Intentionally confusing wording to confuse people apart from an intended audience
POPULARITY
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/32384 AWS Outages AWS has had issues most of the day on Monday, affecting numerous services. https://health.aws.amazon.com/health/status Time Server Hack China reports a compromise of its time standard servers. https://thehackernews.com/2025/10/mss-claims-nsa-used-42-cyber-tools-in.html
In this episode, Anna Rose and Tarun Chitra chat with Huijia (Rachel) Lin from the University of Washington to explore indistinguishability obfuscation (iO), often described as the 'holy grail of cryptography'. iO is a powerful primitive that, if fully realised, could have profound implications for privacy tech as a whole. Rachel helps break down the concept for listeners who may already be familiar with ZK, FHE and TEEs, clarifying how iO differs but also some of the similarities in the assumptions upon which it is based. Rachel also explains how it differs from similar concepts: garbled circuits and functional encryption. The discussion covers the evolution of iO research in her work over the last decade, how the cryptographic assumptions have hardened since that time, and what iO can offer in terms of precise, controlled information revelation. Related links: Indistinguishability obfuscation from well-founded assumptions Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings On Lattices, Learning with Errors, Random Linear Codes, and Cryptography How to Use Indistinguishability Obfuscation: Deniable Encryption, and More Functional Encryption for Quadratic Functions, and Applications to Predicate Encryption Garbled circuit ZK Whiteboard Season 3 just kicked off with our first Module all about Hash Functions! In this, we have host Nico and guest JP Aumauson walk us through how to build a Hash Function. JP was also previously on the show to discuss the topic, you can see his episode here! See all Whiteboard Sessions including previous seasons here. **If you like what we do:** * Find all our links here! @ZeroKnowledge | Linktree * Subscribe to our podcast
In this episode of What The Luxe, we sit down with Winston Chesterfield—founder of Barton and one of the most incisive minds in wealth intelligence and luxury brand consultancy. Together, we unpack the nuanced behaviours of high-net-worth individuals, and why understanding their motivations requires far more than just access. Winston argues for the enduring power of heritage and storytelling in luxury, cautions against AI-induced homogeneity, and challenges the notion that transparency is always a virtue. From the ‘engineered mystique' of luxury to the ethical paradoxes of indulgence, this conversation offers rare insight into the psychology of value—and how the world's most discerning audiences navigate it. Expect candid takes on category clichés, intelligent provocations around brand behaviour, and a potent reminder that luxury isn't about price—it's about perception.
AI has generated more hype and obfuscation than all the words from ChatGPT. OK, maybe I exaggerate, but the amount of scare talk is endless. I try to take a more rational and down-to-earth look at the issue from the point-of-view of manufacturers. I argue that AI now and in the future should be viewed as a tool that will help humans work better and more productively. I use an example from an interview with Mike Payne, co-owner and president, of Hill Manufacturing--a production machine shop operation in Tulsa, Oklahoma. Mike was introduced to me by Hexagon. This podcast is sponsored by the Ignition Community Conference by Inductive Automation.
Fr Toby continues to help us think more clearly about the arguments surrounding some of our hot-button issuesTHE FRIARSIDE airs live on Radio Maria on Mondays and Tuesdays and Wednesdays at 11:15am and is rebroadcast at 11:15pm on the same days. Our Priest Director Fr Toby reads through a spiritual book, pausing and providing commentary as he goes.If you enjoyed this programme, please consider supporting us with a one-off or monthly donation. Visit RadioMariaEngland.uk/donations/ to find out more. It is only through the generosity of our listeners that we are able to be a Christian voice by your side.
In this week's episode we will discuss the concepts of elected leadership's role in accountability. Do the citizens have a role in accountability? You bet they do. Citizen and Government are two sides of the accountability coin in our Republic. We will also discuss the Tennessee government's obfuscation of facts and data related to the recently passed voucher scheme, along with my personal address to Governor Lee and members of the General Assembly. Shout out to my good friends and their family on some recent milestones. Get your tickets for the annual Freedom Fest hosted by Tennessee Constitutional Grassroots Coalition this coming October 4th. Don't forget to subscribe to the blog at https://libertyleadershipandlies.comYou can subscribe to or follow the podcast on Apple or Spotify, or on your favorite podcast platform – Rumble | YouTube | Overcast | Amazon Music | iHeartRadio | Pocket Casts | RadioPublicJoin me on social media:Twitter – both at @LarryForTN12 @LiesLibertyTruth Social – @LarryForTN12Instagram – @larry_conservative_activist @the_l5_podcastFacebook – Larry Linton - Sevier County Conservative Activist Facebook – Liberty, Leadership and LiesGab – @LarryLintonGETTR – @LarryLintonTelegram – t.me/libertyleadershipandliesOr on the web at – https://libertyleadershipandlies.com#LarryForTN12 #LintonForTN12 #LarryLintonForTN12 #LibertyLeadershipAndLies #Liberty #Leadership #Lies #Constitutionalist #Conservative #Tennessee #StandInTheArena #Accountability #GovernorBillLee #TennesseeGeneralAssembly
The Task Force on the Declassification of Federal Secrets held its second hearing on May 20th on “The JFK Files: Assessing Over 60 Years of the Federal Government's Obstruction, Obfuscation, and Deception.” At the hearing, members examined newly declassified files released by the Trump Administration, heard expert witness testimony on the tragic assassination of President John F. Kennedy, and examined the federal government's lack of transparency surrounding the release of classified information to the American public.
no one knows how the blazers will play the summer… by design?
The Task Force on the Declassification of Federal Secrets held its second hearing yesterday on “The JFK Files: Assessing Over 60 Years of the Federal Government's Obstruction, Obfuscation, and Deception.” At the hearing, members examined newly declassified files released by the Trump Administration, heard expert witness testimony on the tragic assassination of President John F. Kennedy, and examined the federal government's lack of transparency surrounding the release of classified information to the American public.
Understanding Microsoft Nonprofit Licensing Changes: Survival Guide and Solutions In this episode, Joshua Pesky, the Chief Product Officer at RoundTable, discusses with George the partial termination of Microsoft's grants program around Office 365 licenses. The discussion covers the impact on nonprofits, the timeline for changes, and possible solutions for affected organizations. Joshua explains the importance of checking license statuses through the admin portal and suggests alternatives like using web applications, Google Suites, or open-source software to mitigate costs. The episode also delves into the broader implications of tech expenses in the nonprofit sector and offers practical advice for managing these upcoming changes. 00:00 Introduction and Overview 00:02 Microsoft's Licensing Changes Explained 01:19 Impact on Organizations 02:37 Timeline and Deadlines 03:09 Options and Solutions 05:37 Navigating the Admin Portal 09:03 Financial Implications 09:50 Nonprofit Sector Challenges 11:17 Security and Obfuscation 12:10 Practical Advice and Final Thoughts 17:18 Survival Guide and Final Remarks
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Static Analysis of GUID Encoded Shellcode Didier explains how to decode shell code embeded as GUIDs in malware, and how to feed the result to his tool 1768.py which will extract Cobal Strike configuration information from the code. https://isc.sans.edu/diary/Static%20Analysis%20of%20GUID%20Encoded%20Shellcode/31774 SAMLStorm: Critical Authentication Bypass in xml-crypto and Node.js libraries xml-crypto, a library use in Node.js applications to decode XML and support SAML, has found to parse comments incorrectly leading to several SAML vulnerabilities. https://workos.com/blog/samlstorm One PUT Request to Own Tomcat: CVE-2025-24813 RCE is in the Wild A just made public deserialization vulnerablity in Tomcat is already being exploited. Contributing to the rapid exploit release is the similarity of this vulnerability to other Java deserializtion vulnerabilities. https://lab.wallarm.com/one-put-request-to-own-tomcat-cve-2025-24813-rce-is-in-the-wild/ CVE-2025-24813 CSS Abuse for Evasion and Tracking Attackers are using cascading stylesheets to evade detection and enable more stealthy tracking of users https://blog.talosintelligence.com/css-abuse-for-evasion-and-tracking/
An update with Data analyst Albert Benevides to look further into how Medsafe obfuscates certain data in their reports when compared to the American VAERS.We welcome all public feedback and comments in order to dig deeper into what Medsafe are doing. We thank all who've been in touch so far. Please keep sharing the series that we did on the NZ covid vaccine data, linked below.Links:- The Purposeful Hiding of Covid-19 Vaccine Deaths In NZ | PART ONE: https://rumble.com/v6kyovv-the-purposeful-hiding-of-covid-19-vaccine-deaths-in-new-zealand-part-one.html?e9s=src_v1_ucp- PART TWO: https://rumble.com/v6l1phg-the-purposeful-hiding-of-covid-19-vaccine-deaths-in-new-zealand-part-two.html?e9s=src_v1_ucp- PART THREE: https://rumble.com/v6laeo1-the-purposeful-hiding-of-covid-19-vaccine-deaths-in-new-zealand-part-three.html?e9s=src_v1_ucp- PART FOUR: https://rumble.com/v6lb2a1-the-purposeful-hiding-of-covid-19-vaccine-deaths-in-new-zealand-part-four.html?e9s=src_v1_ucp- VAERS Aware - https://www.vaersaware.com/new-zealand- Welcome The Eagle on Public Tableau - https://public.tableau.com/app/search/vizzes/welcome%20the%20eagle- Welcome The Eagle Substack - https://welcometheeagle.substack.com/- Closed VAERS profile - https://substack.com/@welcometheeagle- Welcome the Eagle on Rumble - https://rumble.com/user/welcometheeagle--------Subscribe to FreeNZ:- Substack - https://freenz.substack.com- Donorbox - www.donorbox.org/support-freenz-media- Locals - https://freenz.locals.com- Buy Me A Coffee - https://buymeacoffee.com/supportfreenz
The crypto sector has entered an era of hyperfinancialization, and with this comes predatory MEV and manipulation of blockchain activities that were originally intended to be consensus-based and decentralized. Shutter Network core contributor Loring Harkness explains why encryption and credible neutrality can make blockchain transactions fair again.(00:00) Introduction to The Agenda podcast and this week's episode(01:47) Why credible neutrality and fairness matter(11:26) Blockchain is as easy as rock, paper, scissors(17:47) Everyday use cases for encrypted blockchain transactions(20:48) Why non-finance-focused blockchains still issue tokens(23:25) Blockchain, crypto and Myanmar(29:16) Will crypto remain censorship-resistant in an age of hyperfinacialization?(35:29) Would Shutter work on MMOGs like Pokemon?The Agenda is brought to you by Cointelegraph and hosted/produced by Ray Salmond and Jonathan DeYoung, with post-production by Elena Volkova (Hatch Up). Follow Cointelegraph on X (Twitter) at @Cointelegraph, Jonathan at @maddopemadic and Ray at @HorusHughes. Jonathan is also on Instagram at @maddopemadic, and he made the music for the podcast — hear more at madic.art.Follow Loring Harkness at @LoringHarkness.Check out Cointelegraph at cointelegraph.com.If you like what you heard, rate us and leave a review!The views, thoughts and opinions expressed in this podcast are its participants' alone and do not necessarily reflect or represent the views and opinions of Cointelegraph. This podcast (and any related content) is for entertainment purposes only and does not constitute financial advice, nor should it be taken as such. Everyone must do their own research and make their own decisions. The podcast's participants may or may not own any of the assets mentioned.
SPONSORS: - Z-BIOTICS: https://zbiotics.com/JULIAN (***TIMESTAMPS in description below) ~ James Fox returns for the third time on Julian Dorey Podcast to discuss his latest Documentary, "The Program" which goes behind the Congressional hearings to leave skeptics astounded by new assertions from a growing chorus of high-level insiders who insist there is definitive proof we are not alone. Jason Sands is a new UFO whistleblower, who has recently come forward with claims about his involvement in a 20-year black budget program and a surreal Alien encounter. BUY/RENT “The Program": https://geni.us/TheProgram PATREON https://www.patreon.com/JulianDorey FOLLOW JULIAN DOREY INSTAGRAM (Podcast): https://www.instagram.com/juliandoreypodcast/ INSTAGRAM (Personal): https://www.instagram.com/julianddorey/ X: https://twitter.com/julianddorey GUEST LINKS X: https://x.com/jamescfox IG: https://www.instagram.com/jamesfoxdirector/?hl=en Watch "Momen of Contact": https://shorturl.at/tSgOQ Watch "The Phenomenon": https://shorturl.at/9RWvG LISTEN to Julian Dorey Podcast Spotify ▶ https://open.spotify.com/show/5skaSpDzq94Kh16so3c0uz Apple ▶ https://podcasts.apple.com/us/podcast/trendifier-with-julian-dorey/id1531416289 ****TIMESTAMPS**** 00:00 - James Fox from The Phenomenon to ‘The Program', D.C. Investigation 10:01 - James Disastrous Film Company Lawsuit, 26:54 - Most Satisfying UFO Documentary (Devastating Setbacks) 31:21 - Pivotal UFO Interview Moments, Disclosure vs UFO Evidence 38:51 - Reads Congressional Source Document, Photographs & Evidence 46:31 - Intel Agency Individuals & Obfuscation, Evidence Behind Jason Sand's Encounter 52:03 - Telepathic Communication Residue, Devil's Advocate & Possibly Being Lied Too 01:00:30 - Why Does Jason Sand's Have Immunity vs Coworkers, Top Secret Information SCIF (James Fox) 01:10:45 - Special Access Programs & How Information is Controlled & Not Leaked, Black Budget Programs 01:21:21 - Hearing Craziest Stories During Black Budget Program CREDITS: - Host, Producer, and Editor: Julian Dorey - In-Studio Producer: Alessi Allaman - https://www.youtube.com/@UCyLKzv5fKxGmVQg3cMJJzyQ Julian Dorey Podcast Episode 266 - James Fox & Jason Sands Music by Artlist.io Learn more about your ad choices. Visit megaphone.fm/adchoices
PODCASTER ROBERT KNAUER EXPLAINS WHY DONALD TRUMP SAYS SO MANY INANE THINGS AND WHY IT IS OBFUSCATION. HE TELLS YOU THE STRAIGHT TRUTH ABOUT WHAT HE AND THE GOP PLAN TO DO WITH PROJECT 2025 INITIATIVES AND HOW SIMILAR IT IS TO WHAT NAZI GERMANY DID IN WWII TO THE JEWS. IT IS ALL ABOUT GETTING RICH AND RICHER. THE ONLY ONES THAT WILL BE BETTER OF ARE THE WEALTHIEST OF AMERICANS.
This week, Pastor Nathan Wakefield continues the Letters to the Church series with Romans 1:18‑23. This passage shows us that true worship is a choice that honors God, recognizing Him as the ultimate source of value and truth, rather than turning to false idols that lead us astray.Sermon notes are available on YouVersion Events.Video of the worship service is available for replay.
Video Episode: https://youtu.be/igJqDBKj13o In today’s episode, we discuss a new cybercriminal campaign utilizing Unicode obfuscation to hide the Mongolian Skimmer on e-commerce platforms, aiming to steal sensitive data. OpenAI has reported disrupting over 20 malicious operations leveraging its technology for tasks including malware development and election-related misinformation. Additionally, we cover critical vulnerabilities in Firefox and Fortinet products, emphasizing the need for urgent updates to mitigate risks and ensure cybersecurity. References: 1. https://thehackernews.com/2024/10/cybercriminals-use-unicode-to-hide.html 2. https://thehackernews.com/2024/10/openai-blocks-20-global-malicious.html 3. https://www.helpnetsecurity.com/2024/10/10/cve-2024-9680/ 4. https://thehackernews.com/2024/10/cisa-warns-of-critical-fortinet-flaw-as.html Timestamps 00:00 – Introduction 01:12 – Fortinet Urgent Patch 02:12 – Firefox Zero-Day 03:14 – OpenAI blocks 20 abusive networks 05:04 – Unicode Obfuscation 1. What are today’s top cybersecurity news stories? 2. How is the Mongolian Skimmer using Unicode to hide its malware? 3. What actions has OpenAI taken against malicious operations using its platform? 4. What are the latest updates regarding the Firefox zero-day vulnerability CVE-2024-9680? 5. What critical vulnerabilities are impacting Fortinet and Palo Alto Networks? 6. How can ransomware be concealed with obfuscated scripts? 7. Which cybersecurity threats are currently being reported by CISA? 8. What steps should be taken to secure systems against the new vulnerabilities? 9. How are cyber actors leveraging generative AI for malicious purposes? 10. What recent updates have been made to safeguard web applications from skimmers? Unicode obfuscation, Mongolian Skimmer, malware, e-commerce, OpenAI, malware, misinformation, countermeasures, zero-day, Firefox, Mozilla, vulnerability, CISA, Fortinet, vulnerabilities, cyber threats
EASY LISTENING DEP'T.
Video Episode: https://youtu.be/7et_7YkwAHs In today’s episode, we dive into the alarming rise of malware delivery through fake job applications targeting HR professionals, specifically focusing on the More_eggs backdoor. We also discuss critical gaming performance issues in Windows 11 24H2 and the vulnerabilities in DrayTek routers that expose over 700,000 devices to potential hacking. Lastly, we address the urgent exploitation of a remote code execution flaw in Zimbra email servers, emphasizing the need for immediate updates to safeguard against evolving threats. Links to articles: 1. https://thehackernews.com/2024/10/fake-job-applications-deliver-dangerous.html 2. https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-windows-11-24h2-gaming-performance-issues/ 3. https://thehackernews.com/2024/10/alert-over-700000-draytek-routers.html 4. https://www.bleepingcomputer.com/news/security/critical-zimbra-rce-flaw-exploited-to-backdoor-servers-using-emails/ Timestamps 00:00 – Introduction 01:14 – Zimbra RCE Vulnerability 02:17 – 700k DrayTek Routers Vulnerable 04:36 – Recruiters Targeted with Malware 06:14 – Microsoft blocks updates for gamers 1. What are today’s top cybersecurity news stories? 2. How is More_eggs malware targeting HR professionals? 3. What vulnerabilities exist in DrayTek routers? 4. Why did Microsoft block Windows 11 24H2 upgrades? 5. What is the impact of the Zimbra RCE flaw? 6. How do fake job applications spread malware? 7. What security measures can protect against More_eggs malware? 8. What are the latest gaming issues with Windows 11? 9. How can DrayTek router vulnerabilities be mitigated? 10. What are the latest tactics used by cybercriminals in email attacks? More_eggs, Golden Chickens, spear-phishing, credential theft, Microsoft, Windows 11, Asphalt 8, Intel Alder Lake+, DrayTek, vulnerabilities, exploits, cyber attackers, Zimbra, RCE, vulnerability, exploitation, # Intro HR professionals are under siege as a spear-phishing campaign disguised as fake job applications delivers the lethal More_eggs malware, leading to potentially devastating credential theft. Powered by the notorious Golden Chickens group, this malware-as-a-service targets recruiters with chilling precision. **How are recruitment officers unknowingly downloading malicious files, and what methods are threat actors using to bypass security measures?** “Microsoft is blocking Windows 11 24H2 upgrades on some systems due to critical gaming performance issues like Asphalt 8 crashes and Easy Anti-Cheat blue screens. The company is scrambling to resolve these problems that uniquely impact devices with Intel Alder Lake+ processors.” How can gamers with affected systems work around these issues until Microsoft releases a fix? Over 700,000 DrayTek routers are currently vulnerable to 14 newly discovered security flaws, with some critical exploits that could be used to take full control of the devices and infiltrate enterprise networks. Despite patches being released, many routers remain exposed, creating a lucrative target for cyber attackers. How can these vulnerabilities impact businesses that rely on DrayTek routers for network security? Hackers are leveraging a critical Zimbra RCE vulnerability to backdoor servers through specially crafted emails that execute malicious commands, revealing widespread exploitation just days after a proof-of-concept was published. Notable security experts warn of attackers embedding harmful code in the email’s CC field, which the Zimbra server inadvertently executes. How are attackers camouflaging their malicious emails to slip through security measures unnoticed? # Stories Welcome back to our podcast. Today, we’re talking about a new cyber threat targeting HR professionals. Researchers at Trend Micro have uncovered a spear-phishing campaign where fake job applications deliver a JavaScript backdoor called More_eggs to recruiters. This malware, sold as malware-as-a-service by a group known as Golden Chickens, can steal credentials for online banking, email accounts, and IT admin accounts. What’s unique this time is that attackers are using spear-phishing emails to build trust, as observed in a case targeting a talent search lead in engineering. The attack sequence involves downloading a ZIP file from a deceptive URL, leading to the execution of the More_eggs backdoor. This malware probes the host system, connects to a command-and-control server, and can download additional malicious payloads. Trend Micro’s findings highlight the persistent and evolving nature of these attacks, which are difficult to attribute because multiple threat actors can use the same toolkits. The latest insights also connect these activities to known cybercrime groups like FIN6. Stay vigilant, especially if you work in HR or recruitment. 1. **Spear-Phishing**: – **Definition**: A targeted phishing attack aiming at specific individuals or companies, typically using information about the victim to make fraudulent messages more convincing. – **Importance**: This method is specifically dangerous because it can trick even tech-savvy users by exploiting personalized details, leading to significant security breaches like credential theft. 2. **More_eggs**: – **Definition**: A JavaScript backdoor malware sold as a malware-as-a-service (MaaS) with capabilities to siphon credentials and provide unauthorized access to infected systems. – **Importance**: Due to its ability to latently steal sensitive information and its widespread use by various e-crime groups, More_eggs represents a significant threat to corporate cybersecurity. 3. **Malware-as-a-Service (MaaS)**: – **Definition**: A business model where malicious software is developed and sold to cybercriminals who can then use it to conduct attacks. – **Importance**: This model lowers the barrier of entry for cybercriminals, allowing even those with limited technical skills to launch sophisticated attacks using pre-made malware. 4. **Golden Chickens**: – **Definition**: A cybercriminal group (also known as Venom Spider) attributed with developing and distributing the More_eggs malware. – **Importance**: Understanding threat actors like Golden Chickens can help cybersecurity professionals anticipate and defend against specific threat tactics. 5. **Command-and-Control (C2) Server**: – **Definition**: A server used by threat actors to maintain communications with compromised systems within a target network to execute commands and control malware. – **Importance**: Disrupting C2 servers is crucial because it can cut off the attacker's control over their malware, mitigating the threat. 6. **LNK File**: – **Definition**: A shortcut file in Windows that points to another file or executable. – **Importance**: Misuse of LNK files in phishing campaigns can lead to automated execution of malicious payloads, making them an effective vector for malware distribution. 7. **PowerShell**: – **Definition**: A task automation framework from Microsoft consisting of a command-line shell and scripting language. – **Importance**: PowerShell is often used by attackers to execute and conceal malicious scripts due to its powerful capabilities and integration with Windows. 8. **Tactics, Techniques, and Procedures (TTPs)**: – **Definition**: The behavior patterns or methodologies used by cyber threat actors to achieve their goals. – **Importance**: Identifying TTPs helps security professionals understand, detect, and mitigate specific attack strategies used by threat actors. 9. **Obfuscation**: – **Definition**: The process of deliberately making code or data difficult to understand or interpret. – **Importance**: Obfuscation is commonly used by malware developers to conceal malicious activities and bypass security mechanisms. 10. **Cryptocurrency Miner**: – **Definition**: Software used to perform the computational work required to validate and add transactions to a blockchain ledger in exchange for cryptocurrency rewards. – **Importance**: Unauthorized cryptocurrency mining (cryptojacking) can misuse system resources for financial gain, leading to performance degradation and security vulnerabilities. — On today’s tech update: Microsoft has blocked upgrades to Windows 11 version 24H2 on certain systems due to gaming performance issues. Players of Asphalt 8 may encounter game crashes, while some systems running Easy Anti-Cheat might experience blue screens. These problems mainly affect devices with Intel Alder Lake+ processors. Until Microsoft resolves these issues, impacted users are advised not to manually upgrade using tools like the Media Creation Tool. Microsoft is working on fixes and will include them in upcoming updates. 1. **Windows 11 24H2**: A version of Microsoft’s Windows 11 operating system, released in the second half (H2) of 2024. It is significant because it represents Microsoft’s ongoing update cycle aimed at improving system performance and user experience, though it also highlights the challenges of software compatibility and stability. 2. **Asphalt 8 (Airborne)**: A popular racing video game often used for showcasing graphical and processing capabilities of devices. Its relevance lies in exposing potential software and hardware compatibility issues when new operating systems are released. 3. **Easy Anti-Cheat**: A software tool designed to detect and prevent cheating in multiplayer games. It is crucial for maintaining fair play and integrity in online gaming environments but can pose compatibility challenges with system updates. 4. **Blue Screen of Death (BSoD)**: An error screen displayed on Windows computers following a system crash. It is important as it signals serious software or hardware issues that could affect system stability and data integrity. 5. **Intel Alder Lake+ processors**: A generation of Intel’s microprocessors known for their hybrid architecture design. Understanding these chips is important for recognizing which systems might be more susceptible to the reported compatibility issues. 6. **vPro platform**: A set of Intel technologies aimed at enhancing business security and manageability. It’s critical to cybersecurity professionals because it allows for hardware-level encryption and more robust security management, but compatibility with OS updates can be problematic. 7. **MEMORY_MANAGEMENT error**: A specific type of error indicating system memory management problems, often leading to system crashes. It is crucial for cybersecurity and IT professionals as it affects the stability and reliability of a system. 8. **Compatibility holds (Safeguard IDs)**: Mechanisms employed by Microsoft to prevent system upgrades when known issues are detected. These are essential for protecting users from potential system failures and ensuring a stable computing environment. 9. **Media Creation Tool**: A Microsoft utility used for installing or upgrading Windows OS. It's important for IT professionals as it provides a means to manually deploy Windows updates, though it highlights the risks of bypassing automatic update safeguards. 10. **KB5043145 (Preview Update)**: A specific Windows update known to cause issues such as reboot loops and connection failures. Understanding these updates is crucial for maintaining system stability and ensuring that deployed systems are free from vulnerabilities and bugs. — In a recent cybersecurity alert, over 700,000 DrayTek routers have been identified as vulnerable to hacking due to 14 newly discovered security flaws. These vulnerabilities, found in both residential and enterprise routers, include two rated critical, with one receiving the maximum CVSS score of 10.0. This critical flaw involves a buffer overflow in the Web UI, potentially allowing remote code execution. Another significant vulnerability is OS command injection via communication binaries. The report highlights the widespread exposure of these routers’ web interfaces online, creating a tempting target for attackers, particularly in the U.S. DrayTek has released patches to address these vulnerabilities, urging users to apply updates, disable unnecessary remote access, and utilize security measures like ACLs and two-factor authentication. This development coincides with international cybersecurity agencies offering guidance to secure critical infrastructure, emphasizing the importance of safety, protecting valuable OT data, secure supply chains, and the role of people in cybersecurity. 1. **Vulnerability**: A weakness in a system or software that can be exploited by hackers. – **Importance**: Identifying vulnerabilities is crucial in cyber security because it helps protect systems from attacks. 2. **Router**: A device that routes data from one network to another, directing traffic on the internet. – **Importance**: Routers are essential for internet connectivity and their security is vital to prevent unauthorized access to networks. 3. **Buffer Overflow**: A coding error where a program writes more data to a buffer than it can hold, potentially leading to system crashes or unauthorized code execution. – **Importance**: Buffer overflows are common vulnerabilities that can be exploited to gain control of a system. 4. **Remote Code Execution (RCE)**: A type of vulnerability that allows an attacker to execute code on a remote system without authorization. – **Importance**: RCE vulnerabilities are highly critical as they enable attackers to take over affected systems. 5. **Cross-site Scripting (XSS)**: A web security vulnerability that allows attackers to inject malicious scripts into content from otherwise trusted websites. – **Importance**: XSS can be used to steal information, deface websites, and spread malware. 6. **Adversary-in-the-Middle (AitM) Attack**: An attack where the attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other. – **Importance**: AitM attacks can lead to data theft, man-in-the-middle proxy attacks, and unauthorized access to sensitive information. 7. **Denial-of-Service (DoS)**: An attack intended to shut down a machine or network, making it inaccessible to its intended users. – **Importance**: DoS attacks disrupt the availability of services and can cause significant downtime and financial loss. 8. **Access Control List (ACL)**: A list of permissions attached to an object that specifies which users or system processes can access the object and what operations they can perform. – **Importance**: ACLs are crucial for implementing security policies to control access to resources. 9. **Two-Factor Authentication (2FA)**: A security process in which the user provides two different authentication factors to verify themselves. – **Importance**: 2FA improves security by adding an additional layer of verification, making it harder for attackers to gain unauthorized access. 10. **Operational Technology (OT)**: Hardware and software that detects or causes changes through direct monitoring and control of physical devices, processes, and events in an enterprise. – **Importance**: OT security is critical for the functioning and safety of critical infrastructure systems, such as those in manufacturing, power generation, and transportation. — Today, we’re discussing a critical remote code execution (RCE) vulnerability in Zimbra email servers, tracked as CVE-2024-45519, which hackers are actively exploiting. This flaw allows attackers to trigger malicious commands simply by sending specially crafted emails, which are processed by Zimbra’s post journal service. First flagged by Ivan Kwiatkowski of HarfangLab and confirmed by Proofpoint, the exploit involves spoofed emails with commands hidden in the “CC” field. Once processed, these emails deliver a webshell to the server, giving attackers full access for data theft or further network infiltration. A proof-of-concept exploit was released by Project Discovery on September 27, prompting immediate malicious activity. Administrators are urged to apply security updates released in Zimbra’s latest versions—9.0.0 Patch 41 and later—or disable the vulnerable postjournal service and ensure secure network configurations to mitigate the threat. Stay vigilant and update your Zimbra servers immediately to protect against this critical vulnerability. 1. **Remote Code Execution (RCE)** – **Definition**: A type of security vulnerability that enables attackers to run arbitrary code on a targeted server or computer. – **Importance**: This flaw can be exploited to gain full control over the affected machine, leading to data theft, unauthorized access, and further network penetration. 2. **Zimbra** – **Definition**: An open-source email, calendaring, and collaboration platform. – **Importance**: Popular among organizations for its integrated communication tools, making it a significant target for cyberattacks due to the sensitive data it handles. 3. **SMTP (Simple Mail Transfer Protocol)** – **Definition**: A protocol used to send and route emails across networks. – **Importance**: Integral to email services, its exploitation can deliver malicious content to servers and users, forming a vector for cyber-attacks. 4. **Postjournal Service** – **Definition**: A service within Zimbra used to parse incoming emails over SMTP. – **Importance**: Its vulnerability can be leveraged to execute arbitrary commands, making it a crucial attack point for hackers. 5. **Proof-of-Concept (PoC)** – **Definition**: A demonstration exploit showing that a vulnerability can be successfully taken advantage of. – **Importance**: PoC exploits serve as proof that theoretical vulnerabilities are practical and dangerous, necessitating urgent security responses. 6. **Base64 Encoding** – **Definition**: A method of encoding binary data into an ASCII string format. – **Importance**: Often used to encode commands within emails or other data streams to evade basic security detections. 7. **Webshell** – **Definition**: A type of malicious script that provides attackers with remote access to a compromised server. – **Importance**: Webshells afford attackers sustained control over a server, allowing for ongoing data theft, disruptions, and further exploits. 8. **CVE (Common Vulnerabilities and Exposures)** – **Definition**: A list of publicly known cybersecurity vulnerabilities and exposures, identified by unique CVE IDs. – **Importance**: Helps standardize and track security issues, facilitating communication and management of vulnerabilities across the cybersecurity community. 9. **Patch** – **Definition**: An update to software aimed at fixing security vulnerabilities or bugs. – **Importance**: Patching vulnerabilities is critical for protecting systems from attacks exploiting known security flaws. 10. **Execvp Function** – **Definition**: A function in Unix-like operating systems that executes commands with an argument vector, featuring improved input sanitization. – **Importance**: By replacing vulnerable functions like ‘popen,’ ‘execvp’ helps prevent the execution of malicious code, thus enhancing system security. —
In this episode I talk with Matt Berzinski about the important of understanding that identity is a journey not a destination. Matt is the Senior Director of Product Management for Ping Identity and has extensive knowledge about identity.Talking Points:Realtime Fraud/RiskOrchestrationOrganizations (The importance of offload work that you don't need to do it)Single Sign OnMulti FactorIdentity Verification (Francis talked about a local automotive company referencing mobile apps for a car)Robot or Vehicle Identity is a relationship not a dependency (Matt has a great Rosie the Robot from The Jetsons reference)Why is Obfuscation still important? Episode Charity:Proceeds from this episode's sponsorship will be going towards the Baker-Bonsai Friendship Fund. Bruce Baker was a great bonsai tree artist and along with Deal Bull, helped make the art of bonsai be something wonderful that can be shared for future generations at the Frederik Meijer Gardens.Episode Sponsor:This episode is sponsored by Ping Identity. Ping is an identity solutions provider based out of the great state of Colorado in the awesome town that is Denver.
Theories & Obfuscation In Butler PA https://www.audacy.com/989word The Charlie James Show Listen on Spotify : https://spoti.fi/3MXOvGP Apple Podcasts: https://podcasts.apple.com/us/podcast/the-charlie-james-show-podcast/id1547262821 Follow us on Social Media Join our Live Stream Weekdays - 3pm to 7pm Facebook: https://www.facebook.com/989word Rumble: https://rumble.com/c/c-2031096 X: https://twitter.com/989word Instagram: https://www.instagram.com/989word/ "Red Meat, Greenville." 08/28/24
“Politico Can't Figure This One Out” “Theories & Obfuscation In Butler PA” “Jack Smith's Problematic New Indictment” “They Silence Republicans, Time To Shout”
In this episode of Flywheel, hosts DeFi Dave and Kapital K delve into the innovative world of ERC-6551 and Token Bound Accounts. The discussion features Benny, the author of the ERC-6551 standard, along with Jimmy and Greg from Agent. They explore the intricacies of token-bound accounts, their potential applications, and how they could significantly enhance the utility of NFTs. The guests share insights on the creation of ERC-6551, its use cases, and ongoing developments. The episode emphasizes the transformative potential of token bound accounts and offers a glimpse into upcoming features and projects utilizing this new standard. Timeline 00:00 Introduction to Flywheel 00:38 Exploring Token Bound Accounts 02:10 Guest Introduction: Benny and the ERC 6551 Standard 05:02 The Evolution and Future of NFTs 10:27 Introducing Agent: A New Marketplace 29:26 Understanding LP Tokens and Obfuscation 29:58 Transparency and Trustlessness in Blockchain 30:45 Exploring ERC 6551 and XNFTs 32:20 Version 4 and Cross-Chain Transactions 35:10 Innovative Use Cases for TBAs 37:05 Privacy and Security in TBAs 40:23 Future of TBAs and Community Involvement 43:46 Agent Roadmap and Marketplace 46:58 Potential of TBAs in DeFi 50:37 Post-Game Show: Reflecting on TBAs~~~~ Subscribe to the Flywheel mailing list: https://flywheeldefi.com~~~~Follow FlywheelTwitter: https://twitter.com/FlywheelDeFiTelegram: https://t.me/FlywheelDeFiYouTube: @flywheeldefiSpotify: https://open.spotify.com/show/34xXNO2...Apple Podcasts: https://podcasts.apple.com/us/podcast...~~~~Connect DeFi Dave: https://twitter.com/defidave22 Kiet: https://twitter.com/0xkapital_k Sam: https://twitter.com/traders_insight Lewy: https://x.com/lewquidity ~~~~ Not financial or tax advice. This channel is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. This video is not tax advice. Talk to your accountant. Do your own research.
Labour's Foreign Affairs spokesperson says critical comments from Winston Peters are distracting from real issues. Peters criticised former Australian Foreign Minister Bob Carr in an interview - over his stance on the AUKUS pact. Carr's called those comments defamatory. Labour's David Parker says the comments are being used to obfuscate the Government shift on AUKUS. "Saying 'well, we should look at it' to saying, just a couple of weeks ago, there are powerful reasons for New Zealand to engage practically with AUKUS." LISTEN ABOVESee omnystudio.com/listener for privacy information.
In this landmark 360th episode of Data Driven, we take a full-circle journey back through the past seven seasons, exploring the highs, lows, and everything in-between. Frank and Andy, in their signature style, veer off the beaten path, offering listeners not just a trip down memory lane, but an off-road adventure filled with insights, laughter, and a few unexpected detours. Join us as we reflect on where we've been and, more importantly, where we're headed next in the ever-evolving landscape of data and technology. It's an episode you won't want to miss, complete with the wisdom and whimsy that only Frank and Andy can provide.Moments00:00 Simpsons celebrates 360 episodes, announces new shows.06:48 Struggling with impostor syndrome, sibling dynamics, and survival.14:37 Experiments with AI feedback, brief show intros.20:19 Challenging start, surprised by success in audio.25:17 Uneven distribution; learned from former Microsoft colleague.29:47 Struggle with communication, engineer writes terse responses.35:47 Detective describes transit system in detail.38:25 Relieved when Amazon took over sci-fi series.43:28 Discussing latest blog post on OpenAI's capabilities.52:15 Obfuscation and difficulty in accessing information persist.56:41 Equal time for Democrats and Republicans in media.01:02:36 December is a mad time due to birthdays.01:05:06 Originally planned as a video podcast, logistics issues.01:09:44 360-degree journey concludes with data-driven discussions.
In this episode, we discuss leading professional development to support ongoing changes in teachers' thinking. Things that bring us joy this week: Everyone on this Train is a Suspect (https://www.harpercollins.com/products/everyone-on-this-train-is-a-suspect-benjamin-stevenson?variant=41281421475874) Articles of Interest (https://99percentinvisible.org/aoi/) Intro/Outro Music: Notice of Eviction by Legally Blind (https://freemusicarchive.org/music/Legally_Blind)
In the one hundred and forty sixth episode we explore the Obfuscation Fallacy, starting with Trump badly clarifying his support for Putin, Trump's Doctors pretending he wasn't given supplemental oxygen when being treated for COVID, and Kevin McCarthy denying something nobody accused him of.In Mark's British Politics Corner we look at Boris being suitably vague about his plans to run for leader and his missing WhatsApp messages, Mark Harper and Graham Stuart being unclear repeatedly about whether Lee Anderson and Frank Hester said racist things.In the Fallacy in the Wild section, we check out examples from That Mitchell & Webb Look, Star Trek IV: The Voyage Home, and Shrek the Third.Jim and Mark go head to head in Fake News, the game in which Mark has to guess which one of three Trump quotes Jim made up.Then we talk about what's going on with Trump's various court cases.And finally, we round up some of the other crazy Trump stories from the past week.The full show notes for this episode can be found at https://fallacioustrump.com/ft146 You can contact the guys at pod@fallacioustrump.com, on Twitter @FallaciousTrump, or facebook at facebook.com/groups/fallacioustrumpSupport this podcast at — https://redcircle.com/fallacious-trump/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Decades of UAP sightings, government reports hinting at unexplained phenomena, and the specter of hidden power struggles over the most groundbreaking potential discoveries in human history... could it be that the truth about UFOs lies not only in the skies but within the very corridors of the institutions tasked with investigating them? Is it possible that factions within the Department of Defense are waging a silent war to control the UAP narrative, shaping what we know and burying what we don't?LIVE ON Digital Radio! http://bit.ly/3m2Wxom or http://bit.ly/40KBtlWhttp://www.troubledminds.org Support The Show!https://www.spreaker.com/podcast/troubled-minds-radio--4953916/supporthttps://rokfin.com/creator/troubledmindshttps://patreon.com/troubledmindshttps://www.buymeacoffee.com/troubledmindshttps://troubledfans.comFriends of Troubled Minds! - https://troubledminds.org/friendsShow Schedule Sun-Mon-Tues-Wed-Thurs 7-10pstiTunes - https://apple.co/2zZ4hx6Spotify - https://spoti.fi/2UgyzqMTuneIn - https://bit.ly/2FZOErSTwitter - https://bit.ly/2CYB71U----------------------------------------https://troubledminds.org/the-historic-ufo-hoax-project-maximum-obfuscation/https://media.defense.gov/2024/Mar/08/2003409233/-1/-1/0/DOPSR-CLEARED-508-COMPLIANT-HRRV1-08-MAR-2024-FINAL.PDFhttps://www.politico.com/news/2024/03/08/us-alien-spacecraft-program-pentagon-report-00146013https://www.cnn.com/2024/03/08/politics/us-military-developing-ufo-detection-kits/index.html
Embarking on a new chapter in my cybersecurity journey, I can't wait to share the depth of insights that come with stepping into the consulting realm. The world of cybersecurity is ever-evolving, and I'm here to navigate this complex landscape with you, offering the expertise you need to protect your data in today's digital battleground. From deciphering the states of data to unveiling the encryption methods that keep your information safe, this episode is a goldmine for anyone serious about mastering cybersecurity, whether for the CISSP exam or the harsh realities of the industry.Have you ever considered how data encryption and loss prevention go hand-in-hand? We dissect the nuances of data in transit, weighing the benefits of end-to-end encryption against the relative vulnerabilities within internal networks. Furthermore, exploring the Tor network opens up a discussion about the trade-offs between user anonymity and the potential for identity exposure. Tackling these complex issues, we also touch on the intricacies of managing digital rights and information access, with real-world examples that bring these concepts to life for our listeners.Wrapping up, we pull back the curtain on the shadowy realm of code obfuscation, a technique that keeps the prying eyes of attackers at bay, yet can be a double-edged sword in malware defense. I share my thoughts on the careful balance required to implement obfuscation effectively, without falling into a labyrinth of confusion that could stifle your team's productivity. Join us for this deep dive into the world of cybersecurity, where practical knowledge meets real-world applications, all aimed at fortifying your defenses in the digital age.Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
Dueling Presidential border visits, an Illegal Alien Horror in Georgia, and Biden Calls the Kettle Black. There are some in your face "did they really just say that" moments this week.
Inner Moonlight is the monthly poetry reading series for the Wild Detectives in Dallas. The in-person show is the second Wednesday of every month in the Wild Detectives backyard. We love our podcast fans, so we release recordings of the live performances every month for y'all! On 1/10/24, we featured poet and artist Lisa Huffaker! Lisa Huffaker integrates poetry, collage, book arts, and assemblage in many hybrid forms, from sculptural vending machines to a book of visual poetry created from a misogynist “self improvement” manual. Her writing is published or forthcoming in The Georgia Review, Gulf Coast, Pleiades, Cincinnati Review, Diagram, Sixth Finch, Thrush, 32 Poems, and many other journals. Her visual poetry manuscript in progress was exhibited internationally as part of TU Delft and Cornell Tech's 3rd Workshop on Obfuscation. She is Teaching Artist in Residence for the Writer's Garret, and a fine arts instructor at Oil and Cotton Creative Exchange. Find her online at lisahuffaker.com. Note: Huffaker reads some of her visual poems during this episode. To see examples of her visual poems, visit her portfolio on her website! Presented by The Writer's Garret https://writersgarret.org/ www.logencure.com/innermoonlight
Season Premiere! Join us as we begin discussing Peter Kreeft's wonderfully written A Refutation of Moral Relativism: Interviews with an Absolutist. In this episode, we talk about the structure of the book and Kreeft's use of the dialogue format, the importance of truth in a society, whether our current society is truly relativist or just another flavor of absolutist, and how we got to where we are. We also talk about the issues with the spread of American culture and how America is perceived by the rest of the world, and the dangerous ideology of obfuscation that is permeating the Left's attitude towards language, gender, and much else!Follow us on Twitter! https://twitter.com/UlmtdOpinions
The troupe prepared to do battle with the approaching caravan, when New Rogue recognized them as the Vistani, the travelling performers they had met in Happy Town. But just as they were greeting each other, the Doctor Deputy—thinking that Adam was speaking to him in code—attacked. Del managed to think quickly and stop the squire momentarily, but when he kept attacking, Adam shoved him into his bag of holding. Back at the were-camp, Tyler found a clever way to set up an invisible fishing hole in the sky where they could fish for ground worms, but will that even matter if the Vistani's fears aren't allayed by Jack Magnum's tricks? Featuring players Tyler Hewitt, Del Borovic, Guy Bradford, and Adam McNamara, and Dungeon Master Ryan LaPlante. Jesters of Ravenloft streams live every Wednesday at 8:30pm ET on Twitch (https://www.twitch.tv/dumbdumbdice) Enjoying Jesters of Ravenloft? - Consider becoming a Patron of Dumb-Dumbs & Dice for as little as $1 a month and gain access to a ton of extra BTS fun (https://www.patreon.com/dumbdumbdice) - Buy merch on our website (https://dumbdumbdice.com/) - Watch us on YouTube (https://youtube.com/@dumbdumbdice) - Follow us on Instagram (https://instagram.com/dumbdumbdice) - Follow us on Facebook (https://facebook.com/dumbdumbdice) Can't remember a discount code you wanted to use from one of our ads? Find it at https://fableandfolly.com/partners/ Artwork by the brilliant Del Borovic - Website & Portfolio (https://delborovic.com/) - Twitter (https://twitter.com/deltastic) Theme song by Sound Gallery by Dmitry Taras - YouTube (https://www.youtube.com/@soundgallerybydmitrytaras) - Pixabay (https://pixabay.com/music/fantasy-dreamy-childrens-dark-mysterious-halloween-night-scary-creepy-spooky-horror-music-116551/) Learn more about your ad choices. Visit megaphone.fm/adchoices
Propaganda, delusional optimism and Fed policy is not the reality when it comes to market fundamentals. Yet, that's what's driving our economy and this concept of a “goldilocks situation”. It's nothing more than an attempt to lead us astray and destroy our wealth. No matter what anyone tries to convince you, we're not fine, we're not headed for a soft landing. We're definitely headed for a major financial disruption, and we won't escape 2024 without it. Many investors are rushing back into stocks, and it's entirely by design. It's a tactic to uphold the illusion of economic recovery. America has an addiction to cheap, big money. We constantly back ourselves into bad financial decisions and print money to get out of them. This always has repercussions and we can't put them off any longer. The way to win right now? Dig deeper than the mainstream, and seek the truth beyond the lies that are being sold to us. In this 100th episode special of Crashes & Taxes, we give you an overview of where things are, and why it's mission critical to go against the consensus right now.
Silicon Valley's "effective altruism" and "effective accelerationism" only give a thin philosophical veneer to the industry's same old impulses. Originally published on November 25, 2023.
This morning Sam shared with us about God in the Void. What does that mean? Listen and find out. This is the audio podcast.
Today is part two in a series on the serial murder of seniors in the North Dallas area by Billy Chemirmir. We are joined today by Daniel Probst, the nephew of the first known victim, Dr. Cathryn Sinclair, who was smothered to death in April 2016. Probst explains how he filed a homicide and robbery complaint immediately, yet there was never an effort to pursue the case by an understaffed police department, the medical examiner, or the senior living facility management. This episode is a reminder of the importance of exposing egregious trends and injustices in our society because public sunlight is the only way to redress our grievances. Probst warns us that we need to treat the lives of seniors the way we would children. I also give a brief update on the emerging details of the Freedom Caucus plan in the budget fight and how we need a shutdown battle to bring light to the forgotten man and forgotten issues. Learn more about your ad choices. Visit megaphone.fm/adchoices
Alert Vixen Mimi finds Vintage Vixen jeans for sale. Our legal department is on the case, filing copyright infringement charges. We're coming for you, Bann's Boutique.RIP Robbie Robertson, Canadian singer-songwriter extrordinaire with The Band. Music from Big Pink was a landmark album. Listen to The Weight from their documentary The Last Waltz. It doesn't get any better than this.Several listeners claim to have seen aliens, know aliens or perhaps be aliens. Dave suggests trees may be aliens and then learns somebody else already thought the same thing.Dave rents About My Father, unfortunately a very unfunny movie. Watch the trailer, it's better than the movie.Del and Dave see Oppenheimer and both love it. Spectacular performances, so many shades of gray. Go see it!Del leads Dave to believe he rides his bike naked. Not a visual you want to remember.Dave offers a Public Service Announcement on the dangers of leaping before you look. Looking ahead, our Tahoe writers, Bridey Thelen-Heidel [episode 118] and Bruce Rettig [episode 125] will be back soon to tell us what's happening in their worlds.Frank Young [episiode 135] will also be back later this month to share some of his experiences from his career in USAID.BONUS TIP: The Perseid meteor shower peaks this weekend.Give us your thoughts: BUCKSTWOOLD@GMAIL.COM Find us on Twitter: @twooldbucks1Leave a Voice message - click HERE
On Security Now, Steve Gibson and Leo Laporte talk about a LinkedIn posting by Amit Yoran, CEO of Tenable, who took Microsoft to the mat about its security. For the full episode go to: https://twit.tv/sn/934 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
On Security Now, Steve Gibson and Leo Laporte talk about a LinkedIn posting by Amit Yoran, CEO of Tenable, who took Microsoft to the mat about its security. For the full episode go to: https://twit.tv/sn/934 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
In Matthew 5-17-20, the Lord Jesus teaches us to hold to the plenary, verbal inspiration of Scripture, even down to the Hebrew letters themselves.--Jewish people would never refer to the Hebrew Bible as the Old Testament. They call it the Tanakh from its three major divisions- the Torah -T-r-, --------, the Nevi'im -N-v---m, ----------, and the Ketuvim -Ktuvim, ------------, as in Luke 24-44. But sometimes as simply, the Law and the Prophets, as Jesus does here in Matthew 5-17.--Even when we dislike something in the Bible, we are bound to hold to it and teach it.--Beware of those who evade speaking the truth. Obfuscation means bringing darkness rather than light. I must preach the Bible, and I must preach it clearly.--God has two books- the Bible and nature. The book of nature, or Natural Law, reveals that all people everywhere, at some level, know the true God -Romans 1-18-21-, and they also know the essence of the Ten Commandments -Romans 2-14-15-.--John the Baptist was depressed and stricken with doubt -Matthew 11-3-. So he sent his disciples to Jesus who demonstrated that he was the fulfillment of Old Testament prophecy -Matthew 11-5- Isaiah 61-1-3- 53-7- Psalm 110-1-3-.--Jesus then informs his disciples that John the Baptist is the fulfillment of Malachi 3-1 and Malachi 4-5.--This is not teaching reincarnation. --When the New Testament interprets the Old Testament, we have an infallible guide of interpretation.
In Matthew 5-17-20, the Lord Jesus teaches us to hold to the plenary, verbal inspiration of Scripture, even down to the Hebrew letters themselves.--Jewish people would never refer to the Hebrew Bible as the Old Testament. They call it the Tanakh from its three major divisions- the Torah -T-r-, --------, the Nevi'im -N-v---m, ----------, and the Ketuvim -Ktuvim, ------------, as in Luke 24-44. But sometimes as simply, the Law and the Prophets, as Jesus does here in Matthew 5-17.--Even when we dislike something in the Bible, we are bound to hold to it and teach it.--Beware of those who evade speaking the truth. Obfuscation means bringing darkness rather than light. I must preach the Bible, and I must preach it clearly.--God has two books- the Bible and nature. The book of nature, or Natural Law, reveals that all people everywhere, at some level, know the true God -Romans 1-18-21-, and they also know the essence of the Ten Commandments -Romans 2-14-15-.--John the Baptist was depressed and stricken with doubt -Matthew 11-3-. So he sent his disciples to Jesus who demonstrated that he was the fulfillment of Old Testament prophecy -Matthew 11-5- Isaiah 61-1-3- 53-7- Psalm 110-1-3-.--Jesus then informs his disciples that John the Baptist is the fulfillment of Malachi 3-1 and Malachi 4-5.--This is not teaching reincarnation. --When the New Testament interprets the Old Testament, we have an infallible guide of interpretation.
Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: 3 levels of threat obfuscation, published by HoldenKarnofsky on August 2, 2023 on The AI Alignment Forum. One of the biggest reasons alignment might be hard is what I'll call threat obfuscation: various dynamics that might make it hard to measure/notice cases where an AI system has problematic misalignment (even when the AI system is in a controlled environment and one is looking for signs of misalignment). I write more about this general fear in AI Safety Seems Hard to Measure. I think it's very important to understand threat obfuscation dynamics; to try to design ways of assessing danger that are designed with threat obfuscation dynamics in mind; and to avoid interpreting reassuring-seeming evidence too optimistically, by keeping in mind the various threat obfuscation dynamics that could affect it. I've seen three noticeably different threat obfuscation dynamics discussed, in ways that often leave me confused about exactly what dynamic someone is talking about, and when. This post aims to clear that up, based on a conversation with Paul Christiano. The three dynamics are: Simple "training game" dynamics: an AI system appears to behave helpfully, rather than attempting deception/manipulation/disempowerment of humans, because (a) it is good at predicting whether such attempts will be caught; (b) it is aiming for good in-episode performance (in terms of loss or reward); (c) such attempts would result in poor in-episode performance if caught. But if an AI system had a chance to do deception/manipulation/disempowerment that would not be detected, and would result in "good performance" within an episode, it would do so (this could include large-scale world takeover). These dynamics are dangerous because we might observe dangerous behavior, train AIs to behave less dangerously, then observe less dangerous behavior, and conclude that we've become more safe (when in fact we've trained the AIs to be more effective at deception). But we can still detect dangerous behavior in cases where it would not result in poor in-episode performance. For example, we might decide that when an AI system in the wild hacks its way to good in-episode performance, and is caught after the fact, we will at that point act as if the performance was actually good/intended (for example, no gradient descent against the behavior). Or we might deliberately conduct tests in which AI systems have opportunities to take over digital environments, obtaining high reward (no catch, not a trap, no attempt to "train out" the behavior when it happens).1 In these cases, situationally aware AI systems might "show their true colors" with fairly straightforward attempts to draw them out. Deceptive alignment: an AI system forms some aim (via inner misalignment) other than good in-episode performance. (This could include something like "an AI system that wants to maximize digital representations of reward across the galaxy, and is willing to get poor in-episode performance as part of a longer-term mission for that to happen.") It then gets good in-episode performance as part of a longer-term scheme to accomplish its other aim. In this case, the above techniques for getting an AI to "show its true colors" might2 fail. However, we could still get an AI to engage in specific behaviors that might be helpful to us and harmful to its goals, by specifically training the AI to behave in these ways. For example, we might want an AI to find security vulnerabilities that we can then patch. Even if doing so would undermine the AI's longer-term aim, we can use gradient descent to put a lot of pressure on it to find security vulnerabilities anyway. (Related: the "no sandbagging on checkable tasks" hypothesis) Gradient hacking: this also requires that an AI system has some aim other than good in-episode performance. Gradient hacking ...
I talk about how to throw up smokescreens, distract and confuse PCs. --- Send in a voice message: https://podcasters.spotify.com/pod/show/radio-grognardks/message Support this podcast: https://podcasters.spotify.com/pod/show/radio-grognardks/support
You just have to "hope" you don't get attacked. CNN Trump town hall fallout. Obfuscation at the border. Rush's immigration plan.Follow Clay & Buck on YouTube: https://www.youtube.com/c/clayandbuckSee omnystudio.com/listener for privacy information.
Why is the FBI targeting churches? Who approved the memos singling out Catholic churches and associating terms like “red pill” and “based” with domestic violent extremism?How did classified intelligence on Ukraine end up spreading online for weeks without being detected?And what does Kash Patel—as the person in charge of the Defense Department's transition from the Trump administration to the Biden administration—make of National Security Council spokesman John Kirby saying recently the Trump administration was not forthcoming when it came to plans for the Afghanistan withdrawal?We discuss all this and more in this week's episode of Kash's Corner.
Why is the FBI targeting churches? Who approved the memos singling out Catholic churches and associating terms like “red pill” and “based” with domestic violent extremism? How did classified intelligence on Ukraine end up spreading online for weeks without being detected? And what does Kash Patel—as the person in charge of the Defense Department's transition from the Trump administration to the Biden administration—make of National Security Council spokesman John Kirby saying recently the Trump administration was not forthcoming when it came to plans for the Afghanistan withdrawal? We discuss all this and more in this week's episode of Kash's Corner. ⭕️ Watch in-depth videos based on Truth & Tradition at Epoch TV
Today, we speak to Vili Lehdonvirta, Professor of Economics, Sociology, and Digital Social Research at the Oxford Internet Institute at the University of Oxford. Professor Lehdonvirta is a social scientist whose research focuses on ways digital technologies are reshaping the organization of economies, including their associated social effects. He is also the author of two books, Cloud Empires and Virtual Economies, which provide readers with an in-depth look into the power that crypto platforms hold and a well-rounded characterization of digital markets. In this episode, we talk about the ideological underpinnings of crypto and the role of governance in making cryptocurrencies possible. We discuss the role of states in scaling markets, how states and platform companies differ, the impacts of smart contracts on governance issues, and how control and power are centralized within crypto markets, as well as the social implications of blockchain technology. Listeners will also learn about past controversies within the crypto space, why people are still needed within crypto, and the blockchain paradox, plus more! Key Points From This Episode: We start by learning about John Perry Barlow's vision for cyberspace. [0:05:06] Find out about the role that states play in markets. [0:07:03] How markets function at scale if the state is not involved. [0:07:55] Professor Lehdonvirta's view on whether governance may precede markets. [0:08:59] The role massive platform companies play in today's economy. [0:09:44] Ways in which states and platform companies differ. [0:10:42] Why he thinks public blockchain technology has garnered so much attention. [0:11:27] An explanation of the influence John Perry Barlow's vision had on cryptocurrencies. [0:13:04] Learn what a Kleroterion is and the role it played in Athenian democracy. [0:14:01] Professor Lehdonvirta shares what it means to ‘trust in the code.' [0:17:05] An outline of the new properties smart contracts created. [0:18:59] Social and economic implications of unstoppable censorship-resistant contracts. [0:21:08] A brief rundown of how impactful smart contracts have been. [0:22:27] How the trustless and unstoppable claims of cryptocurrencies and DAOs were affected by the DAO story. [0:24:20] Whether the Bitcoin block-size conflict affected the perception of crypto as a trustless system. [0:28:17] We find out the current size of the Bitcoin development team. [0:31:05] Other examples of human discretion affecting the direction of Bitcoin. [0:31:46] Professor Lehdonvirta explains the strategies used to preserve trustlessness after the human interventions took place. [0:35:16] Details about an important strategy: the appeal to technical expertise. [0:38:53] Find out if the ability to fork blockchain networks restores trustless claims of crypto. [0:39:42] Whether users of a blockchain network, who are not miners, can influence crypto markets. [0:45:02] Professor Lehdonvirta's opinion on who has the most control over cryptocurrency networks. [0:49:35] Hear what aspect of Athenian democracy Nakamoto failed to replicate. [0:54:26] We learn what the blockchain paradox is (also known as the governance paradox). [0:56:50] Find out if Professor Lehdonvirta thinks technology changes the fundamental aspects which shape how societies are organized. [01:00:11] Find out if blockchain has eliminated the need for nation-states. [01:02:11] What cryptocurrencies have accomplished since their inception. [01:03:40]
Ohio is the epicenter, DHS is the culprit, and corrupt officials are the players. The question to ask is do you have MOU agreements? Texas is a good place to start. It all goes back to Homeland Security. Taxpayer financed fake election structure. They underestimate the people's spirit. How to own private voter software and hardware plus share the data. It all started in 2004. Nothing is dead on the internet. The contracts designed to hand over elections. The three ways they control state systems. Corrupt boards, judges and our diluted rights. Detailed agreements and careful control. Same contract, different states. Now it's called rules of engagement. Crowdstrike, Inc. hired to protect elections in NC. Tell them we do not consent to Federal control. Stop chasing Dominion and look at all machines. This is going to get fixed, and the time to start is now. Learn more about your ad choices. Visit megaphone.fm/adchoices