Skip to main content

Home/ Advanced Concepts Team/ Group items matching "secure" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
LeopoldS

Electricity security in tomorrow's power systems - Analysis - IEA - 0 views

  •  
    encouraging trend
Marcus Maertens

US Petition for building a Death Star 2016 - 3 views

  •  
    By focusing our defense resources into a space-superiority platform and weapon system such as a Death Star, the government can spur job creation in the fields of construction, engineering, space exploration, and more, and strengthen our national defense.
  • ...1 more comment...
  •  
    I want to sign, it is totally a meaningful idea .... ! Just remember not to put the nuclear energy source at the end of a tunnel which has an opening on the surface :)
  •  
    Bad news from this frontier: https://petitions.whitehouse.gov/response/isnt-petition-response-youre-looking As the Americans are not going for it, it might be a good opportunity for Europeans to make a real difference in space.
  •  
    Merkel seems anyway a bit short of ideas ...
LeopoldS

Edward Snowden: the whistleblower behind the NSA surveillance revelations | World news | guardian.co.uk - 2 views

  •  
    long live the sys admins!
  •  
    careful, NSA is listening... you are now in their blacklist
  •  
    "Annual Security Inspection at ESTEC"... ... What exactly is this P.R.I.S.M. process that is running on Sophia?
Wiktor Piotrowski

How To Build Your Own Cockroach Cyborg | Popular Science - 1 views

  •  
    bio-robotics anybody?
  •  
    WIRING Poke the left silver wire about one millimeter into the roach's thorax, under a wing just behind its head, and secure it with superglue. Cut each antenna to expose a neuron-lined tube. Insert the middle wire one millimeter into the left tube, and the right wire into the right tube. Superglue both wires into place. CONNECT AND COMMAND Hot-glue the circuit board onto the roach's back and plug it into the head connector. After the roach wakes up, press the remote's left button to urge it right, and the right button to move it left. The cyborg will ignore commands after a few minutes. Peel off the circuit board and clip all wires to ensure a long retirement.
johannessimon81

The anternet - the signals network of ants - 3 views

  •  
    The algorithm that regulates the flow of ants is evolving toward minimizing operating costs rather than immediate accumulation.
  •  
    Turns out even ants can profit from a siesta on a hot day and they use network security and repair mechanisms. Maybe there is still something undiscovered that we can apply for our own networks.
jcunha

Malware that turns PCs into eavesdropping devices demonstrated - 2 views

  •  
    In Israel, a new way to hack by turning speakers into microphones.
jcunha

Europe plans giant billion-euro quantum technologies project - 0 views

  •  
    After graphene and blue brain, the European Commission has quietly announced plans to launch a €1-billion Euro project to boost a raft of quantum technologies - from secure communication networks to ultra-precise gravity sensors and clocks.
Aurelie Heritier

DARPA developing simple chameleon robot that may cost under $100 | Government Security News - 0 views

  •  
    A low-cost rubber robot that can change color to match its surroundings like a chameleon, light up in the dark, change temperatures and fit into tight places is under development at DARPA for potential defense and surveillance applications.
LeopoldS

Simultaneously Mitigating Near-Term Climate Change and Improving Human Health and Food Security - 0 views

  •  
    Interesting article, very practical in the approach ...
Luís F. Simões

Poison Attacks Against Machine Learning - Slashdot - 1 views

  • Support Vector Machines (SVMs) are fairly simple but powerful machine learning systems. They learn from data and are usually trained before being deployed.
  • In many cases they need to continue to learn as they do the job and this raised the possibility of feeding it with data that causes it to make bad decisions. Three researchers have recently demonstrated how to do this with the minimum poisoned data to maximum effect. What they discovered is that their method was capable of having a surprisingly large impact on the performance of the SVMs tested. They also point out that it could be possible to direct the induced errors so as to produce particular types of error.
  •  
    http://arxiv.org/abs/1206.6389v2 for Guido; an interesting example of "takeover" research
Christos Ampatzis

SWF Announces Young Professional Scholarships for IAC 2012 in Naples - 1 views

  •  
    Secure World Foundation (SWF) is pleased to announce that it will be accepting applications from young professionals for scholarships to aid in traveling to present papers at the 2012 International Astronautical Congress (IAC) in Naples, Italy.
Dario Izzo

How to visualize what your metadata say about you - 3 views

  •  
    A cool add on from MIT to understand, visualizing, what google knows about you
Thijs Versloot

The Molecule 'Scanner' - World's Smallest Terahertz Detector Invented - 1 views

  •  
    Related to our Airport security discussion
Thijs Versloot

The entropy of encryption and how secure is it? - 1 views

  •  
    I like the following text: "It's still exponentially hard, but it's exponentially easier than we thought," Duffy says. One implication is that an attacker who simply relied on the frequencies with which letters occur in English words could probably guess a user-selected password much more quickly than was previously thought. "Attackers often use graphics processors to distribute the problem," Duffy says. "You'd be surprised at how quickly you can guess stuff."
LeopoldS

Flying hacker contraption hunts other drones, turns them into zombies | Ars Technica - 1 views

  •  
    nice exploit
Daniel Hennes

Bitcoins in Space - 0 views

  •  
    Jeff Garzik wants to make satellites part of the Bitcoin network to help secure the currency against attacks.
  •  
    remember the discussion we had about space being used as a safe network for this type of stuff ....?
LeopoldS

Crypto-Gram: October 15, 2013 - 2 views

  •  
    interesting blog entry on TOR and the NSA
  •  
    on a somewhat related note. court document from the fbi agent that was chasing that silk road guy a friend sent me the other week. an interesting read if only because i found the content quite unexpected e.g. 2 pages of login instructions http://www1.icsi.berkeley.edu/~nweaver/UlbrichtCriminalComplaint.pdf
‹ Previous 21 - 40 of 80 Next › Last »
Showing 20 items per page