1:22 / 16:17
1:22 / 16:17
A free new tool in the form of a quick online search allows people to check whether any of their passwords have been hacked.
— If you’ve ever wondered if your passwords have been involved in a data breach, there’s now an easy way to find out. A digital security expert in Australia just created a tool in the form of a quick online search that allows people to check whether any of their passwords have been some of the roughly 320 million already compromised thus far.
Troy Hunt, founder of Have I Been Pwned — the website through which the Pwned Passwords service is freely offered — said in a blog post introducing the new tool that the idea is about giving people the means to verify suspicions:
“The point of the web-based service is so that people who have been guilty of using sloppy passwords have a means of independent verification that it’s not one they should be using any more. Mind you, someone could actually have an exceptionally good password but if the website stored it in plain text then leaked it, that password has still been ‘burned.’”
The Have I Been Pwned site, launched in 2015, offers a similar service for email accounts and usernames, though it requires users to sort through individual data breaches. The Pwned Passwords feature, in contrast, allows people to search for their passwords directly.
“As well as people checking passwords they themselves may have used, I’m envisaging more tech-savvy people using this service to demonstrate a point to friends, relatives and co-workers: ‘you see, this password has been breached before, don’t use it’.”
While he notes on the Pwned Passwords page that users shouldn’t search for passwords they currently use, Hunt says that point should really be a no-brainer.
“It goes without saying (although I say it anyway on that page), but don’t enter a password you currently use into any third-party service like this!” he writes. “I don’t explicitly log them and I’m a trustworthy guy but yeah, don’t.”
No wonder the CIA does not like Wikileaks. It keeps exposing what that rogue agency is doing so the world can see what they are up to. (See previous post).
WikiLeaks has released a trove of data belong to the American intelligence agency CIA (Central Intelligence Agency) – The latest batch shows how CIA uses five different malware to target unsuspecting users.
These malware are called HammerLoss, Regin, HTTPBrowser, NfLog, and Gamker – The documents also show how CIA used Raytheon Blackbird Technologies, a contractor for the Remote Development Branch (RDB) of the CIA.
The nightmarish revelations from Julian Assange are from over, and the latest batch of documents after the release of Vault 7 has startling new information about the CIA’s ability of hacking and infiltrating its targets. The data includes reports from experts about the way various malware programs owned and used by the CIA are used and the way these programs function. In total, there are five files.
This new batch of files is dubbed as UCL/Raytheon and contains documents maintained by Raytheon Blackbird Technologies. The firm is a contractor for the Remote Development Branch (RDB) of the CIA and believed to be its Technology Scout.
This breakthrough in designing an energy-efficient computer chip could allow cell phones to run powerful artificial intelligence systems.
Many people don’t realize that some of the most significant technological breakthroughs in recent years, like voice and facial recognition software, autonomous driving systems, and image recognition software, have not actually been designed by humans, but by computers. All of these advanced software programs have been the result of neural networks, popularly referred to as “deep learning.”
Neural networks are modeled loosely after the human brain and learn like them in similar ways by processing large amounts of data, along with algorithms fed to the networks by programmers. A neural net is then able to teach itself to perform tasks by analyzing the training data. “You essentially have software writing software,” says Jen-Hsun Huang, CEO of graphics processing leader Nvidia.
Research in the area of deep learning is advancing so quickly that neural networks are now able to dream and can even communicate with each other using inhuman cryptographic language indecipherable to humans and other computers. The only drawback to the technology is that the networks require a lot of memory and power to operate, but MIT associate professor of electrical engineering and computer science Vivienne Sze and her colleagues have been working on a solution that could enable the powerful software to operate on cell phones.
Sze and her team made a breakthrough last year in designing an energy-efficient computer chip that could allow mobile devices to run powerful artificial intelligence systems. The researchers have since taken an alternate approach to their research by designing an array of new techniques to make neural nets more energy efficient.
“First, they developed an analytic method that can determine how much power a neural network will consume when run on a particular type of hardware. Then they used the method to evaluate new techniques for paring down neural networks so that they’ll run more efficiently on handheld devices,” MIT News reports.
The team will be presenting a paper on their research next week at the Computer Vision and Pattern Recognition Conference in Honolulu. There, they will describe their methods for reducing neural networks’ power consumption by as much as 43 percent over the best previous method and 73 percent over the standard implementation with the use of “energy-aware pruning.”
According to Hartwig Adam, the team lead for mobile vision at Google:
Recently, much activity in the deep-learning community has been directed toward development of efficient neural-network architectures for computationally constrained platforms. However, most of this research is focused on either reducing model size or computation, while for smartphones and many other devices energy consumption is of utmost importance because of battery usage and heat restrictions.
This work is taking an innovative approach to CNN [convolutional neural net] architecture optimization that is directly guided by minimization of power consumption using a sophisticated new energy estimation tool, and it demonstrates large performance gains over computation-focused methods. I hope other researchers in the field will follow suit and adopt this general methodology to neural-network-model architecture design.
Elon Musk is no stranger to futurecasting a foreboding dystopia ahead for mankind, as we noted recently. But during a speech he gave today at the National Governors Association Summer Meeting in Rhode Island, Musk turned up the future-fearmongery amplifier to ’11’.
As a reminder, in the past, when he was asked about whether humans are living inside a computer simulation, Musk made headlines last year by saying he thinks the chances are one in billions that we aren’t.
“The strongest argument for us probably being in a simulation I think is the following: 40 years ago we had Pong – two rectangles and a dot,” Musk stated.
“That’s where we were. Now 40 years later we have photorealistic, 3D simulations with millions of people playing simultaneously and it’s getting better every year. And soon we’ll have virtual reality, we’ll have augmented reality. If you assume any rate of improvement at all, then the games will become indistinguishable from reality, just indistinguishable.”
Here Musk is referring to the exponential growth of technology, the lynchpin of the Singularity theory. If in 40 years we’ve gone from the two-dimensional pong to the cusp of augmented and virtual reality, imagine where we’ll be in another forty, or a hundred, or 400. And that is where he began today…
But today, Musk discussed a broad range of topics from energy sources in the future…
“It’s inevitable,” Musk said, speaking of shift to sustainable energy. “But it matters if it happens sooner or later.”
As for those pushing some other type of fusion, Musk notes that the sun is a giant fusion reactor in the sky. “It’s really reliable,” he said. “It comes up every day. if it doesn’t we’ve got (other) problems).”
To Tesla’s share price:
Musk said he has been on record several times as saying its stock price “is higher than we have any right to deserve” especially based on current and past performance.
“The stock price obviously reflects a lot of optimism on where we will be in the future,” he said. “Those expectations sometimes get out of control. I hate disappointing people, I am trying really hard to meet those expectations.”
Musk added that he won’t be selling any stock “unless I have to for taxes,” and said “I’m going down with the ship… I’ll be the last [to sell].”
Musk addressed government regulation and incentives:
“It sure is important to get the rules right,” Musk said. “Regulations are immortal. They never die unless somebody actually goes and kills them. A lot of times regulations can be put in place for all the right reasons but nobody goes back and kills them because they no longer make sense.”
Musk also focused on the importance of incentives, saying whatever societies incentivize tends to be what happens. “It’s economics 101,” he said.
And what drives him:
“I want to be able to think about the future and feel good about that, to dream what we can to have the future be as good as possible. To be inspired by what is likely to happen and to look forward to the next day. How do we make sure things are great? That’s the underlying principle behind Tesla and SpaceX.”
Within 20 years, he said driving a car will be like having a horse (i.e. rare and totally optional). “There will not be a steering wheel.”
“There will be people that will have non-autonomous cars, like people have horses,” he said.
“It just would be unusual to use that as a mode of transport.”
But what started off as the latest sales pitch for electric cars quickly devolved into a bizarre rant that among other things, touched on Elon Musk’s gloomy, apocalyptic vision of how the world could end… (via ReCode)
Musk called on the government to proactively regulate artificial intelligence before things advance too far.
“Until people see robots going down the street killing people, they don’t know how to react because it seems so ethereal,” he said.
“AI is a rare case where I think we need to be proactive in regulation instead of reactive. Because I think by the time we are reactive in AI regulation, it’s too late.”
“Normally the way regulations are set up is a while bunch of bad things happen, there’s a public outcry, and after many years a regulatory agency is set up to regulate that industry,” he continued.
“It takes forever. That, in the past, has been bad but not something which represented a fundamental risk to the existence of civilization. AI is a fundamental risk to the existence of human civilization.”
Musk has been concerned about AI for years, and he’s working on technology that would connect the human brain to the computer software meant to mimic it.
Full interview below (Musk begins talking around 42 minutes in)…
By Joe Joseph
Machine learning just entered the realm of cyber warfare with secret A.I. sentinels that monitor networks to ensure active/real-time cyber combat against its foes.
“As CERN goes, so does the rest of the world”? so they say…
Delivered by The Daily Sheeple
With permission from
June 9, 2017Beijing.
Unproven allegations by U.S. security agencies that the Russian government ‘hacked the U.S. presidential election’ are a classic case of the criminal hiding behind the cloak of the accuser.
Documents from the U.S. NSA (National Security Agency) unveiled by Edward Snowden show that whole countries, not just a number of sensitive computers, have been hacked by the NSA.
In the case of China, for example, it is hardly an exaggeration that a whole nation and its people have been hacked. Here’s a partial list of the illegal intrusions by the Washington-based spooks:
1. The undersea cable through winch internet data enters and leaves Hong Kong was physically cut into by the NSA, giving it access to all foreign communication of the city.
2. Hundreds of millions of Chinese people’s SMS text messages were stolen by the NSA from the system of China Mobile, the world’s largest mobile phone system
3. The phone of China’s then-president Hu Jing Tao was tapped and his conversations monitored.
4. China’s Tsiinghua university’s ”backbone system’ through which communication of important research labs throughout China passes was hacked. Some of those labs also perform sensitive military-related research.
5. The server computers manufactured by the leading Chinese company Huaweii – which are used in China and all over the world – were hacked by the NSA, allowing it to capture the large amounts of data passing through the servers wherever they are used.
Finally, the U.S. government, and the NSA, have never apologized nor stated that they will stop hacking China and its people.. It’s hard to take allegations of hacking against Russia, China, or others seriously when they emanate from such sources.