PBI: Some very serious stuff buried in here. Another video, links, below.
Penguin: Zoom Rocks — Beware of Zoom Attacks
Advanced Cyber/IO, IO ImpotencyPerils Of Working From Home: The Rise Of Zoombombing
There have been widespread reports of Zoombombing – with everything from violent videos to pornographic content shown on company calls.
Zoom also outlines the following in-meeting protective features:
Continue reading “Penguin: Zoom Rocks — Beware of Zoom Attacks”
Stephen E. Arnold: A Solution to the Blockchain Trilemma?
Advanced Cyber/IOA Solution to the Blockchain Trilemma?
Struggling to deliver a blockchain application which is decentralized, secure, and scalable? A solution may have been developed. Navigate to “Ex-Microsoft Researcher Says He’s Solved the Blockchain Scalability Problem.” Despite the hype about blockchain, there’s a problem mixed with the promise:
…It says that it’s easy to have a blockchain with two of three key attributes: decentralization, security, and scalability. What’s difficult is getting all three; so far, cranking up the volume has always meant sacrificing on another.
The alleged solution comes from Asensys, led by former Microsoft lead researcher JiaPing Wang.
Mongoose: While US Wastes Blood & Treasure on Elective Wars, China Is Building the Internet for the Whole Earth
02 China, 03 Economy, 08 Wild Cards, 11 Society, Advanced Cyber/IO, Ethics, Government, IO Deeds of Peace, Officers CallTo subdue the enemy without fighting is the acme of skill. Sun Tzu
Mongoose: Your Photo, Taken On the Street, Leads to All Your Info
Advanced Cyber/IOClearview app lets strangers find your name, info with snap of a photo, report says
It may not be long before you'll have to forget about walking down the street anonymously, says a New York Times report.
John Petersen: Utility Meters as Surveillance Devices
Advanced Cyber/IOThe Role Of Utility Meters In Mass Surveillance
Jerry Day in Crime & Power
The big data farmers discovered a lucky accident: your utility meter can be juiced up to collect all kinds of personal data from you in your home. Just by jamming some special electronics in utility meters, they are creating the most invasive and massive surveillance program ever undertaken in history. Imagine collecting the daily and hourly behavioral habits of every household in the developed world.
Penguin: ESI Analyst for Integrating Traffic Streams
Advanced Cyber/IOSay Goodbye to Spreadsheet Production of Text Messages!