Tumgik
#data protection techniques
neilsblog · 2 months
Text
Ensuring Data Privacy with Data Masking: Techniques, Benefits, and Best Practices
In today’s data-driven world, organizations collect vast amounts of data to improve their products and services, enhance user experiences, and support business development. However, to maximize the value of this data, it must be shared with multiple teams, both internal and external, for various scenarios such as development, testing, training, and Data Masking. The use of productive data for…
0 notes
techtoio · 4 months
Text
1 note · View note
legalfirmindia · 5 months
Text
Data Protection: Legal Safeguards for Your Business
In today’s digital age, data is the lifeblood of most businesses. Customer information, financial records, and intellectual property – all this valuable data resides within your systems. However, with this digital wealth comes a significant responsibility: protecting it from unauthorized access, misuse, or loss. Data breaches can have devastating consequences, damaging your reputation, incurring…
Tumblr media
View On WordPress
#affordable data protection insurance options for small businesses#AI-powered tools for data breach detection and prevention#Are there any data protection exemptions for specific industries#Are there any government grants available to help businesses with data security compliance?#benefits of outsourcing data security compliance for startups#Can I be fined for non-compliance with data protection regulations#Can I outsource data security compliance tasks for my business#Can I use a cloud-based service for storing customer data securely#CCPA compliance for businesses offering loyalty programs with rewards#CCPA compliance for California businesses#cloud storage solutions with strong data residency guarantees#consumer data consent management for businesses#cost comparison of data encryption solutions for businesses#customer data consent management platform for e-commerce businesses#data anonymization techniques for businesses#data anonymization techniques for customer purchase history data#data breach compliance for businesses#data breach notification requirements for businesses#data encryption solutions for businesses#data protection impact assessment (DPIA) for businesses#data protection insurance for businesses#data residency requirements for businesses#data security best practices for businesses#Do I need a data privacy lawyer for my business#Do I need to train employees on data privacy practices#Does my California business need to comply with CCPA regulations#employee data privacy training for businesses#free data breach compliance checklist for small businesses#GDPR compliance for businesses processing employee data from the EU#GDPR compliance for international businesses
0 notes
michellesanches · 6 months
Text
“Reject All” cookie consent update
On 9 August 2023, the UK Information Commissioner’s Office (ICO) and the UK Competition & Markets Authority (CMA) jointly published a position paper on harmful design practices in digital markets, particularly focusing on cookie consent banners. The paper clarifies the ICO’s stance on the “Reject All” button in these banners. Key points from the paper include: Equal Ease for Consent Choices:…
Tumblr media
View On WordPress
1 note · View note
reasonsforhope · 5 months
Text
"The coral reefs of south Sulawesi are some of the most diverse, colorful and vibrant in the world. At least, they used to be, until they were decimated by dynamite fishing in the 1990s.
As part of a team of coral reef ecologists based in Indonesia and the UK, we study the reefs around Pulau Bontosua, a small Indonesian island in south Sulawesi...
In many places around the world, damage like this might be described as irreparable. But at Pulau Bontosua, the story is different. Here, efforts by the Mars coral restoration program have brought back the coral and important ecosystem functions, as outlined by our new study, published in Current Biology. We found that within just four years, restored reefs grow at the same rate as nearby healthy reefs.
Speedy recovery
The transplanted corals grow remarkably quickly. Within a year, fragments have developed into proper colonies. After two years, they interlock branches with their neighbors. After just four years, they completely overgrow the reef star structures and restoration sites are barely distinguishable from nearby healthy reefs.
The combined growth of many corals generates a complex limestone (calcium carbonate) framework. This provides a habitat for marine life and protects nearby shorelines from storm damage by absorbing up to 97% of coastal wave energy.
We measured the overall growth of the reef framework by calculating its carbonate budget. That's the balance between limestone production (by calcifying corals and coralline algae) and erosion (by grazing sea urchins and fishes, for example). A healthy reef produces up to 20kg of reef structure per square meter per year, while a degraded reef is shrinking rather than growing as erosion exceeds limestone production. Therefore, overall reef growth gives an indication of reef health.
At Pulau Bontosua, our survey data shows that in the years following restoration, coral cover, coral colony sizes, and carbonate production rates tripled. Within four years, restored reefs were growing at the same speed as healthy reefs, and thereby provided the same important ecosystem functions...
Outcomes of any reef restoration project will depend on environmental conditions, natural coral larvae supply, restoration techniques and the effort invested in maintaining the project. This Indonesian project shows that when conditions are right and efforts are well placed, success is possible. Hopefully, this inspires further global efforts to restore functioning coral reefs and to recreate a climate in which they can thrive."
-via Phys.org, March 11, 2024
5K notes · View notes
gurmeetweb · 2 years
Photo
Tumblr media
Securing Your iOS App with Network and Data Protection Techniques As the mobile app market continues to grow, so does the need for developers to ensure their apps are secure. With the emergence of sophisticated hacking techniques, it's essential for app developers to take measures to protect their apps from malicious attacks. iOS is a particularly popular platform for app development due to its secure architecture, but there are still steps mobile app developers can take to further protect their apps from potential threats. In this article, we will discuss some of the techniques developers can use to protect their iOS apps from network and data attacks. The first and most important step to securing an iOS app is to ensure that the app is encrypted. All data that is sent or received by the app should be protected using industry-standard encryption practices. This will help protect any data that is https://digitaltutorialsapp.com/securing-your-ios-app-with-network-and-data-protection-techniques/?utm_source=tumblr&utm_medium=socialtumbdigitutorials&utm_campaign=camptumbdigitutorials
0 notes
dandelionsresilience · 2 months
Text
Good News - July 15-21
Like these weekly compilations? Tip me at $kaybarr1735! (Or check out my new(ly repurposed) Patreon!)
1. Thai tiger numbers swell as prey populations stabilize in western forests
Tumblr media
“The tiger population density in a series of protected areas in western Thailand has more than doubled over the past two decades, according to new survey data. […] The most recent year of surveys, which concluded in November 2023, photographed 94 individual tigers, up from 75 individuals in the previous year, and from fewer than 40 in 2007. […] A total of 291 individual tigers older than 1 year were recorded, as well as 67 cubs younger than 1 year.”
2. Work starts to rewild former cattle farm
Tumblr media
“Ecologists have started work to turn a former livestock farm into a nature reserve [… which] will become a "mosaic of habitats" for insects, birds and mammals. [… R]ewilding farmland could benefit food security locally by encouraging pollinators, improving soil health and soaking up flood water. [… “N]ature restoration doesn't preclude food production. We want to address [food security] by using nature-based solutions."”
3. Harnessing ‘invisible forests in plain view’ to reforest the world
Tumblr media
“[… T]he degraded land contained numerous such stumps with intact root systems capable of regenerating themselves, plus millions of tree seeds hidden in the soil, which farmers could simply encourage to grow and reforest the landscape[….] Today, the technique of letting trees resprout and protecting their growth from livestock and wildlife [… has] massive potential to help tackle biodiversity loss and food insecurity through resilient agroforestry systems. [… The UN’s] reported solution includes investing in land restoration, “nature-positive” food production, and rewilding, which could return between $7 and $30 for every dollar spent.”
4. California bars school districts from outing LGBTQ+ kids to their parents
Tumblr media
“Gov. Gavin Newsom signed the SAFETY Act today – a bill that prohibits the forced outing of transgender and gay students, making California the first state to explicitly prohibit school districts from doing so. […] Matt Adams, a head of department at a West London state school, told PinkNews at the time: “Teachers and schools do not have all the information about every child’s home environment and instead of supporting a pupil to be themselves in school, we could be putting them at risk of harm.””
5. 85% of new electricity built in 2023 came from renewables
Tumblr media
“Electricity supplied by renewables, like hydropower, solar, and wind, has increased gradually over the past few decades — but rapidly in recent years. [… C]lean energy now makes up around 43 percent of global electricity capacity. In terms of generation — the actual power produced by energy sources — renewables were responsible for 30 percent of electricity production last year. […] Along with the rise of renewable sources has come a slowdown in construction of non-renewable power plants as well as a move to decommission more fossil fuel facilities.”
6. Deadly cobra bites to "drastically reduce" as scientists discover new antivenom
Tumblr media
“After successful human trials, the snake venom antidote could be rolled out relatively quickly to become a "cheap, safe and effective drug for treating cobra bites" and saving lives around the globe, say scientists. Scientists have found that a commonly used blood thinner known as heparin can be repurposed as an inexpensive antidote for cobra venom. […] Using CRISPR gene-editing technology […] they successfully repurposed heparin, proving that the common blood thinner can stop the necrosis caused by cobra bites.”
7. FruitFlow: a new citizen science initiative unlocks orchard secrets
Tumblr media
“"FruitWatch" has significantly refined phenological models by integrating extensive citizen-sourced data, which spans a wider geographical area than traditional methods. These enhanced models offer growers precise, location-specific predictions, essential for optimizing agricultural planning and interventions. […] By improving the accuracy of phenological models, farmers can better align their operations with natural biological cycles, enhancing both yield and quality.”
8. July 4th Means Freedom for Humpback Whale Near Valdez, Alaska
Tumblr media
“The NOAA Fisheries Alaska Marine Mammal Stranding Hotline received numerous reports late afternoon on July 3. A young humpback whale was entangled in the middle of the Port of Valdez[….] “The success of this mission was due to the support of the community, as they were the foundation of the effort,” said Moran. [… Members of the community] were able to fill the critical role of acting as first responders to a marine mammal emergency. “Calling in these reports is extremely valuable as it allows us to respond when safe and appropriate, and also helps us gain information on various threats affecting the animals,” said Lyman.”
9. Elephants Receive First of Its Kind Vaccine
Tumblr media
“Elephant endotheliotropic herpesvirus is the leading cause of death for Asian elephants (Elephas maximus) born in facilities in North America and also causes calf deaths in the wild in Asia. A 40-year-old female received the new mRNA vaccine, which is expected to help the animal boost immunity[….]”
10. Conservation partners and Indigenous communities working together to restore forests in Guatemala
Tumblr media
“The K’iche have successfully managed their natural resources for centuries using their traditional governing body and ancestral knowledge. As a result, Totonicapán is home to Guatemala’s largest remaining stand of conifer forest. […] EcoLogic has spearheaded a large-scale forest restoration project at Totonicapán, where 13 greenhouses now hold about 16,000 plants apiece, including native cypresses, pines, firs, and alders. […] The process begins each November when community members gather seeds. These seeds then go into planters that include upcycled coconut fibers and mycorrhizal fungi, which help kickstart fertilization. When the plantings reach about 12 inches, they’re ready for distribution.”
July 8-14 news here | (all credit for images and written material can be found at the source linked; I don’t claim credit for anything but curating.)
417 notes · View notes
tofupixel · 3 months
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
TofuPixel Links + FAQ - Commissions Open!
🌟 Building a game: @wishlings 🌠
My Portfolio
Support me: Commissions | Tip Me | Digital Store | Print Store | Game Assets | Stickers + Merch
Socials: Twitter | Cara | GameJolt | TikTok
Yes you can use / cross-stitch my work for personal use! <3
🎨 Pixel Art Beginner Guide
Hello, I'm Tofu, a pixel artist based in England. I work full-time doing pixel illustrations or game-art. I started learning in my early 20s, so no it's not too late for you!
I run a 7k+ member Discord server called Cafe Dot, where we host events like gesture drawing and portrait club.
I currently have Good Omens brainrot so expect some fanart on this blog. I also occasionally do/reblog horror art so be mindful of that!
Due to so much AI nonsense on every platform, all my public work will be filtered/edited with anti-AI scraping techniques. Supporters on my Ko-Fi can see unfiltered work and also download it.
Want to learn how to do pixel art? Check my tutorial tag!
Other tags:
tutorial (not pixel specific)
my art
follow (artists i recommend)
🌟Free Stuff!!!
❔FAQ
What app do you use? I use Aseprite on PC and occasionally Pixquare on iOS (use code tofu for 30% off Pixquare!! <3) Free alternative: Libresprite on PC
Why does your art look so crunchy / compressed? Glaze
How did you learn pixel art? I first started out watching MortMort and making tiny sprites. Then once I started getting interested in landscapes/environment art, I did many, many Studio Ghibli studies.
How can I also protect my art? You can use Glaze and Nightshade- Glaze protects against Img2Img style copying, and Nightshade poisons the data so the AI thinks it's the opposite of what it actually is. There is a lot of misinformation going around (likely from pro-AI groups) so do your own research too! If you're a pixel artist you can also tilt or blur your art after upscaling, which will make it near useless to AI models (or regular thieves) once downscaled again.
Feel free to send me an ask if there's anything you want to know! I am always happy to help beginners :--3
1K notes · View notes
Text
Libraries have traditionally operated on a basic premise: Once they purchase a book, they can lend it out to patrons as much (or as little) as they like. Library copies often come from publishers, but they can also come from donations, used book sales, or other libraries. However the library obtains the book, once the library legally owns it, it is theirs to lend as they see fit.  Not so for digital books. To make licensed e-books available to patrons, libraries have to pay publishers multiple times over. First, they must subscribe (for a fee) to aggregator platforms such as Overdrive. Aggregators, like streaming services such as HBO’s Max, have total control over adding or removing content from their catalogue. Content can be removed at any time, for any reason, without input from your local library. The decision happens not at the community level but at the corporate one, thousands of miles from the patrons affected.  Then libraries must purchase each individual copy of each individual title that they want to offer as an e-book. These e-book copies are not only priced at a steep markup—up to 300% over consumer retail—but are also time- and loan-limited, meaning the files self-destruct after a certain number of loans. The library then needs to repurchase the same book, at a new price, in order to keep it in stock.  This upending of the traditional order puts massive financial strain on libraries and the taxpayers that fund them. It also opens up a world of privacy concerns; while libraries are restricted in the reader data they can collect and share, private companies are under no such obligation. Some libraries have turned to another solution: controlled digital lending, or CDL, a process by which a library scans the physical books it already has in its collection, makes secure digital copies, and lends those out on a one-to-one “owned to loaned” ratio.  The Internet Archive was an early pioneer of this technique. When the digital copy is loaned, the physical copy is sequestered from borrowing; when the physical copy is checked out, the digital copy becomes unavailable. The benefits to libraries are obvious; delicate books can be circulated without fear of damage, volumes can be moved off-site for facilities work without interrupting patron access, and older and endangered works become searchable and can get a second chance at life. Library patrons, who fund their local library’s purchases with their tax dollars, also benefit from the ability to freely access the books. Publishers are, unfortunately, not a fan of this model, and in 2020 four of them sued the Internet Archive over its CDL program. The suit ultimately focused on the Internet Archive’s lending of 127 books that were already commercially available through licensed aggregators. The publisher plaintiffs accused the Internet Archive of mass copyright infringement, while the Internet Archive argued that its digitization and lending program was a fair use. The trial court sided with the publishers, and on September 4, the Court of Appeals for the Second Circuit reaffirmed that decision with some alterations to the underlying reasoning.  This decision harms libraries. It locks them into an e-book ecosystem designed to extract as much money as possible while harvesting (and reselling) reader data en masse. It leaves local communities’ reading habits at the mercy of curatorial decisions made by four dominant publishing companies thousands of miles away. It steers Americans away from one of the few remaining bastions of privacy protection and funnels them into a surveillance ecosystem that, like Big Tech, becomes more dangerous with each passing data breach. And by increasing the price for access to knowledge, it puts up even more barriers between underserved communities and the American dream.
11 September 2024
150 notes · View notes
alltoomaples · 3 months
Text
Speed of Science🧬💻💌
I'm dating a STEM girlie and you're not (F1 Edition)
Tumblr media Tumblr media Tumblr media
a/n: and im baaaaaacccckkkkk (like anyone even missed me lmao) with the long overdue request! life of a postgrad StEm girlie here and the struggle is really realll af. but besides that, I'm writing this down as a headcanon for the drivers requested on this poll i had posted long back here. I've always wondered how there's soo minimal povs/ocs where they are a scientific researcher, analyst, etc. sooo i dedicate this one to all the STEM F1 girlies out theree <33
alsoo quick shoutout to my girlieee @smoooothoperator for inspiring and motivating me to get back at writing!🥹🫶🏼 check out her lastest ongoing work 'What Was I Made For? ' its amazing and thats a FACT!! do check her works! its absolutely amazing❤️
check out my works: until i found you masterlist | other works
Tumblr media
Scientific Art Illustrator - Charles Leclerc
As a Scientific Art Illustrator, you specialize in creating visually captivating and scientifically accurate illustrations that depict complex biological, astronomical, or technological subjects.
Charles first discovered you through your works at an exhibition where their stunning illustrations of Formula 1 cars caught his eye. Impressed by their attention to detail and artistic talent, they struck up a conversation about their mutual love for precision and creativity.
During a peaceful weekend afternoon, Charles suggests a spontaneous visit to a local art supply store. Excitedly exploring aisles stocked with vibrant paints, fine brushes, and specialized papers, the two of you engage in discussions about artistic techniques and innovative tools. Amidst laughter and shared enthusiasm for creativity, you bond over your mutual appreciation for the intricacies of art and science, making the afternoon a cherished memory of their shared passions.
After being away from home during race season, Charles always finds a framed series of sketches by you for the races you couldn't make it, capturing his most memorable racing moments. Each sketch is intricately detailed, depicting not only the speed and intensity of the races but also the emotions and determination etched on Charles' face. Touched by the thoughtful gesture, Charles hangs the sketches in his study, a constant reminder of your support and admiration for his passion.
...
Tumblr media
Data Scientist - Lando Norris
A Data Scientist specializes in analyzing large volumes of data using statistical methods and machine learning techniques to extract insights and make data-driven decisions.
You and Lando first connected through a mutual fascination with racing data at a technology symposium focused on sports analytics. Your presentation on advanced predictive modelling in motorsports caught Lando's attention for its innovative approach to enhancing race strategies.
During a cosy evening at home, Lando playfully challenges you to a friendly data analysis competition using real-time telemetry from previous races. Their banter and shared excitement over dissecting racing data create a lighthearted and memorable bonding experience.
You two would watch old races and analyze historical racing data together, playfully debating optimal pit stop strategies and analyzing driver performance trends, their shared passion for racing and data fostering a deep connection and mutual admiration.
...
Tumblr media
Oceanographer/Marine Biologist - Oscar Piastri
An Oceanographer or Marine Biologist studies marine life, ecosystems, and ocean processes to understand and protect marine environments and resources.
You and Oscar crossed paths during a research expedition to study coral reefs in a remote location. Your expertise in marine biology and passion for conservation impressed Oscar, sparking their connection.
Amidst the hectic F1 season, Oscar surprises you with a weekend getaway to a coastal retreat, where they explore tide pools and participate in a beach cleanup together, reaffirming their commitment to environmental stewardship.
You gave Oscar a custom-made charm bracelet featuring miniature charms of marine animals they've discussed during their beach walks and conservation talks. Each charm represents a meaningful moment in their relationship, from their first discussion about oceanography to their shared admiration for marine life. Oscar wears the bracelet during race weekends as a reminder of you and all the love and support you give, both on and off the track.
...
Tumblr media
Mechanical Engineer - Daniel Riccardo
You are a passionate Mechanical Engineer, specializing in advanced automotive design and performance optimization.
Daniel first encountered you at a technical conference organized by one of the team sponsors where you presented groundbreaking research on aerodynamic innovations that caught his attention.
Often, while you meticulously draft engineering schematics at their home office, he makes sure that you have your "engineering emergency kit" beside your workstation, which is a tray of snacks and their favourite coffee – ensuring they're fueled for their late-night brainstorming sessions. For when he's away for races, he stacks them up with small cute notes.
Before Daniel heads to a crucial race, you surprise him with a meticulously crafted miniature replica of his race car, complete with detailed decals and a personalized message of encouragement engraved on the base. Touched by the thoughtful gesture, Daniel proudly displays it in his motorhome, a reminder of the reader's unwavering support both on and off the track.
...
Tumblr media
Statistician - George Russell
A Statistician specializes in collecting, analyzing, and interpreting numerical data to help organizations and individuals make informed decisions.
You and Russell first crossed paths during a university seminar on advanced statistical modeling in sports. Your insightful analysis of Formula 1 race data caught George's attention, sparking a lively discussion that led to mutual admiration for each other's analytical skills and shared passion for racing statistics.
During a particularly demanding race weekend, the reader surprises George with a meticulously prepared statistical analysis report highlighting his strengths and areas for improvement based on recent race data. This thoughtful gesture boosts George's confidence and motivation, showing the reader's support in his pursuit of excellence.
During a weekend getaway, you guys stumble upon a local go-kart track. George, always up for a challenge, suggests they have a friendly race. Knowing George's competitive spirit, you secretly calculate his optimal strategy and surprise him by winning with a perfectly executed last-minute overtaking maneuver. George is impressed by the your strategic thinking and playfulness, and they share a lighthearted and joyous moment celebrating their shared love for racing and friendly competition.
...
Tumblr media
Astrophysicist - Logan Sargeant
An Astrophysicist studies the physical properties, behavior, and evolution of celestial objects such as stars, planets, galaxies, and the universe as a whole, using principles of physics and astronomy.
Logan and you first crossed paths during an expedition to study a rare astronomical event—a comet passing close to Earth. Both passionate about astrophysics, you found yourselves sharing a telescope at a remote observatory, marveling at the comet's beauty and discussing its celestial significance late into the night. Their shared awe and intellectual connection sparked a mutual admiration that grew into a deep bond over their shared passion for exploring the wonders of the cosmos.
During a quiet evening at home, Logan excitedly shows you a new telescope he acquired for stargazing during race weekends, expressing his eagerness to learn more about the cosmos together and sharing their enthusiasm for both racing and astrophysics in equal measure.
Before a critical race weekend, the reader surprises Logan with a personalized star chart that maps out the night sky above the upcoming race venue during the race weekend. Each star on the chart is marked with a heartfelt message of encouragement, reminding Logan of their unwavering support and belief in his abilities on and off the track. Touched by the thoughtful gesture, Logan treasures the star chart as a symbol of the reader's love and encouragement throughout his racing career.
...
Tumblr media
Climate Scientist - Lance Stroll
A Climate Scientist studies climate patterns, environmental changes, and their impacts on Earth's ecosystems, using data analysis and modeling to understand and address global climate challenges.
Lance crossed paths with you at an eco-friendly racing event where Lance was advocating for sustainable practices in motorsport. Being a respected climate scientist, you caught Lance's attention with your insightful presentation on the environmental impact of racing and innovative solutions for reducing carbon footprints in the sport. Their shared passion for sustainability sparked an immediate connection and admiration for each other's dedication to making a positive impact on the environment.
One weekend, Lance surprises you with a homemade dinner featuring sustainably sourced ingredients, proudly showcasing his culinary skills while discussing ways to reduce your carbon footprint. His earnest commitment to sustainability and your shared vision for a healthier planet melts your heart, making this a cherished moment you both treasure.
You, being deeply involved in climate science, often spends late nights analyzing data or writing research papers. One evening, Lance bring him a cozy blanket and a mug of your favorite hot beverage, quietly sitting beside him as he works. You look up from your laptop, touched by his thoughtfulness, and pulls him into a warm embrace, grateful for his unwavering support and understanding of your demanding but vital work.
...
taglist: @lndonrris @thatgirlmj @lwstuff @dannyramirezwife-f1dump @moonypixel tysm for your suggestions! apologies on taking this long to write😅🫶🏼
a/n: hope y'all enjoyed reading this! this was my first time writing a headcanon and for f1 drivers beside charles and lando so hope i did justice to all.
i'm being wanting to read some good domestic bliss, sweet, adorable and lovey dovey blurbs, fics of lando (i talked abt it here) soo maybe i'll work on some drafts at some point cause i'm currently in the middle of project work of my masters degree soo don't know when i'll be posting soo until next time, see yaaa and going back to read mode 👋💓✨️
check out my works: until i found you masterlist | other works
301 notes · View notes
Text
Your New Lab Rat: A Guide for Whumpers Scientists
CW: Lab whump, dehumanization, implied captivity, torture, non-sexual nudity, and restraints
Congratulations on your new lab rat! This is a big step in any scientist's career, and in this helpful guide I'll walk you through getting your subject prepared for experimentation. I know you're excited and want to jump right into the science, but trust me, the proper prep work is essential.
First things first, you need to call your lab rat something. The following are some of the most common names, but feel free to be creative!
Subject (my personal favorite)
Specimen
Asset
An ID number
Their species
Did you pick out a name? Excellent! The next step is to strip away the rest of their dignity. I know this might seem a bit harsh, but it's the best way to ensure your subject cooperates, and you need their cooperation to get that sweet, sweet data you're after. Take away all their possessions, even their clothes. You can give them some scrubs or a hospital gown if you want, or you can just leave them nude. If they argue or cry, just ignore them. There's always an adjustment period when a subject enters a lab, it'll pass quickly.
Your next steps will vary based on the temperament of your subject. If your subject is docile, you might not need to do anything further in preparation and can jump right into experimenting. However, some subjects exhibit aggression, which is unproductive to data collection. You will have to tame them. There are a wide variety of techniques that can be used, so consider the resources at your disposal. Note that you do not want to cause irreparable harm to your subject at this stage. Here's a list of popular disciplinary techniques to consider:
Shock collar
Withholding food, sleep, etc.
Isolation/solitary confinement
Stress positions
Sedatives
And of course, give positive reinforcement when your subject completes a wanted behavior. Most subjects are eager to please once they understand that they will be rewarded for cooperation. Your subject will be behaving themself in no time!
Finally it's time to start your experiments. Stick to the scientific method, and remember results must be replicable to stand up to peer review. That means that you'll need to run the same experiment on your subject multiple times, and preferably have other subjects to compare them to.
A note on safety: even the best trained subject can act out if in pain. I always recommend the use of restraints during experimentation for your own safety. Additionally, always make sure you are wearing the proper PPE. Gloves, safety goggles, lab coat, hazmat suit, etc. Make sure you protect yourself!
Science is hard work, but by preparing your subject beforehand it will be that much easier. Whatever your research goals, I wish you and your subject good luck!
If you decide to write your own lab rat whumpee, consider submitting to The Whumpboratory, our lab whump-themed anthology! Submissions are open until July 31, 2024. More info here!
254 notes · View notes
mariacallous · 4 months
Text
Microsoft's CEO Satya Nadella has hailed the company's new Recall feature, which stores a history of your computer desktop and makes it available to AI for analysis, as “photographic memory” for your PC. Within the cybersecurity community, meanwhile, the notion of a tool that silently takes a screenshot of your desktop every five seconds has been hailed as a hacker's dream come true and the worst product idea in recent memory.
Now, security researchers have pointed out that even the one remaining security safeguard meant to protect that feature from exploitation can be trivially defeated.
Since Recall was first announced last month, the cybersecurity world has pointed out that if a hacker can install malicious software to gain a foothold on a target machine with the feature enabled, they can quickly gain access to the user's entire history stored by the function. The only barrier, it seemed, to that high-resolution view of a victim's entire life at the keyboard was that accessing Recall's data required administrator privileges on a user's machine. That meant malware without that higher-level privilege would trigger a permission pop-up, allowing users to prevent access, and that malware would also likely be blocked by default from accessing the data on most corporate machines.
Then on Wednesday, James Forshaw, a researcher with Google's Project Zero vulnerability research team, published an update to a blog post pointing out that he had found methods for accessing Recall data without administrator privileges—essentially stripping away even that last fig leaf of protection. “No admin required ;-)” the post concluded.
“Damn,” Forshaw added on Mastodon. “I really thought the Recall database security would at least be, you know, secure.”
Forshaw's blog post described two different techniques to bypass the administrator privilege requirement, both of which exploit ways of defeating a basic security function in Windows known as access control lists that determine which elements on a computer require which privileges to read and alter. One of Forshaw's methods exploits an exception to those control lists, temporarily impersonating a program on Windows machines called AIXHost.exe that can access even restricted databases. Another is even simpler: Forshaw points out that because the Recall data stored on a machine is considered to belong to the user, a hacker with the same privileges as the user could simply rewrite the access control lists on a target machine to grant themselves access to the full database.
That second, simpler bypass technique “is just mindblowing, to be honest,” says Alex Hagenah, a cybersecurity strategist and ethical hacker. Hagenah recently built a proof-of-concept hacker tool called TotalRecall designed to show that someone who gained access to a victim's machine with Recall could immediately siphon out all the user's history recorded by the feature. Hagenah's tool, however, still required that hackers find another way to gain administrator privileges through a so-called “privilege escalation” technique before his tool would work.
With Forshaw's technique, “you don’t need any privilege escalation, no pop-up, nothing,” says Hagenah. “This would make sense to implement in the tool for a bad guy.”
In fact, just an hour after speaking to WIRED about Forshaw's finding, Hagenah added the simpler of Forshaw's two techniques to his TotalRecall tool, then confirmed that the trick worked by accessing all the Recall history data stored on another user's machine for which he didn't have administrator access. “So simple and genius,” he wrote in a text to WIRED after testing the technique.
That confirmation removes one of the last arguments Recall's defenders have had against criticisms that the feature acts as, essentially, a piece of pre-installed spyware on a user's machine, ready to be exploited by any hacker who can gain a foothold on the device. “It makes your security very fragile, in the sense that anyone who penetrates your computer for even a second can get your whole history,” says Dave Aitel, the founder of the cybersecurity firm Immunity and a former NSA hacker. “Which is not something people want.”
For now, security researchers have been testing Recall in preview versions of the tool ahead of its expected launch later this month. Microsoft said it plans to integrate Recall on compatible Copilot+ PCs with the feature turned on by default. WIRED reached out to the company for comment on Forshaw's findings about Recall's security issues, but the company has yet to respond.
The revelation that hackers can exploit Recall without even using a separate privilege escalation technique only contributes further to the sense that the feature was rushed to market without a proper review from the company's cybersecurity team—despite the company's CEO Nadella proclaiming just last month that Microsoft would make security its first priority in every decision going forward. “You cannot convince me that Microsoft's security teams looked at this and said ‘that looks secure,’” says Jake Williams, a former NSA hacker and now the VP of R&D at the cybersecurity consultancy Hunter Strategy, where he says he's been asked by some of the firm's clients to test Recall's security before they add Microsoft devices that use it to their networks.
“As it stands now, it’s a security dumpster fire,” Williams says. “This is one of the scariest things I’ve ever seen from an enterprise security standpoint.”
143 notes · View notes
three-dee-ess · 5 months
Text
I see a lot of people online talking about how scary modding a 3DS is, but the techniques have only gotten easier and easier as time has gone on. My first time modding a 3DS took me 6 hours, (though to be fair I was multitasking) but my most recent job took me 20~ minutes give or take. The last four years of the modding scene is now leaps and bounds ahead of what the old techniques used to be! On top of that, it's impossible to brick your 3DS as long as you follow the guide. (Even if you aren't very tech literate, they use pretty simple wording which makes it easy to google. When I first started, I hadn't heard of the "root" of an SD card before, and I googled it ^-^)
Also, no online functionality means you won't get banned lol. So, there was never a better time I guess. I understand the fear of losing your save data, or possibly doing damage to an object you care a lot about, but modding your 3DS is actually the best way to be able to protect that data. Once you mod your 3DS, you can copy that data onto your computer, so that if the hardware was to ever fail, your pokemon would be safe!
99 notes · View notes
eightyonekilograms · 9 months
Text
Very interesting iPhone vulnerability just dropped. Like most big current 0-days, this one requires chaining together many different vulnerabilities in order to be successful, but what makes this one different is that part of the exploit involves an undocumented hardware feature. Long story short: after boot is complete, all the code (as opposed to data) portions of kernel memory are made unwriteable even by the kernel itself, and this is enforced not in software but in hardware by the memory controller, so in theory it's immune to compromises of the OS. But if you write to a magic region of I/O-mapped memory together with a specific key, it bypasses this protection.
Now, what's very interesting is that this feature is not publicly documented anywhere. The researches say it might have been intended for debugging firmware, but that's only a guess. The fact that it needs a key seems to indicate that Apple probably knows about it internally and put in weak anti-exploit countermeasures, but again, we cannot be sure. So there are several different possibilities here:
Whoever made this exploit found it with brute-force exploration. That's not impossible, but the fact that you need to know the exact IOMM address and a key makes it unlikely.
The feature is known to Apple, which leads to three sub-possibilities: i) they were hacked and the exploit technique was exfiltrated, ii) somebody has a man on the inside who leaked it or iii) they were ordered to put this backdoor there by the Powers That Be.
The feature is not known to Apple and was put there by their chip vendors, and they were the ones who were either hacked, infiltrated, or coerced.
Final note: the entry point of the exploit was, once again, iMessage attachments, so if you have an iDevice and you're worried about stuff like this, AIUI Lockdown Mode would make you immune.
86 notes · View notes
cyberpunkonline · 8 months
Text
What is a Cypherpunk?
The term "cypherpunk" refers to a movement and a community of activists advocating for the widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Emerging in the late 1980s and early 1990s, the cypherpunk movement is a confluence of libertarian political philosophy, hacker ethos, and cryptographic science.
The Core Traits of Cypherpunks
1. Advocacy for Privacy and Anonymity: Cypherpunks champion the right to privacy, emphasizing that individuals should have control over their personal information and digital footprints. This advocacy is often in direct opposition to government surveillance and corporate data collection practices.
2. Use of Cryptography: The cornerstone of the cypherpunk movement is the use of strong cryptography to secure communications and transactions. Cypherpunks believe that through cryptographic techniques, individuals can protect their privacy in the digital world.
3. Open Source and Decentralization: A significant trait among cypherpunks is the belief in open-source software and decentralized systems. This ethos promotes transparency, security, and resistance to censorship and control by central authorities.
Who are the Cypherpunks?
The cypherpunk community consists of programmers, activists, academics, and technologists. Notable figures include Julian Assange, the founder of WikiLeaks; Jacob Appelbaum, a former spokesperson for the Tor Project; and Hal Finney, a pioneer in digital cash systems. The manifesto "A Cypherpunk's Manifesto" by Eric Hughes (1993) [https://www.activism.net/cypherpunk/manifesto.html] eloquently encapsulates the philosophy and ideals of this movement.
The Cypherpunk Movement
Cypherpunks are not a formal organization but rather a loosely associated group sharing common interests in cryptography and privacy. The movement's origins can be traced to the “Cypherpunks” mailing list, started in 1992 by Eric Hughes, Timothy C. May, and John Gilmore. This list served as a platform for discussing privacy, cryptography, and related political issues.
Relation to Cyberpunk Principles
While cypherpunks share some overlap with the cyberpunk genre of science fiction, they are distinct in their real-world activism. Cyberpunk literature, like William Gibson's "Neuromancer" (1984) [https://www.goodreads.com/book/show/6088006-neuromancer], often presents a dystopian future where technology is pervasive and oppressive. In contrast, cypherpunks aim to use technology, specifically cryptography, as a tool for empowerment and resistance against such dystopian futures.
Notable Contributions and Technologies
The cypherpunk movement has been instrumental in the development of technologies that emphasize privacy and security:
Tor (The Onion Router): A free and open-source software for enabling anonymous communication [https://www.torproject.org/].
Pretty Good Privacy (PGP): A data encryption and decryption program that provides cryptographic privacy and authentication [https://www.openpgp.org/].
Bitcoin: The creation of Bitcoin by an individual or group under the pseudonym Satoshi Nakamoto was heavily influenced by the ideas of the cypherpunk movement. It embodies principles of decentralization and financial privacy [https://bitcoin.org/en/].
Wikileaks: Founded by Julian Assange, WikiLeaks is a multinational media organization that publishes news leaks and classified media provided by anonymous sources [https://wikileaks.org/].
Conclusion
The cypherpunk movement is a critical lens through which to view the ongoing dialogue about privacy, security, and freedom in the digital age. While not an organized group, the collective impact of cypherpunks on modern cryptography, internet privacy, and digital rights is profound. As digital technology continues to permeate every facet of our lives, the principles and contributions of the cypherpunk community remain more relevant than ever. - REV1.
80 notes · View notes
artoriarts · 9 days
Text
Tumblr media
there’s a lot of talk about missed potential in jjk, and I agree, while culling games onward was a good ol fight shonen, shibuya incident was something special, dark and painful but built on a core foundation of hope and positivity that drives yuji as a character, but it kinda peaked there, never hitting the same emotional depth after, with the exception of maki and the zenin assassination arc.
But from the many things I’ve seen brought up, one of the things I haven’t seen is just the core premise of cursed energy not being used like it could be from the getgo. Instead of just being Ki, it was something developed *through* the negative emotions that pool and spawn curses. This is just gonna be me spitballing but listen listen.
Yuta’s the best way to segue into this. A sensitive kid loses his best friend and spirals into grief, unknowingly channeling his cursed technique (instead of just being able to copy, him being able to replicate/leech soul ‘data’ in general) as he hangs on to every memory and memento of her, acting as almost ritual and binding her soul to his, resulting in the vengeful spirit we know of rika, his raw cursed energy output resulting from the feedback loop of negativity that comes from the mass guilt of the horrors rika enacts in his defense, as well as the guilt of trapping her with him in the first place when he learns it’s his fault. His power is the direct result of the weight he carries with him.
And in the same way, other characters bear their trauma in their power. Maki’s frustration and spite at the circumstances of her birth placing her under every disadvantage with the system as it is. Sukuna’s raw hatred and disdain for his fellow man. Gojo’s isolation from his own humanity as The Strongest, growing up both closer to everyone than anyone could ever know, as the six eyes’ ability to see the flow of cursed energy allows him to practically read people’s minds emotionally, and yet expectations and power have placed him on a pedestal so far away from humanity, pressured and forced into sorcery, not a single other interest permitted, from the moment of his birth. Yuji, being a newcomer, predominantly working off fear and the still fresh grief of his grandpa, along with the pressure he now feels as someone capable of sorcery to protect those who are not, one bornout of love but no less harsh, and after shibuya, like yuta, he gains a burning core of guilt for what his life has allowed to happen. Stretching more now but instead of becoming racist and getting skilljacked, geto breaking at the end of hidden inventory is where his character launches off from, instead of how it dooms itself to end; I would need to put more thought into it to make it make concrete sense but his want to rid the world of nonsorcerers and “evolve humanity” is not out of hatred for the weak but his love for humanity as a whole, he wants a humanity that can defend itself against the natural consequence of its existence that is cursed energy, and sorcerers are basically the only ones who can do that, so non-sorcerers are simply liabilities and sources of cursed energy that don’t pull their own weight, and kenjaku is maybe more like a symbiote to him, his patron that just so happens to have the same practical goals as him, albeit a different motive of pure scientific curiosity (assuming they still want the tengen merger or if they’re still in the story at all, they don’t fit into this brainbaby idea quite as well as everything else, but I digress).
And this isn’t just a story thing, it also affects the battle system too. Desperation while losing a fight actively makes you more powerful - also means consequently that like people who keep their cool like gojo (ignoring the minor insanity (and him seeing his ex-boyfriend)) have an inherent power limiter; he may be the strongest but he doesn’t get the same power buffs that everyone else can. Maybe positive energy actually like exists aside from mahoraga and rct. it’s harder to use because well people latch onto negative emotion easier than positive emotion and if you’re fighting obviously things are not sunshine and rainbows, but it is more effective against pure curses and can heal (also then if you can only rct off positive emotion, that power swing from negativity kinda shifts you into a glass canon with more damage but less ability to heal).
Do I turn this into fanfic. Do I do that thing where you make fanfic but break it so far from anything canon it’s basically just original content. or do I just keep it all locked in my head because I’m lazy. Decisions decisions.
24 notes · View notes