Maybe a little off the topic, but I was thinking just the other day that Alexa/Google Home/Siri could be made significantly better if it accepted instructions the way ChatGPT does.
My theory on this is that it would confuse the dataset having to both transcribe and then "understand" what was asked. By reducing this single variable [which we all know is technically already possible: audio transcription], the dataset is allowing itself to be trained with less initial noise.
Look for "Object Storange" for instance and in the row will be links to all the competing services, so you could pretty easily do this to learn about competitors through the one you know... At least for the big players.
Generally refers to the idea that a microservice should be designed to scale horizontally (with more instances) vs. vertically (more compute power). If you can scale horizontally you're more likely to be able to meet changes demand at a lower price.
In firefox, if I put something in the search box, press enter, it will search. If I press enter a second time (taking no other action) it will display json.
Kind of a tangent, but I was traveling in Portugal last year, and one day as I was headed to a train station I felt my phone buzz. I picked it up and it had a failed Bluetooth file transfer. In the settings, the device name had changed from the default to what looked like a base64 string, if I remember correctly. Unfortunately I didn't think to screenshot anything.
The phone was literally only a couple weeks old. Nothing new had been paired. I changed the name back and figured I would look it up later. The failed file transfer was automatically cleared (just a phone thing) and I wasn't able to find information about it.
A similar thing happened to my phone while I was at Defcon several years ago. After that I put my phone on airplane mode. Then when I got home, I reset all my passwords, and wiped the phone.
Can be, the Wall of Sheep mentioned here is from the traffic on the DefCon network. General practice is to make sure at least your bluetooth and wifi are turned off. Realistically, no one is going to use a 0-day to hack into your personal phone.
That's for unencrypted credentials captured going across the wire by the ops team. That's to highlight insecure comms not hack people.
There was an instance where someone used a wifi pineapple 0day to brick pineapples, which are considered script kiddie tools in many circles.
Generally nobody will waste a valuable 0day at defcon to attack a personal device. If you get popped it's probably because you're running known vulnerable software.
No its more of an urban legend. I'm sure there's some hijinks going on but I doubt the hotels would tolerate any kind of large scale malicious activity especially with all the unrelated people staying at the hotel
I concur. While I bring a "burner" phone and laptop, it's more so I have a scratch system I can play / experiement on than any real fear that a sensibly configured device is going to get pwned. I used my real phone and laptop during Defcon 27 last week, too. I do have bluetooth off, and I made sure I had no filesharing enabled, and the latest patches, etc.)
I've been to about 10 defcons, and I've never had a device pwned that wasn't a spare device I was playing with.
I might be misremembering technologies, but I think in BT the incoming connection can directly execute commands on your device without any kind of identification/authorization.
I think about this from time to time -- how people build up this sense of personality related to a forum or site. I think what tends to happen for an individual is that when you're talking to millions of people you don't have the perspective on who says what anymore, it becomes "twitter thinks" or "reddit says" instead of "these 10 people."
I think the reason everybody knows everything is that because we don't look at the individuals when we talk in a forum like this. There are always going to be some 'famous' people whose names pop up over and over, but as general responses you don't really know what a person thinks about something. We internalize a consensus of opinions and then it becomes just "well, HN said this."
This is most apparent when the forum contradicts itself. If there isn't another way to denote the opinions (like a sub-forum) then you start seeing comments like "everyone was against it yesterday and now everyone is in favor?" when in reality it's unlikely to be the same people responding anyway.
So how do you do this in practice? Do you just send some guy (that you trust!) hashes of all the files on your system and hope that he spots the backdoored binary soon enough?
Perhaps there's some false assumption there that the "app store" will serve everyone a backdoored binary, instead of performing almost undetectable targeted attacks.
I agree and was curious why they picked it. I guess their reasoning is as good as any.
> Steem is a form of esteem, which means to prize or value. Steem is also a homophone for steam, which is frequently associated with power, and a step further, steam powered trains gave influence to English idioms, such as ‘this conversation is picking up steam.’ The associations with prizing, language and empowerment only felt right.
But there is already a very popular service called Steam, so I think I would have kept searching for another name, personally. No reason to risk confusion.