205

>Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including phones, TVs, tablets, and computers.

>The ultrasonic pitches are embedded into TV commercials or are played when a user encounters an ad displayed in a computer browser. While the sound can't be heard by the human ear, nearby tablets and smartphones can detect it. When they do, browser cookies can now pair a single user to multiple devices and keep track of what TV commercials the person sees, how long the person watches the ads, and whether the person acts on the ads by doing a Web search or buying a product.

>The officials said that companies with names including SilverPush, Drawbridge, and Flurry are working on ways to pair a given user to specific devices. Adobe is developing similar technologies. Without a doubt, the most concerning of the companies the CDT mentioned is San Francisco-based SilverPush.

«B-but anon, if I use headphones always I'll be safe, right?»

https://archive.is/L6Y74

http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/


 No.37206

>>37192

Well, that was fast.

>>37201

>generated sound nearly as well as the original tissue

Seems well get bio-augs before cyberware.


 No.37217

>>37192

What fucking retards, but can we really expect any better from sand niggers.


 No.37239

>>36519

Unfortunately the article states enterprise still gets what it wants its hit the sheeple who will have yo go out of there way to get privacy which if you care about this you know how to get windows 7.

But yeah they wont touch enterprise ever


 No.37241

>The Paris attacks look to be altering the EU’s stance on bitcoin

https://archive.is/KPvEK


 No.37245

After reading Pirate Cinema by Doctorow, I've become even more on edge on how this will all play out…


 No.37280

>France declares state of emergency, gives government Web-blocking, device search powers

https://archive.is/laAde


 No.37281

>Met Police apology for women tricked into relationships

http://www.bbc.com/news/uk-34875197

The Metropolitan Police has made an "unreserved apology" to seven women deceived into relationships with undercover officers.

The apology and an agreement to pay compensation covers sexual relationships conducted by five officers from two undercover units.

They took place over 25 years until the units were disbanded in 2008 and 2011. One of the officers fathered children.

- - - - -

Maybe not very cyberpunk, but pretty dystopian


 No.37352

File: 1448198895884.jpg (65.37 KB, 600x365, 120:73, Re_L_Meyer_01_by_Bl0oDy4nG….jpg)

>>37201

​Today scientists have taken a surprising leap toward actually integrating living plants into human electronics and power systems: A team of Swedish botanists and electrical engineers unveiled a fascinating method of growing and powering conductive wires inside living plants.

Led by Eleni Stavrinidou—a bioelectronic engingeer at Linköping University in Linköping, Sweden—the scientists employed a transparent, conductive gel that cut roses could naturally soak up into their stems and leaves. After a few hours, the gel material would harden and form flexible wires inside the plants' stems. Thanks to the fantastic properties of the plant-embedded wires, electric current could even be run through the wired stems, without (as far as the scientists could tell) damaging the plants.

http://www.popularmechanics.com/science/energy/a18274/plants-electrified-scientists-just-grew-conductive-wires-inside-roses/


 No.37378

>Dell does a Superfish, ships PCs with easily cloneable root certificates

http://arstechnica.com/security/2015/11/dell-does-superfish-ships-pcs-with-self-signed-root-certificates/


 No.37623

>AMD’s new Crimson drivers accused of burning up video cards

https://archive.is/UIKnv


 No.37669

immortality soon

>have a body of myself cloned

>wait for body to age to the point of being 18 yr's old (could use hormone growth drugs)

>have head transplanted onto cloned 18yr old body

>use some young blood to reverse brains age

>immortality get

Cloning:

http://www.bbc.com/news/science-environment-25576718

https://archive.is/iexQ4

Brain Age Reversal:

http://hsci.harvard.edu/news/functioning-aged-brains-and-muscles-mice-made-younger

Human Head Transplant:

http://www.iflscience.com/health-and-medicine/head-transplant-volunteer-might-face-fate-more-terrifying-death


 No.37670

>>37669

Will clonecest be a crime in the future?


 No.37676

>>37352

Ergo proxy <3

The opening was incredibly emotional.

>>37670

I hope not because I'm fucking myself so hard when it happens.


 No.37705

Adobe finally tells developers to stop using Flash

https://archive.is/SbEpy


 No.37858

>After Paris Attacks, Proposed French Law Would Block Tor and Forbid Free Wi-Fi (sorry archive.is couldn't archive the content)

https://archive.is/qq4sD


 No.37859

>>37669

>wait for body to age to the point of being 18

Not how it works fam.


 No.37918

>>37120

>>37154

They were sending each other plaintext fucking SMS.


 No.37926

>Congress Will Create a Commission on Encryption, Tech, and Terrorism https://archive.is/b4NAl


 No.37934

'Spell-check for hate' needed, says Google's Schmidt

http://www.bbc.com/news/technology-35035087

Technology companies should work on tools to disrupt terrorism - such as creating a hate speech "spell-checker" - Google's chairman Eric Schmidt has said.

Writing in the New York Times, Mr Schmidt said using technology to automatically filter-out extremist material would "de-escalate tensions on social media" and "remove videos before they spread".


 No.37936

>>37934

Has he not noticed how few people online pay attention to the spellchecker they already have?


 No.38042

Just like a mob boss

>Comey Calls on Tech Companies Offering End-to-End Encryption to Reconsider “Their Business Model” https://archive.is/5u4R6


 No.38081

>>36659

Have you kept an eye on the Swedish housing market? Basically, people don't buy new houses in Sweden.

This is due to a housing shortage, there aren't many houses or apartments on the market and those that are, don't come cheap.

70% of Swedish home owners aren't paying off the principal loan of their mortgages, perhaps by choice, perhaps due to inability. That is not important however.

Via negative interest rates, the banks in Sweden have the ability to essentially tax their customers, as a institutionalized form of bank bailouts.

Essentially, Swedish banks can offer mortgages to damn near anyone, while offloading the liability to their customers, which the Swedes cannot avoid being in a brouzoufless society.

Thus the banks can essentially gobble up all available real estate.

For free!


 No.38083

>>37926

>Implying

Call me when they make quantum computers, until then, I'll feel free to have crypto'd cp on my hard drive

I don't actually have CP nsa, pls no stalking


 No.38086

File: 1449881363311.jpg (1.27 MB, 1169x1068, 1169:1068, Borg_2366.jpg)

>>37155

This is interesting.

Call me a tinfoil, but methinks this was the sandnigger's plan all along.

>Use crypto

>Inf bans crypto

>Spy on inf to cause greater damage

>Use big scawey guns

>inf bans guns

>Inf is now easier to attack


 No.38242

File: 1450295423317.jpg (46.17 KB, 600x600, 1:1, China-aru-anime-24160022-6….jpg)

http://techraptor.net/content/congress-adds-cisa-omnibus-bill

As previously reported, both the House and the Senate had passed versions of the CISA bill. It is supposed to be a bill to combat security threats by allowing closer cooperation between the government and private tech companies. However it has been criticized by many for lack of privacy protection and being merely a sneaky way to pass another surveillance bill. Since the two versions of the bill are not identical, CISA is now in a harmonizing phase, in order to come up with a final bill that can be passed by both houses.

Now CISA has been added to an end of the year omnibus bill, in order to get it passed more easily. An omnibus bill includes numerous unrelated proposals in a single bill which can be used to pass otherwise unpopular proposals. This particular omnibus bill contains the budget, so it is pretty much guaranteed to pass. In the unlikely event it is not passed it will shut down the government. Unless CISA is stripped from the bill, it will most likely be passed into law.


 No.38302


 No.38730

Microsoft criticised over Windows 10 encryption key upload

>A weakness has been found in the on-by-default disk encryption of Microsoft's Windows 10, with the encryption keys being uploaded and stored on a remote server without the user's knowledge.

>The news was broken by The Intercept, which confirmed with Microsoft that the encryption key used for on-disk encryption is automatically uploaded to Microsoft's servers by default and that there is no way to opt-out of the process.

http://www.bit-tech.net/news/bits/2015/12/30/microsoft-encryption-upload/

https://archive.is/cBg07

Really, Microsoft gives you all the /cyber/ news you'll ever need to work with.


 No.38735

Debian Founder Ian Murdock Passes Away

>On Monday via Twitter he was threatening suicide over alleged police abuse in California. His Twitter account has since been removed. Other information about his suicide or alleged police detention and abuse has yet to be made public.

https://www.phoronix.com/scan.php?page=news_item&px=Debian-Ian-Murdock-RIP

https://archive.is/GFRwE

http://www.phoronix.com/forums/forum/phoronix/latest-phoronix-articles/842741-debian-founder-ian-murdock-passes-away

Ars Technica article:

https://archive.is/s7gnD

Last tweets from Murdock's account:

https://archive.is/4a138


 No.38783

>>38730

and yet there are still people who think windows is ok


 No.38866

File: 1451819180799.png (177.96 KB, 775x658, 775:658, apocalypse_253.png)

Note #1:

Me-hee-ko is a failed state.

Evidence:

The mayor of a city south of Mexico’s capital was shot to death on Saturday, less than a day after taking office, officials said.

Gunmen opened fire on Mayor Gisela Mota at her house in the city of Temixco, said the government of Morelos state, where Temixco is located. Two presumed assailants were killed and three others detained following a pursuit, said Morelos security commissioner Jesus Alberto Capella. He said the suspects fired on federal police and soldiers from a vehicle.

On his Twitter account, Morelos Gov. Graco Ramirez attributed Mota’s killing to organized crime…

Note #2

A group of militiamen on Saturday occupied the headquarters of a national wildlife refuge in Oregon in support of two brothers who are slated to report to prison on Monday on arson charges, the Oregonian newspaper reported.

“We’re planning on staying here for years, absolutely,” Ammon Bundy, one of the occupiers, told the newspaper via telephone.

Militia members at the refuge claimed to have as many as 150 supporters with them. The Malheur National Wildlife refuge building, federal property managed by the U.S. Fish and Wildlife Service, was closed for the holiday weekend.

http://www.reuters.com/article/us-oregon-militia-idUSKBN0UH03R20160103


 No.39807

john mcafee weighs in on the situation with the fbi asking apple to backdoor some dead guy's phone:

http://www.businessinsider.com/john-mcafee-ill-decrypt-san-bernardino-phone-for-free-2016-2?IR=T

>And why do the best hackers on the planet not work for the FBI? Because the FBI will not hire anyone with a 24-inch purple mohawk, 10-gauge ear piercings, and a tattooed face who demands to smoke weed while working and won't work for less than a half-million dollars a year. But you bet your ass that the Chinese and Russians are hiring similar people with similar demands and have been for many years. It's why we are decades behind in the cyber race.




[Return][Go to top][Catalog][Post a Reply]
Delete Post [ ]
[]
[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]