(no subject)

Jul. 10th, 2025 08:37 pm
ufm: (Default)
[personal profile] ufm
Andrii KuznietsovAndrii Kuznietsov wrote the following post Thu, 10 Jul 2025 18:45:00 +0300
📱🥷 Безінтернетний месенджер #Bitchat від Джека Дорсі провалив перевірку безпеки.

Дослідники заявили, що Bitchat містить критичні вразливості, які ставлять під загрозу конфіденційність даних.

https://highload.tech/uk/bezinternetnyj-mesendzher-bitchat-vid-dzheka-dorsi-provalyv-perevirku-bezpeky/


Source:https://twinkle.lol/display/37fb69c8-e811-44db-85a4-a16ac86d643b

(no subject)

Jul. 8th, 2025 09:00 pm

(no subject)

Jul. 4th, 2025 07:39 pm
ufm: (Default)
[personal profile] ufm
Jim P.Jim P. wrote the following post Fri, 04 Jul 2025 16:15:24 +0300
Screenshot from the movie Independence Day (1996) showing a computer screen containing a window that reads "Uploading Virus" with a skull and crossbones logo and a nearly complete progress bar.
Happy Intergalactic Infosec Day, to all those who celebrate.

#InfoSec #Movies #ID4


Source:https://twinkle.lol/display/e497c24c-caa1-481b-8e9b-6874f1549b93

(no subject)

Jul. 4th, 2025 06:38 am
ufm: (Default)
[personal profile] ufm
Who Let The Dogs Out 🐾Who Let The Dogs Out 🐾 wrote the following post Fri, 04 Jul 2025 04:34:26 +0300
I made my VM think it has a CPU fan | mindless-area

#virtualization #bios #cooler #fan

https://wbenny.github.io/2025/06/29/i-made-my-vm-think-it-has-a-cpu-fan.html

> ...so the malware would finally shut up and run

Some malware samples are known to do various checks to determine if they are running in a virtual machine. One of the common checks is to look for the presence of certain hardware components that are typically not emulated in virtualized environments. One such component is the CPU fan. One of the observed ways malware checks for the presence of a CPU fan is by looking for the Win32_Fan class in WMI:

`wmic path Win32_Fan get *`


Source:https://twinkle.lol/display/da5a47b4-8047-4615-a3a0-0dd2d9c4e015

про языки

Jun. 30th, 2025 05:16 pm
juan_gandhi: (Default)
[personal profile] juan_gandhi

Вчера на телефоне в гугл-ньюзах был кликбейт - "какой язык на земле самый сложный?!"

какой-какой, думаю, навахо, конечно, по-ихнему diné. Там месяц уйдёт чтобы освоить произношение нескольких согласных, для начала. tl с глоттал стопом. Ну как в слове Seattle, которое американцы произносят как "сядл".

Пошёл по линку. Да, он. Diné. 

(no subject)

Jun. 30th, 2025 10:18 pm
ufm: (Default)
[personal profile] ufm
Всё таки #mikrotik иногда делает странные железки. Ну ладно, Rose Data Server зелёного цвета - то такое. Наверное шутка юмора такая. Но 4-х портовый 100Г свич в outdoor исполнении вызывает у меня искреннее недоумение.

Источник:https://twinkle.lol/display/04f51f8a-6bd7-46ef-9f52-7fafe8ca10f0

(no subject)

Jun. 30th, 2025 09:55 pm
ufm: (Default)
[personal profile] ufm
Andrii KuznietsovAndrii Kuznietsov wrote the following post Mon, 30 Jun 2025 20:45:05 +0300
Image/photo
🤖 All #AI Tools - сайт-каталог, де зібрано понад 2450 актуальних АІ-сервісів: від генераторів картинок до помічників для кодингу, маркетингу та робочих завдань. Сайт відсортований за категоріями, є вибране від редакторів і блог з оглядами - зручно швидко знайти інструмент під конкретне завдання.
https://www.allaitools.dev/categories


Source:https://twinkle.lol/display/583c91a1-47de-4f68-bcec-e9bef6c93c9c

(no subject)

Jun. 30th, 2025 05:20 pm
ufm: (Default)
[personal profile] ufm
xkcdxkcd wrote the following post Mon, 30 Jun 2025 07:00:00 +0300

Dehumidifier

🔗 Dehumidifier

It's important for devices to have internet connectivity so the manufacturer can patch remote exploits.


Source:https://twinkle.lol/display/a251eb1c-0b31-466b-a715-ce3aefe35500

(no subject)

Jun. 30th, 2025 03:32 pm
ufm: (Default)
[personal profile] ufm
Schneier on SecuritySchneier on Security wrote the following post Mon, 30 Jun 2025 14:05:36 +0300

How Cybersecurity Fears Affect Confidence in Voting Systems

American democracy runs on trust, and that trust is cracking.

Nearly half of Americans, both Democrats and Republicans, question whether
elections are conducted fairly. Some voters accept election results only
when their side wins. The problem isn’t just political
polarization—it’s a creeping erosion of trust in the machinery of
democracy itself.

Commentators blame ideological tribalism, misinformation campaigns and
partisan echo chambers for this crisis of trust. But these explanations
miss a critical piece of the puzzle: a growing unease with the digital
infrastructure that now underpins nearly every aspect of how Americans
vote...
https://news.gallup.com/poll/651185/partisan-split-election-integrity-gets-even-wider.aspx
https://worldjusticeproject.org/our-work/research-and-data/rule-law-united-states

https://www.pewresearch.org/politics/2018/10/29/elections-in-america-concerns-over-security-divisions-over-expanding-access-to-voting/
https://www.nytimes.com/2024/01/09/business/media/election-disinformation-2024.html
https://www.nytimes.com/2022/06/15/opinion/social-media-polarization-democracy.html
View article
🔗 How Cybersecurity Fears Affect Confidence in Voting Systems

American democracy runs on trust, and that trust is cracking.

Nearly half of Americans, both Democrats and Republicans, question whether elections are conducted fairly. Some voters accept election results only when their side wins. The problem isn’t just political polarization—it’s a creeping erosion of trust in the machinery of democracy itself.

Commentators blame ideological tribalism, misinformation campaigns and partisan echo chambers for this crisis of trust. But these explanations miss a critical piece of the puzzle: a growing unease with the digital infrastructure that now underpins nearly every aspect of how Americans vote.

The digital transformation of American elections has been swift and sweeping. Just two decades ago, most people voted using mechanical levers or punch cards. Today, over 95% of ballots are counted electronically. Digital systems have replaced poll books, taken over voter identity verification processes and are integrated into registration, counting, auditing and voting systems.

This technological leap has made voting more accessible and efficient, and sometimes more secure. But these new systems are also more complex. And that complexity plays into the hands of those looking to undermine democracy.

In recent years, authoritarian regimes have refined a chillingly effective strategy to chip away at Americans’ faith in democracy by relentlessly sowing doubt about the tools U.S. states use to conduct elections. It’s a sustained campaign to fracture civic faith and make Americans believe that democracy is rigged, especially when their side loses.

This is not cyberwar in the traditional sense. There’s no evidence that anyone has managed to break into voting machines and alter votes. But cyberattacks on election systems don’t need to succeed to have an effect. Even a single failed intrusion, magnified by sensational headlines and political echo chambers, is enough to shake public trust. By feeding into existing anxiety about the complexity and opacity of digital systems, adversaries create fertile ground for disinformation and conspiracy theories.

Testing cyber fears


To test this dynamic, we launched a study to uncover precisely how cyberattacks corroded trust in the vote during the 2024 U.S. presidential race. We surveyed more than 3,000 voters before and after election day, testing them using a series of fictional but highly realistic breaking news reports depicting cyberattacks against critical infrastructure. We randomly assigned participants to watch different types of news reports: some depicting cyberattacks on election systems, others on unrelated infrastructure such as the power grid, and a third, neutral control group.

The results, which are under peer review, were both striking and sobering. Mere exposure to reports of cyberattacks undermined trust in the electoral process—regardless of partisanship. Voters who supported the losing candidate experienced the greatest drop in trust, with two-thirds of Democratic voters showing heightened skepticism toward the election results.

But winners too showed diminished confidence. Even though most Republican voters, buoyed by their victory, accepted the overall security of the election, the majority of those who viewed news reports about cyberattacks remained suspicious.

The attacks didn’t even have to be related to the election. Even cyberattacks against critical infrastructure such as utilities had spillover effects. Voters seemed to extrapolate: “If the power grid can be hacked, why should I believe that voting machines are secure?”

Strikingly, voters who used digital machines to cast their ballots were the most rattled. For this group of people, belief in the accuracy of the vote count fell by nearly twice as much as that of voters who cast their ballots by mail and who didn’t use any technology. Their firsthand experience with the sorts of systems being portrayed as vulnerable personalized the threat.

It’s not hard to see why. When you’ve just used a touchscreen to vote, and then you see a news report about a digital system being breached, the leap in logic isn’t far.

Our data suggests that in a digital society, perceptions of trust—and distrust—are fluid, contagious and easily activated. The cyber domain isn’t just about networks and code. It’s also about emotions: fear, vulnerability and uncertainty.

Firewall of trust


Does this mean we should scrap electronic voting machines? Not necessarily.

Every election system, digital or analog, has flaws. And in many respects, today’s high-tech systems have solved the problems of the past with voter-verifiable paper ballots. Modern voting machines reduce human error, increase accessibility and speed up the vote count. No one misses the hanging chads of 2000.

But technology, no matter how advanced, cannot instill legitimacy on its own. It must be paired with something harder to code: public trust. In an environment where foreign adversaries amplify every flaw, cyberattacks can trigger spirals of suspicion. It is no longer enough for elections to be secure – voters must also perceive them to be secure.

That’s why public education surrounding elections is now as vital to election security as firewalls and encrypted networks. It’s vital that voters understand how elections are run, how they’re protected and how failures are caught and corrected. Election officials, civil society groups and researchers can teach how audits work, host open-source verification demonstrations and ensure that high-tech electoral processes are comprehensible to voters.

We believe this is an essential investment in democratic resilience. But it needs to be proactive, not reactive. By the time the doubt takes hold, it’s already too late.

Just as crucially, we are convinced that it’s time to rethink the very nature of cyber threats. People often imagine them in military terms. But that framework misses the true power of these threats. The danger of cyberattacks is not only that they can destroy infrastructure or steal classified secrets, but that they chip away at societal cohesion, sow anxiety and fray citizens’ confidence in democratic institutions. These attacks erode the very idea of truth itself by making people doubt that anything can be trusted.

If trust is the target, then we believe that elected officials should start to treat trust as a national asset: something to be built, renewed and defended. Because in the end, elections aren’t just about votes being counted—they’re about people believing that those votes count.

And in that belief lies the true firewall of democracy.

This essay was written with Ryan Shandler and Anthony J. DeMattee, and originally appeared in The Conversation.


Source:https://twinkle.lol/display/575dab1d-7333-405e-afef-fa7a8e4f0971

(no subject)

Jun. 29th, 2025 01:33 pm
ufm: (Default)
[personal profile] ufm
Exler.RUExler.RU была создана публикация Sun, 29 Jun 2025 12:00:00 +0300

Девушки в окнах

🔗 Девушки в окнах

Попалась тут в ленте вот эта картинка, и я еще подумал - классно нарисовано!

6860fc97e648a.jpegОднако выяснилось, что это вовсе не нарисовано. Это фотография 1960 года "Девушки в окнах" авторства фотографа Ормонда Джильи. Нашел историю ее создания (англ.)

Ормонд Джильи был молодым фотографом в 1960 году. У него была скромная студия в Нью-Йорке на 68-й улице, и он часто смотрел в окно на старое заброшенное здание, которое стояло пустым. Этот образ запечатлелся в его памяти, и он представлял себе в своих мечтах: «А что, если бы во всех окнах были красивые женщины?». Это повторяющийся сон подтолкнул Гигли к попытке воплотить свое видение в жизнь.

Он получил уведомление о том, что здание будет снесено. У него не было денег на профессиональных моделей, а также бюджета на фотографию, которая не имела спонсоров. Поэтому он связался с прорабом здания и убедил его выделить ему два часа для работы и очистить окна. Он обратился в модельное агентство, с которым раньше сотрудничал, и попросил моделей вызваться добровольцами для участия в его «мечте». Они должны были одеться по своему усмотрению и прийти в обеденный перерыв.

Изображение / фотография

В здании не было ни электричества, ни газа, на тротуаре была огромная дыра. Ормонд связался с городскими властями и попросил разрешение на то, чтобы Rolls Royce был припаркован на тротуаре над дырой на время, необходимое для подготовки к съемке. Затем он расставил моделей, включая свою жену, стараясь гармонично сочетать их наряды в 30 окнах. Некоторые были достаточно смелы, чтобы встать на подоконник. С тремя дополнительными моделями — двумя на улице и одной на первом этаже — сцена была готова.

Ормонд высунулся на пожарную лестницу своей студии и снимал с помощью широкоугольного объектива. Это был шанс воплотить его мечту в жизнь.

Ормонд Джильи имел богатую карьеру и создал великолепные фотографии, работал со знаменитостями, создавал рекламные кампании продуктов, промо-изображения для кинофильмов, а его фотографии в течение 30 лет широко публиковались во многих ведущих журналах. Однако «Девушки в окнах» достигли того, чего достигает лишь ничтожно малая часть фотографий — они стали иконой. Это фотография, чье художественное мастерство, воздействие и яркость превзошли время. Так же, как Ормонд, наверное, чувствовал эту сильную связь с моделями, местом съемки и своей мечтой, мы чувствуем связь с духом, свободой и радостью этой фотографии. Хотя Ормонд больше нет с нами, «Девушки в окнах» всегда будут жить своей жизнью.


Источник:https://twinkle.lol/display/d10202da-385d-4e7e-a394-168c9a0d87cd

(no subject)

Jun. 29th, 2025 10:50 am
ufm: (Default)
[personal profile] ufm
КМБ-4КМБ-4 была создана публикация Sat, 28 Jun 2025 14:24:11 +0300
Внимание, анекдот

Летит экипаж.
Тут командир задаёт загадку молодому:
- Я пойду пока посру, а ты подумай, уменьшится ли за это время общий вес самолета?
Ну молодой сидит, размышляет «Так как туалетная система закрыта, то говно никуда не денется, а значит вес останется прежним». Так и доложил командиру.
А тот и отвечает:
- Дурак ты, молодой! Конечно уменьшится, ведь пока я ходил, самолёт сжёг топливо... А ты всё о говне думаешь....


Источник:https://twinkle.lol/display/83474932-43b7-4baf-9661-c4139edfd4d6

утро в нашей деревне

Jun. 28th, 2025 06:28 pm
juan_gandhi: (Default)
[personal profile] juan_gandhi


Ну вы поняли, что это паутина посередине?

сяу

Jun. 28th, 2025 03:23 pm
juan_gandhi: (Default)
[personal profile] juan_gandhi
Что Леопольд фон Захер-Мазох тоже из Львiова родом. Вот же ж святое место! 

(no subject)

Jun. 26th, 2025 11:48 pm

Profile

natfugl: (Default)
natfugl

July 2025

M T W T F S S
 1234 56
78910111213
14151617181920
21222324252627
28293031   

Style Credit

Expand Cut Tags

No cut tags
Page generated Jul. 10th, 2025 07:07 pm
Powered by Dreamwidth Studios