What Are NFTs? Meet Crypto’s Digital Collectibles

 

A representation of an NFT token on a blockchain.
HollyHarry/Shutterstock.com

NFTs are the hot new thing in the blockchain and cryptocurrency world. Think of an NFT like a digital collector’s item. It’s a unique digital object, and NFTs are exploding in popularity. But what is an NFT?

Continue reading

Inside This Amazon Scientist’s $25 Million Plan to Turn 12 Abandoned Acres in Jackson, Mississippi Into a Tech Hub | Inc.com

Nashlie Sephus’s latest venture isn’t just a moonshot. It’s a homecoming. Her goal: Create a tech hub out of 12 abandoned acres of vacant lots and derelict buildings in the heart of downtown Jackson, Mississippi.

The 35-year-old has spent the past four years splitting her time between Jackson, her hometown, and Atlanta, where she works as an applied science manager for Amazon’s artificial intelligence initiative. Amazon had acquired Partpic, the visual recognition technology startup where she was chief technology officer, in 2016 for an undisclosed sum. In 2018, she founded the Bean Path, an incubator and technology consulting nonprofit in Jackson that she says has helped more than 400 local businesses and individuals with their tech needs.

Continue reading

5 Ways an Offline PC Can Be Hacked

Shit is real in the online battlefield….

Some people believe taking a computer offline makes it impossible to hack. These offline PC attacks show it’s not as safe as you imagine.

Data breaches are rapidly becoming a part of everyday online life. Even a cursory glance at the news highlights the latest leak of confidential or personal information onto the internet. While many people are increasingly concerned by these developments, it can often seem as though you are powerless against them.

Continue reading

How Law Enforcement Gets Around Your Smartphone’s Encryption : Android

 

This recently released research paper: Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions by Matthew Green and his team which is also covered by WIRED talks about design flaw in data encryption of android and iOS. Wired brushes off most of the technical details and the paper didn’t cover android’s File Based Encryption very well which I think needs some clarity on it. The paper draws the correct conclusion though and what should be improved in successor android versions.

Continue reading

Project Brooklyn | Concept Gaming Chair For Next Generation Immersion – YouTube

 

Take your game to the edge with Project Brooklyn—a concept gaming chair designed to redefine the meaning of total immersion. Your front row seat to the future of gaming, this cutting-edge chair transforms into an entertainment powerhouse packed with panoramic visuals in a 60” rollout display, riveting tactile feedback, and a transformable table for PC and console gaming.

Project Brooklyn | Concept Gaming Chair For Next Generation Immersion – YouTube

In 1988, A College Kid’s Screw-Up Changed The Internet Forever

This is a wild ass story about how the Net used to be VERY vulnerable….

On the evening of November 2, 1988, in a quiet computer lab at MIT, a student majorly screwed up.

Robert Tappan Morris, a 23-year-old computer science student at Cornell University, had written 99 lines of code and launched the program onto the ARPANET, the early foundation of the Internet. Unbeknownst to him, he had just unleashed one of the Internet’s first self-replicating, self-propagating worm – “the Morris Worm” – and it would change the way we saw the Internet forever.

Continue reading

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack — Krebs on Security

I find it hilarious that AmeriKKa doesn’t recognize China is their biggest threat and enemy… who they owe money AND outsourced our middle class to in the 90s & 00s…..

The U.S. Justice Department this week indicted seven Chinese nationals for a decade-long hacking spree that targeted more than 100 high-tech and online gaming companies. The government alleges the men used malware-laced phishing emails and “supply chain” attacks to steal data from companies and their customers. One of the alleged hackers was first profiled here in 2012 as the owner of a Chinese antivirus firm.

Continue reading

Former Uber Exec Charged Over Alleged Cover-Up of Disastrous Hack

The former chief of Uber’s security was charged this week in connection with an alleged cover-up of a massive 2016 hack that exposed the personal information of some 57 million Uber users—a breach he tried his hardest to sweep under the rug.

Continue reading

Maxoak Bluetti EB240: Massive Battery Storage, Budget Price

This would be a good investment… there is a contest to win one at the original link

If like me, you’re feeling a prescient need to drop off-grid before the proverbial really hits the fan, there are many things you need to prepare for. Food, water, security, and almost certainly your own source of power. Continue reading