Deep Blue Sea

@nazmulahmednoyon
0 Followers
15 Following
139 Posts

Human Cells Outperform Quantum Computers. The researchers detected evidence of quantum superradiance within human cells. This phenomenon allows cells to process data billions of times faster than classical biochemical methods, even without a brain.

https://unionrayo.com/en/human-body-outperforms-quantum-computers/

#quantumcomputing
#FutureofComputing
#CellularIntelligence
#ScientificBreakthrough

Neither Artificial Intelligence nor Computers - Scientists Discover Human Brain Outperforms Technology in Quantum Processing

Because until now it was believed that quantum mechanics belonged to quantum computers that also require a specific temperature and conditions for it to work.

Unión Rayo EN

Intel's Trusted Execution Technology enables a dynamic root of trust, allowing for on-the-fly verification of system components rather than relying on trusting all components from the start of the boot process. Microsoft code triggers measurement of all components into the TPM. The system compares these measurements to ensure the integrity of the hypervisor, kernel, and critical binaries. This prevents attackers with UEFI exploits from persisting during early boot.

https://ytu.be/8V0wcqS22vc

BlueHat IL 2018 - David Weston - Windows: Hardening with Hardware

YouTube

"CSI" stands for "Channel State Information". The movement of fingers on a keyboard or touchscreen can create subtle variations in the Wi-Fi signal, which can be detected by nearby devices. This vulnerability has led to the development of new attack methods, such as WindTalker, which can be used to steal sensitive information from smartphones.

https://www.youtube.com/watch?v=ZJrTVU_eajE

CCS 2016 - When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals

YouTube
Researchers at Stanford University and Israeli Defense Research Group, Rafael, have developed a new technology, that have capability to gather the geolocation of Android phones by simply by measuring the battery usage of the phone over a certain time. Spies could fool a target user into downloading an application that uses PowerSpy in order to track victim's every move.

Solved! Onboard crushing issue in Ubuntu!

Just go to menu > preferences > onboard settings > keyboard > advanced > change "input event source" from Xinput to GTK.

#ubuntu #linuxmint #linux

Brave browser has a built-in hidden screenshot tool. Just press ctrl + space then hh

The video discusses video-based keystroke inference attack using a camera phone, with no pretraining, no keyboard knowledge, no local sensors, and no side-channels. The attack is based on a deep learning model that can analyze the subtle movements of a person's fingers and wrists to predict what keys they are pressing. The attack is effective even when the video is low-resolution or blurry. The attack could be used to steal passwords, credit card numbers.

https://ytu.be/i3OvbsonmA4

USENIX Security '23 - Towards a General Video-based Keystroke Inference Attack

YouTube

The researchers found that an attacker can infer a user's keystrokes by observing their avatar's hand movements in VR, even when the movements are noisy and inaccurate. By using a transformer-based architecture, the researchers were able to train accurate models for each task, even with limited training data.

http://www.youtube.com/watch?v=RKt39oy3o-Y

USENIX Security '24 - Can Virtual Reality Protect Users from Keystroke Inference Attacks?

YouTube

This video is about a new keystroke inference attack that uses the video feed of an online video call. The attack is able to predict what a person is typing by analyzing the small movements of their arms and shoulders. #cybersecurity

https://www.youtube.com/watch?v=UFOhM1E-UvQ

NDSS 2021 Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks

YouTube
This video is about a new type of attack that can be used to steal sensitive information from users of virtual reality (VR) systems. The attack uses a smartphone to record the sound of a user's keystrokes as they are typing on a virtual keyboard. The recorded sound is then analyzed to determine the keys that were pressed. https://www.youtube.com/watch?v=tNkaHmcIPAE
NDSS 2024 - Eavesdropping on Controller Acoustic Emanation for Keystroke Inference Attack in Virtual

YouTube