recentpopularlog in

WIRED

« earlier   
The hard math behind Bitcoin's global warming problem | WIRED
Writing for Grist, Eric Holthaus calculated that by July 2019, the Bitcoin peer-to-peer network—remember BitTorrent? Like that—would require more electricity than all of the United States. And by November of 2020, it’d use more electricity than the entire world does today. Michael Taylor, professor of computer science and engineering and electrical engineering at the UW, is quoted.
WIRED  !UWitM  2017  Taylor.Michael  College:Engineering  Allen.School  Department:Electrical.Engineering 
2 days ago by uwnews
The Mirai Botnet Was Part of a College Student Minecraft Scheme | WIRED
"Targeting cheap electronics with poor security, Mirai amassed much of its strength by infecting devices in Southeast Asia and South America; the four main countries with Mirai infections were Brazil, Colombia, Vietnam, and China, according to researchers." "The power of the botnet was made even more clear as the fall unfolded and Mirai attacks targeted the African country of Liberia, effectively cutting off the entire country from the internet."
minecraft  wired  botnet  security 
3 days ago by WBedutech
Sempre più traffico su DuckDuckGo, il motore di ricerca che non traccia gli utenti - Wired
DuckDuckGo, il motore di ricerca che protegge la privacy dei suoi utenti, sta registrando ottimi numeri
wired 
4 days ago by thx1138
DuckDuckGo, Start Page, Ixquick: il boom dei motori di ricerca alternativi - Wired
Il Datagate ha avuto come effetto collaterale quello di moltiplicare l'utenza di motori di ricerca alternativi, che promettono di tutelare la privacy
wired 
4 days ago by thx1138
DuckDuckGo: what is it and how does it work? | WIRED UK
Hide your IP address, search history and more using the anonymous search engine, available on Tor
wired 
4 days ago by thx1138
The US flirts with geoengineering to stymie climate change | WIRED
The thing about humans is, for all our faults, we’re actually pretty good at fixing things we know we’ve screwed up. Lead in gasoline? Bad idea — let’s ban lead in gasoline. Running out of oil to make gasoline? Let’s switch to electric vehicles. Kelly Wanser, principal director of the Marine Cloud Brightening Project at the UW, is quoted.
JISAO  !UWitM  2017  College:Environment  WIRED  Wanser.Kelly 
6 days ago by uwnews
How the Mimikatz Hacker Tool Stole the World's Passwords | WIRED
Just a few minutes earlier, the then 25-year-old French programmer had made a quick trip to the front desk to complain about the room's internet connection. He had arrived two days ahead of a talk he was scheduled to give at a nearby security conference and found that there was no Wi-Fi, and the ethernet jack wasn't working. Downstairs, one of the hotel's staff insisted he wait while a technician was sent up to fix it. Delpy refused, and went back to wait in the room instead.
cybersecurity  mimikatz  wired  russia 
9 days ago by bwiese
How One Woman's Digital Life Was Weaponized Against Her | WIRED
"Cyber Civil Rights Legal Project" "“You can tell people, ‘Don’t do anything that you wouldn’t want to have go public,’ ” McDonald says. “But what kind of life is that?”"

"The lawyers called Andreas Kaltsounis, a cyberforensics expert who used to work with the FBI and the Department of Defense. He explained to the jury how Tor networks and IP addresses function. He then presented a map showing that many of the seemingly separate accounts from which the Allens had received anonymous harassment were actually linked by overlapping IP addresses. One of the linked accounts was the Facebook page for “Jennifer Jones,” the account that used a picture of a tortoise. It could have been, as Zonis argued, an account that Steven, or some unknown person, created. But the lawyers were prepared. One day, months before the trial, as Van Engelen searched painstakingly through IP addresses associated with logins on the Jones account, she made a discovery: Among the many addresses, there had been one apparent slipup, a login not through Tor but from the Zonises’ home IP address. When she found it Van Engelen ran into Bateman’s office, yelling: “We’ve got him!” It would have been unheard of for someone to fake a login using Zonis’ IP address, Kaltsounis told the jury, because of a safeguard called the three-way handshake that requires hosts to establish a connection with the IP address belonging to the account before any information can be sent."
online-harassment  cyberforensics  cyberharassment  Wired 
10 days ago by jschneider

Copy this bookmark:





to read