#internet computer protocol
Explore tagged Tumblr posts
Text
🌐 Revolutionizing the Internet: Introducing Internet Computer Protocol (ICP) 🌐
What is ICP? Internet Computer Protocol (ICP) is a blockchain-based platform designed to decentralize the internet, enabling developers to create secure, scalable, and decentralized applications. By eliminating the need for centralized cloud providers, ICP ensures a more open, transparent, and user-controlled web.
Key Features 🔹 Decentralization: ICP transforms the internet by hosting apps on independent data centers worldwide. 🔹 Scalability: Its multi-subnet architecture supports infinite scaling for complex applications. 🔹 Smart Contracts: Canisters, ICP’s unique contracts, allow advanced functionalities directly on-chain. 🔹 Governance: Powered by the Network Nervous System (NNS), giving users control over upgrades and operations.
Token Utility ($ICP) 💰 Staking for network security and rewards. 💡 Paying fees for transactions and application operations. 🔥 Burn mechanism maintains token value by reducing supply.
Bridge from Ethereum to ICP Transition assets seamlessly using @rocketxexchange:
Connect your Ethereum wallet (e.g., MetaMask).
Select ETH as the source and ICP as the destination.
Input your ICP wallet address and transfer the desired amount.
Confirm, execute, and start engaging with ICP’s ecosystem!
Top Wallets for ICP 🔐 NNS Wallet: Official wallet for ICP token management and dApps. 💻 Plug Wallet: A browser-friendly extension for seamless interactions. 📱 Stoic Wallet: User-friendly, perfect for beginners and experienced users alike.
Why ICP Matters ICP is leading the charge in creating a decentralized future, with applications in DeFi, gaming, and beyond. Its commitment to openness and scalability is set to redefine how we interact online.
📊 Future Insights: With growing adoption, price predictions for $ICP indicate potential growth in value, reflecting its significant role in shaping Web3.
👉 Learn More and Join the Movement :
#crypto#cryptocurrency#ethereum#binance#cryptocurreny trading#bitcoin#cryptocurency news#crypto community#coinbase#crypto market#icp#internet computer protocol
1 note
·
View note
Text
Accelerate Your Web Development Skills with the Full-Stack Web Development In 7 Days Ebook

Discover the ultimate resource to fast-track your web development journey! The Full-Stack Web Development In 7 Days Ebook is a comprehensive guide that covers front-end and back-end development, offering clear explanations and practical examples. With its organized structure, interactive approach, and thorough coverage of essential technologies, this ebook equips beginners with the foundational knowledge needed to excel in the dynamic field of web development. Don't miss the chance to accelerate your skills and unlock endless possibilities in just 7 days!
To get the access of Full-Stack Web Development Ebook click here
#internet computer#computer internet#internet computer class#internet computer crypto#internet#internet computer protocol#internet computer price prediction#computer internet class#internet computer icp#computer and internet awareness#computer internet mcq#internet computer coin#internet computer price#computer#computer internet course#internet computer dfinity#computer internet question#internet computer coin prediction#computer internet by preeti mam#full stack web development#web development#full stack development#development#web development roadmap#full stack web development course#web development tutorial for beginners#web development guide#learn web development#web development tutorial#i tried coding on a chromebook for 7 days
0 notes
Text
first impressions after one episode, before i see more fan designs and think their cooler so i change my own design-
Sam: - seems like a flannel guy doesnt he? I was going to say his flannel is an assortment of greens and maybe blues but any green colour palette scares me so I'm leaving it for now - very neat hair i think, or at least groomed presentably? - slight stubble - eyebags (obligatory) gwen: - i know elias canonically had grey eyes but I'm also sure we all collectively ignored that and said he had either yellow or green so, gwen has yellow eyes. - blonde, because i also imagined elias to be blonde - would not wear business casual clothes it think. would just wear whatever she feels like alice: - gives redhead vibes - overalls, or that general fashion - sounds like she has her shit together - if you are the first person your ex turns to when they need help you're probably slaying
#the magnus protocol#tmagp#tmagp spoilers#tmagp fanart#tma#the magnus archives fanart#also not related to the post but THEY TRAPPED OUR GUYS IN AN OUTDATED COMPUTER SYSTEM#i think jon would hate being called chester personally#i cant believe “somewhere else” is internet explorer text to speech#my art#mey draws tma#mey draws
22 notes
·
View notes
Text
Folks who know about computers, help me out: is ".jmj" a file type? I'm thinking like .exe, .jpeg, .pdf...
I don't know other computer terms that would start with a . like that, but then again I don't know much about computers
#okay i know domains do - .com .org etc - but i doubt it was an internet error that crashed alice's computer#the magnus protocol#tmagp spoilers#3 putting down roots#my magnus protocol stuff#original post#fr3-d1 | freddie#magnus protocol speculation/analysis
17 notes
·
View notes
Text
Dang now I need to come up with a ship name for Collin Becher x Freddie. I can’t just make Fr3yer and Polygramming and leave that one out.
Let me just
#tmagp#colin becher#fr3 d1#the magnus protocol#tmagp shipping#I’m just here in my little internet bubble shipping people with computers#it’s entertaining
12 notes
·
View notes
Text
Why Qubetics, NEAR, and ICP Are the Top Cryptos to Buy This Month for Real-World Utility and Infrastructure Growth
Momentum is quietly shifting in the digital asset world, and smart capital is moving where the infrastructure is being built, not just hyped. Near Protocol is becoming one of the fastest-growing platforms in the AI-integrated Web3 race, solidifying support above $2.20 with technical indicators flashing green. Trading volume is up nearly 40% as participants rotate into assets showing clear…
#best crypto presale#internet computer protocol web3#near protocol ai growth#qubetics presale stage 30#top cryptos to buy this month
0 notes
Text
Cybercriminals are abusing Google’s infrastructure, creating emails that appear to come from Google in order to persuade people into handing over their Google account credentials. This attack, first flagged by Nick Johnson, the lead developer of the Ethereum Name Service (ENS), a blockchain equivalent of the popular internet naming convention known as the Domain Name System (DNS). Nick received a very official looking security alert about a subpoena allegedly issued to Google by law enforcement to information contained in Nick’s Google account. A URL in the email pointed Nick to a sites.google.com page that looked like an exact copy of the official Google support portal.
As a computer savvy person, Nick spotted that the official site should have been hosted on accounts.google.com and not sites.google.com. The difference is that anyone with a Google account can create a website on sites.google.com. And that is exactly what the cybercriminals did. Attackers increasingly use Google Sites to host phishing pages because the domain appears trustworthy to most users and can bypass many security filters. One of those filters is DKIM (DomainKeys Identified Mail), an email authentication protocol that allows the sending server to attach a digital signature to an email. If the target clicked either “Upload additional documents” or “View case”, they were redirected to an exact copy of the Google sign-in page designed to steal their login credentials. Your Google credentials are coveted prey, because they give access to core Google services like Gmail, Google Drive, Google Photos, Google Calendar, Google Contacts, Google Maps, Google Play, and YouTube, but also any third-party apps and services you have chosen to log in with your Google account. The signs to recognize this scam are the pages hosted at sites.google.com which should have been support.google.com and accounts.google.com and the sender address in the email header. Although it was signed by accounts.google.com, it was emailed by another address. If a person had all these accounts compromised in one go, this could easily lead to identity theft.
How to avoid scams like this
Don’t follow links in unsolicited emails or on unexpected websites.
Carefully look at the email headers when you receive an unexpected mail.
Verify the legitimacy of such emails through another, independent method.
Don’t use your Google account (or Facebook for that matter) to log in at other sites and services. Instead create an account on the service itself.
Technical details Analyzing the URL used in the attack on Nick, (https://sites.google.com[/]u/17918456/d/1W4M_jFajsC8YKeRJn6tt_b1Ja9Puh6_v/edit) where /u/17918456/ is a user or account identifier and /d/1W4M_jFajsC8YKeRJn6tt_b1Ja9Puh6_v/ identifies the exact page, the /edit part stands out like a sore thumb. DKIM-signed messages keep the signature during replays as long as the body remains unchanged. So if a malicious actor gets access to a previously legitimate DKIM-signed email, they can resend that exact message at any time, and it will still pass authentication. So, what the cybercriminals did was: Set up a Gmail account starting with me@ so the visible email would look as if it was addressed to “me.” Register an OAuth app and set the app name to match the phishing link Grant the OAuth app access to their Google account which triggers a legitimate security warning from [email protected] This alert has a valid DKIM signature, with the content of the phishing email embedded in the body as the app name. Forward the message untouched which keeps the DKIM signature valid. Creating the application containing the entire text of the phishing message for its name, and preparing the landing page and fake login site may seem a lot of work. But once the criminals have completed the initial work, the procedure is easy enough to repeat once a page gets reported, which is not easy on sites.google.com. Nick submitted a bug report to Google about this. Google originally closed the report as ‘Working as Intended,’ but later Google got back to him and said it had reconsidered the matter and it will fix the OAuth bug.
11K notes
·
View notes
Text
smolZINE #42 (released 2025-01-26)
gemini://gemini.cyberbot.space/smolzine/smolzine-issue-42.gmi
(cornquest is wonderful & reminds me of sanitarium)
#gemini protocol#smolzine#digital zine#handheld tech#psp nostalgia#homebrew software#retro computing#alternative internet#indie tech#community zine#smolweb#small web#gemini
0 notes
Text
Internet of Things (IoT) Technology
The Internet of Things, by its very nature, is a transformative technology that connects ordinary appliances to the Internet, offering an opportunity to collect, share, and act on data. This network as such boasts everything from smart appliances and wearables to industrial machinery and automobiles, therefore leading to better monitoring, control, and more automation for completing environments.

IoT involves using embedded sensors, communication protocols, and cloud computing to provide insights for real-time operations and smooth user experiences in various domains, including healthcare, agriculture, transportation, and smart cities.
IoT technology revolutionizes industries through predictive maintenance, effective resource use, and decision-making. For instance, in agriculture, IoT sensors track soil moisture and weather conditions so that irrigation is optimized; in manufacturing, machines are IoT-enabled, providing equipment health insight, and resulting in lower downtime and maintenance costs. Indeed, IoT's explosive growth has also created severe concerns for data security and privacy. Consequently, traditional cybersecurity and secure communication protocol developments continue to advance.
Training in IoT at EmbLogic
The EmbLogic training program focuses on practical, hands-on, real-world experience for engineers in IoT technology. The courses include IoT architecture sensor integration and processing and network protocols. Those participants will engage in hands-on projects about designing and programming IoT solutions. This course is good for anyone wanting to upgrade his technical skills in IoT or join this exciting industry. Sutrusted between pure theoretical knowledge and hands-on application, EmbLogic facilitates the training of engineers regarding near-future available career opportunities in IoT technology.
#Internet of Things (IoT), #IoT technology solutions, #IoT applications, #Smart devices and automation, #IoT network protocols, #Embedded sensors in IoT, #IoT data collection and analysis, #Predictive maintenance IoT, #IoT cloud computing, #IoT security and privacy, #Smart city IoT solutions, #EmbLogic IoT training program.
#Internet of Things (IoT)#IoT technology solutions#IoT applications#IoT network protocols#Embedded sensors in IoT#IoT cloud computing#Smart city IoT solutions
1 note
·
View note
Text
From Decentralized Autonomy to Entrepreneurial Surge: Unveiling Internet Computer (ICP)'s Remarkable Growth Journey
In recent developments within the Internet Computer Protocol (ICP) ecosystem, significant strides have been witnessed, particularly in the realms of decentralized autonomous organizations (DAOs), developer support, and startup incubation. The dynamic progress underscores the continuous evolution of the network, positioning it for broader adoption in the blockchain space. Shared through a recent update on the X thread by the DFINITY Foundation, a major contributor to the Internet Computer blockchain, the noteworthy advancements are reshaping the landscape of decentralized technologies.
ICP's prowess lies in bridging the gap between conventional app development and blockchain, allowing the creation of expressive and scalable applications with the security and decentralization inherent in blockchain technology. This unique positioning contributes to ICP's high rankings on DeFiLlama's DAO list, where the Network Nervous System (NNS) has emerged as a prominent leader, signaling the vibrant DAO ecosystem flourishing on the ICP. With eight out of the top 16 spots secured by ICP, the potential for decentralized governance and community-driven initiatives is unmistakably evident.
Recognizing the pivotal role of developers in shaping the future of the internet, the ICP team has prioritized enhancements to the developer documentation. A revamped user interface (UI), streamlined content, and reduced redundancy are among the updates aimed at creating a more user-friendly and accessible experience. This commitment to developer support is designed to attract more talent and expedite the development of innovative applications on the ICP network.
0 notes
Text
What is Trunk Port in Networking
As we learned and understood on Layer-2 Switch users or Ports in the same VLAN can communicate and send data. That is correct and possible if all users are connected on the same Switch. But what if users or Switches are located at other locations, floors, or Buildings. How we will communicate with them in the same VLAN. In this article, we discuss a solution and understand What is Trunk Port in…
View On WordPress
#cisco networking#computer networking#dynamic trunking protocol#dynamic trunking protocol (internet protocol)#networking protocols#networking&039;#trunking#vlan trunking protocol#vlan trunking protocol (protocol)#vtp – the vlan trunking protocol and vlans explained#what is dtp#what is dtp (dynamic trunking protocol)#what is dtp protocol in hindi#what is dynamic trunking protocol#what is dynamic trunking protocol (dtp)?#what is vlan trunking protocol
0 notes
Text
Battery-operated Remote Terminal Units Market Research, Size, Share, Analysis, Overview and Regional Outlook Study 2017 – 2032
The market for Remote Terminal Units (RTUs) that are battery-operated allows them to function in isolated or off-grid regions where access to a reliable power supply is restricted. RTUs are electronic devices used to monitor and manage remote equipment and processes in many different industries, such as oil and gas, water and wastewater management, power distribution, and telecommunications. Here is a summary of the market for battery-operated RTUs, including information on demand:
Market Overview: Due to a number of circumstances, the market for battery-operated RTUs has been expanding. The need for battery-operated RTUs has been fueled by the necessity for remote monitoring and control capabilities in various industries, particularly in places with weak power infrastructure. These devices enable efficient monitoring and control of remote assets without the requirement for a continual external power source thanks to their dependable and autonomous operation.
Demand Drivers:
1. Real-time monitoring and control of assets: situated in remote or isolating locations are necessary in many businesses. Without the requirement for a sizable power infrastructure or reliance on cable connections, battery-operated RTUs allow for effective data gathering, monitoring, and control of these assets.
2. Applications Off-Grid: In off-grid applications where access to a dependable power supply is restricted or nonexistent, battery-operated RTUs are widely used. Examples include remote water pumping stations in rural areas, environmental monitoring stations, remote weather monitoring stations, and remote oil and gas wellheads.
3. Emergency and Temporary Installations: Whereas immediate deployment is necessary, battery-powered RTUs are also used in emergency and temporary installations. When catastrophe recovery, building projects, or temporary infrastructure installations are taking place, these machines can instantly provide remote monitoring and control capabilities.
4. Environmental Monitoring: Data collection from remote weather stations, air quality sensors, and water quality sensors are all important aspects of environmental monitoring that battery-operated RTUs play a key role in. Continuous monitoring is made possible in remote or environmentally delicate locations by these equipment.
5. IoT Connectivity: The need for battery-operated RTUs has increased as the Internet of Things (IoT) is becoming more widely used in a variety of businesses. These devices are essential parts of IoT networks because they provide seamless data transmission, communication, and control between remote assets and central management systems.
Here are some of the key benefits for Stakeholders:
Remote Monitoring and Control
Flexibility and Mobility
Cost-Effective Deployment
Resilience to Power Outages
Integration with IoT and Smart Grids
Increased Data Accessibility
Environmental Monitoring and Compliance
Rapid Deployment for Emergency Response
Redundancy and Reliability
Scalability and Future-Proofing
We recommend referring our Stringent datalytics firm, industry publications, and websites that specialize in providing market reports. These sources often offer comprehensive analysis, market trends, growth forecasts, competitive landscape, and other valuable insights into this market.
By visiting our website or contacting us directly, you can explore the availability of specific reports related to this market. These reports often require a purchase or subscription, but we provide comprehensive and in-depth information that can be valuable for businesses, investors, and individuals interested in this market.
“Remember to look for recent reports to ensure you have the most current and relevant information.”
Click Here, To Get Free Sample Report: https://stringentdatalytics.com/sample-request/battery-operated-remote-terminal-units-market/10333/
Market Segmentations:
Global Battery-operated Remote Terminal Units Market: By Company • SIEMENS • SENECA • Omniflex • King Pigeon Communication Co.,Limited • Servelec Group • TEKBOX • Micro Sensor Co., Ltd. • Hitachi Group • Remsdaq Ltd Global Battery-operated Remote Terminal Units Market: By Type • GPRS • GSM • Modular • Others Global Battery-operated Remote Terminal Units Market: By Application • Power Industry • Government and Utilities • Industrial Global Battery-operated Remote Terminal Units Market: Regional Analysis The regional analysis of the global Battery-operated Remote Terminal Units market provides insights into the market's performance across different regions of the world. The analysis is based on recent and future trends and includes market forecast for the prediction period. The countries covered in the regional analysis of the Battery-operated Remote Terminal Units market report are as follows: North America: The North America region includes the U.S., Canada, and Mexico. The U.S. is the largest market for Battery-operated Remote Terminal Units in this region, followed by Canada and Mexico. The market growth in this region is primarily driven by the presence of key market players and the increasing demand for the product. Europe: The Europe region includes Germany, France, U.K., Russia, Italy, Spain, Turkey, Netherlands, Switzerland, Belgium, and Rest of Europe. Germany is the largest market for Battery-operated Remote Terminal Units in this region, followed by the U.K. and France. The market growth in this region is driven by the increasing demand for the product in the automotive and aerospace sectors. Asia-Pacific: TheAsia-Pacific region includes Singapore, Malaysia, Australia, Thailand, Indonesia, Philippines, China, Japan, India, South Korea, and Rest of Asia-Pacific. China is the largest market for Battery-operated Remote Terminal Units in this region, followed by Japan and India. The market growth in this region is driven by the increasing adoption of the product in various end-use industries, such as automotive, aerospace, and construction. Middle East and Africa: The Middle East and Africa region includes Saudi Arabia, U.A.E, South Africa, Egypt, Israel, and Rest of Middle East and Africa. The market growth in this region is driven by the increasing demand for the product in the aerospace and defense sectors. South America: The South America region includes Argentina, Brazil, and Rest of South America. Brazil is the largest market for Battery-operated Remote Terminal Units in this region, followed by Argentina. The market growth in this region is primarily driven by the increasing demand for the product in the automotive sector.
Visit Report Page for More Details: https://stringentdatalytics.com/reports/battery-operated-remote-terminal-units-market/10333/
Reasons to Purchase Battery-operated Remote Terminal Units Market Report:
• To obtain insights into industry trends and dynamics, including market size, growth rates, and important factors and difficulties. This study offers insightful information on these topics.
• To identify important participants and rivals: This research studies can assist companies in identifying key participants and rivals in their sector, along with their market share, business plans, and strengths and weaknesses.
• To comprehend consumer behaviour: these research studies can offer insightful information about customer behaviour, including preferences, spending patterns, and demographics.
• To assess market opportunities: These research studies can aid companies in assessing market chances, such as prospective new goods or services, fresh markets, and new trends.
In general, market research studies offer companies and organisations useful data that can aid in making decisions and maintaining competitiveness in their industry. They can offer a strong basis for decision-making, strategy formulation, and company planning.
About US:
Stringent Datalytics offers both custom and syndicated market research reports. Custom market research reports are tailored to a specific client's needs and requirements. These reports provide unique insights into a particular industry or market segment and can help businesses make informed decisions about their strategies and operations.
Syndicated market research reports, on the other hand, are pre-existing reports that are available for purchase by multiple clients. These reports are often produced on a regular basis, such as annually or quarterly, and cover a broad range of industries and market segments. Syndicated reports provide clients with insights into industry trends, market sizes, and competitive landscapes. By offering both custom and syndicated reports, Stringent Datalytics can provide clients with a range of market research solutions that can be customized to their specific needs
Contact US:
Stringent Datalytics
Contact No - +1 346 666 6655
Email Id -�� [email protected]
Web - https://stringentdatalytics.com/
#Battery-operated Remote Terminal Units#RTU Market#Remote Monitoring#Wireless RTU#Industrial Automation#Battery-powered RTU#IoT (Internet of Things)#Energy Efficiency#Data Collection#Telemetry#Remote Control#Battery-powered Sensors#SCADA (Supervisory Control and Data Acquisition)#Energy Management#Off-grid Applications#Renewable Energy#Battery Technology#Remote Sensing#Communication Protocols#Edge Computing#Connectivity Solutions#Remote Data Acquisition#Condition Monitoring#Asset Management.
0 notes
Text
China hacked Verizon, AT&T and Lumen using the FBI’s backdoor

On OCTOBER 23 at 7PM, I'll be in DECATUR, presenting my novel THE BEZZLE at EAGLE EYE BOOKS.
State-affiliated Chinese hackers penetrated AT&T, Verizon, Lumen and others; they entered their networks and spent months intercepting US traffic – from individuals, firms, government officials, etc – and they did it all without having to exploit any code vulnerabilities. Instead, they used the back door that the FBI requires every carrier to furnish:
https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack-327fc63b?st=C5ywbp&reflink=desktopwebshare_permalink
In 1994, Bill Clinton signed CALEA into law. The Communications Assistance for Law Enforcement Act requires every US telecommunications network to be designed around facilitating access to law-enforcement wiretaps. Prior to CALEA, telecoms operators were often at pains to design their networks to resist infiltration and interception. Even if a telco didn't go that far, they were at the very least indifferent to the needs of law enforcement, and attuned instead to building efficient, robust networks.
Predictably, CALEA met stiff opposition from powerful telecoms companies as it worked its way through Congress, but the Clinton administration bought them off with hundreds of millions of dollars in subsidies to acquire wiretap-facilitation technologies. Immediately, a new industry sprang into being; companies that promised to help the carriers hack themselves, punching back doors into their networks. The pioneers of this dirty business were overwhelmingly founded by ex-Israeli signals intelligence personnel, though they often poached senior American military and intelligence officials to serve as the face of their operations and liase with their former colleagues in law enforcement and intelligence.
Telcos weren't the only opponents of CALEA, of course. Security experts – those who weren't hoping to cash in on government pork, anyways – warned that there was no way to make a back door that was only useful to the "good guys" but would keep the "bad guys" out.
These experts were – then as now – dismissed as neurotic worriers who simultaneously failed to understand the need to facilitate mass surveillance in order to keep the nation safe, and who lacked appropriate faith in American ingenuity. If we can put a man on the moon, surely we can build a security system that selectively fails when a cop needs it to, but stands up to every crook, bully, corporate snoop and foreign government. In other words: "We have faith in you! NERD HARDER!"
NERD HARDER! has been the answer ever since CALEA – and related Clinton-era initiatives, like the failed Clipper Chip program, which would have put a spy chip in every computer, and, eventually, every phone and gadget:
https://en.wikipedia.org/wiki/Clipper_chip
America may have invented NERD HARDER! but plenty of other countries have taken up the cause. The all-time champion is former Australian Prime Minister Malcolm Turnbull, who, when informed that the laws of mathematics dictate that it is impossible to make an encryption scheme that only protects good secrets and not bad ones, replied, "The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia":
https://www.zdnet.com/article/the-laws-of-australia-will-trump-the-laws-of-mathematics-turnbull/
CALEA forced a redesign of the foundational, physical layer of the internet. Thankfully, encryption at the protocol layer – in the programs we use – partially counters this deliberately introduced brittleness in the security of all our communications. CALEA can be used to intercept your communications, but mostly what an attacker gets is "metadata" ("so-and-so sent a message of X bytes to such and such") because the data is scrambled and they can't unscramble it, because cryptography actually works, unlike back doors. Of course, that's why governments in the EU, the US, the UK and all over the world are still trying to ban working encryption, insisting that the back doors they'll install will only let the good guys in:
https://pluralistic.net/2023/03/05/theyre-still-trying-to-ban-cryptography/
Any back door can be exploited by your adversaries. The Chinese sponsored hacking group know as Salt Typhoon intercepted the communications of hundreds of millions of American residents, businesses, and institutions. From that position, they could do NSA-style metadata-analysis, malware injection, and interception of unencrypted traffic. And they didn't have to hack anything, because the US government insists that all networking gear ship pre-hacked so that cops can get into it.
This isn't even the first time that CALEA back doors have been exploited by a hostile foreign power as a matter of geopolitical skullduggery. In 2004-2005, Greece's telecommunications were under mass surveillance by US spy agencies who wiretapped Greek officials, all the way up to the Prime Minister, in order to mess with the Greek Olympic bid:
https://en.wikipedia.org/wiki/Greek_wiretapping_case_2004%E2%80%9305
This is a wild story in so many ways. For one thing, CALEA isn't law in Greece! You can totally sell working, secure networking gear in Greece, and in many other countries around the world where they have not passed a stupid CALEA-style law. However the US telecoms market is so fucking huge that all the manufacturers build CALEA back doors into their gear, no matter where it's destined for. So the US has effectively exported this deliberate insecurity to the whole planet – and used it to screw around with Olympic bids, the most penny-ante bullshit imaginable.
Now Chinese-sponsored hackers with cool names like "Salt Typhoon" are traipsing around inside US telecoms infrastructure, using the back doors the FBI insisted would be safe.
Tor Books as just published two new, free LITTLE BROTHER stories: VIGILANT, about creepy surveillance in distance education; and SPILL, about oil pipelines and indigenous landback.

If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2024/10/07/foreseeable-outcomes/#calea
Image: Kris Duda, modified https://www.flickr.com/photos/ahorcado/5433669707/
CC BY 2.0 https://creativecommons.org/licenses/by/2.0/
#pluralistic#calea#lawful interception#backdoors#keys under doormats#cold war 2.0#foreseeable outcomes#jerry berman#greece#olympics#snowden
400 notes
·
View notes
Text
Whats the opposite of gothic? I'm in love with comp sci anti-gothic where it's just people being surprisingly polite and nice and funny through computers. A program's first lines are always "Hello world!". SMTP protocols apparently say "hello, pleased to meet you" to each other to establish a connection with a handshake. Python has a different version called Andaconda, which has a smaller version called miniconda. C++ is just C continuously improving on itself, because the ++ operator means to add one onto a previous value, and C# is two ++ stacked on top of each other. Lawmakers have to talk about the ethics of saving "cookies" to computers because one guy liked fortune cookies and decided to call them that. The internet itself wasn't created with security in mind because it was just meant to be a way for a group of people who trusted each other using it to send each other information, and so on, and so forth
#compeng#comp eng#computer engineering#computer science#Information Technology#studyblr#study#neon academia#university#eye contact with the abyss#It's probably just because I'm new to the whole field but it's really quite nice#I say anti gothic because instead of something normal being eerie#its something eerie (the inhumanity of computers) being surprisingly normal (people putting joke comments in code)
712 notes
·
View notes
Text
100 Inventions by Women
LIFE-SAVING/MEDICAL/GLOBAL IMPACT:
Artificial Heart Valve – Nina Starr Braunwald
Stem Cell Isolation from Bone Marrow – Ann Tsukamoto
Chemotherapy Drug Research – Gertrude Elion
Antifungal Antibiotic (Nystatin) – Rachel Fuller Brown & Elizabeth Lee Hazen
Apgar Score (Newborn Health Assessment) – Virginia Apgar
Vaccination Distribution Logistics – Sara Josephine Baker
Hand-Held Laser Device for Cataracts – Patricia Bath
Portable Life-Saving Heart Monitor – Dr. Helen Brooke Taussig
Medical Mask Design – Ellen Ochoa
Dental Filling Techniques – Lucy Hobbs Taylor
Radiation Treatment Research – Cécile Vogt
Ultrasound Advancements – Denise Grey
Biodegradable Sanitary Pads – Arunachalam Muruganantham (with women-led testing teams)
First Computer Algorithm – Ada Lovelace
COBOL Programming Language – Grace Hopper
Computer Compiler – Grace Hopper
FORTRAN/FORUMAC Language Development – Jean E. Sammet
Caller ID and Call Waiting – Dr. Shirley Ann Jackson
Voice over Internet Protocol (VoIP) – Marian Croak
Wireless Transmission Technology – Hedy Lamarr
Polaroid Camera Chemistry / Digital Projection Optics – Edith Clarke
Jet Propulsion Systems Work – Yvonne Brill
Infrared Astronomy Tech – Nancy Roman
Astronomical Data Archiving – Henrietta Swan Leavitt
Nuclear Physics Research Tools – Chien-Shiung Wu
Protein Folding Software – Eleanor Dodson
Global Network for Earthquake Detection – Inge Lehmann
Earthquake Resistant Structures – Edith Clarke
Water Distillation Device – Maria Telkes
Portable Water Filtration Devices – Theresa Dankovich
Solar Thermal Storage System – Maria Telkes
Solar-Powered House – Mária Telkes
Solar Cooker Advancements – Barbara Kerr
Microbiome Research – Maria Gloria Dominguez-Bello
Marine Navigation System – Ida Hyde
Anti-Malarial Drug Work – Tu Youyou
Digital Payment Security Algorithms – Radia Perlman
Wireless Transmitters for Aviation – Harriet Quimby
Contributions to Touchscreen Tech – Dr. Annette V. Simmonds
Robotic Surgery Systems – Paula Hammond
Battery-Powered Baby Stroller – Ann Moore
Smart Textile Sensor Fabric – Leah Buechley
Voice-Activated Devices – Kimberly Bryant
Artificial Limb Enhancements – Aimee Mullins
Crash Test Dummies for Women – Astrid Linder
Shark Repellent – Julia Child
3D Illusionary Display Tech – Valerie Thomas
Biodegradable Plastics – Julia F. Carney
Ink Chemistry for Inkjet Printers – Margaret Wu
Computerised Telephone Switching – Erna Hoover
Word Processor Innovations – Evelyn Berezin
Braille Printer Software – Carol Shaw
⸻
HOUSEHOLD & SAFETY INNOVATIONS:
Home Security System – Marie Van Brittan Brown
Fire Escape – Anna Connelly
Life Raft – Maria Beasley
Windshield Wiper – Mary Anderson
Car Heater – Margaret Wilcox
Toilet Paper Holder – Mary Beatrice Davidson Kenner
Foot-Pedal Trash Can – Lillian Moller Gilbreth
Retractable Dog Leash – Mary A. Delaney
Disposable Diaper Cover – Marion Donovan
Disposable Glove Design – Kathryn Croft
Ice Cream Maker – Nancy Johnson
Electric Refrigerator Improvements – Florence Parpart
Fold-Out Bed – Sarah E. Goode
Flat-Bottomed Paper Bag Machine – Margaret Knight
Square-Bottomed Paper Bag – Margaret Knight
Street-Cleaning Machine – Florence Parpart
Improved Ironing Board – Sarah Boone
Underwater Telescope – Sarah Mather
Clothes Wringer – Ellene Alice Bailey
Coffee Filter – Melitta Bentz
Scotchgard (Fabric Protector) – Patsy Sherman
Liquid Paper (Correction Fluid) – Bette Nesmith Graham
Leak-Proof Diapers – Valerie Hunter Gordon
FOOD/CONVENIENCE/CULTURAL IMPACT:
Chocolate Chip Cookie – Ruth Graves Wakefield
Monopoly (The Landlord’s Game) – Elizabeth Magie
Snugli Baby Carrier – Ann Moore
Barrel-Style Curling Iron – Theora Stephens
Natural Hair Product Line – Madame C.J. Walker
Virtual Reality Journalism – Nonny de la Peña
Digital Camera Sensor Contributions – Edith Clarke
Textile Color Processing – Beulah Henry
Ice Cream Freezer – Nancy Johnson
Spray-On Skin (ReCell) – Fiona Wood
Langmuir-Blodgett Film – Katharine Burr Blodgett
Fish & Marine Signal Flares – Martha Coston
Windshield Washer System – Charlotte Bridgwood
Smart Clothing / Sensor Integration – Leah Buechley
Fibre Optic Pressure Sensors – Mary Lou Jepsen
#women#inventions#technology#world#history#invented#creations#healthcare#home#education#science#feminism#feminist
39 notes
·
View notes
Note
do you know any good guides to get into furry muck?? ive wanted to try it for ages but find it confusing
so long as you have some familiarity with command line/terminal and the basic CLI procedures, i found the starting guide on the official site quite adequate. otherwise, first familiarize yourself with the command line interface of your computer. it takes a little getting used to, but this is how the entire MUCK will be, plus knowing how to use a CLI is a good skill to have.
you will need telnet installed on your computer. telnet is the protocol that will allow you to access furrymuck through your CLI (telnet is not secure, so don't type anything into furryMUCK you wouldn't want anyone to be able to see! this is the risk of using a legacy system, assume it has already been compromised and act accordingly). on windows telnet is preinstalled but you will need to enable it as described in this guide. on linux and macOS you can install it with a package manager. i use homebrew on mac.
once you have telnet, the official guides for connecting are here. character registration is done via email. mine took around a week and a half to come back. because your passwords are sent in plaintext over email and unsecured over telnet do not reuse another password. here in the registration guide.
once you access the MUCK, the area just outside the bandstand where you start has guides for new players and the people around there are generally willing to help new and clueless players (like me). it takes a little trial and error and exploring. i found this guide for interacting with the enviornment helpful.
furryMUCK is a very magical place when you're able to meet it at its own terms. part of the fantasy is the clunkiness of the ancient internet its idiosyncrasies. have so much fun!
62 notes
·
View notes