gaetanoz

48 Flips | 4 Magazines | 1 Like | 27 Following | 34 Followers | @gaetanoz | Keep up with gaetanoz on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “gaetanoz”

Unknown Bitcoin Creator Satoshi Nakamoto Might Be Writing a Book

Is the unknown creator of Bitcoin writing a book about it?<p>That could be concluded from a cryptic message posted Friday at a website possibly linked …

Bitcoin

Zcash: life on the crypto roller coaster

Suppressed in Japan. Championed in New York. Accused of betraying the billion-dollar community he created with an arcane and byzantine ritual, while accidentally solving — maybe — a transnational clandestine mining mystery. All this while leading the rollout of some of the world’s most cutting-edge …

Bitcoin

The Privacy Scandal That Should Be Bigger Than Cambridge Analytica

Wireless carriers are sharing your real-time location with shady third parties—and a bug lets anyone use that data to track you.<p>Stop me if you’ve …

A Digital Security Trainer’s Lessons from #Efail

At around 2 AM on the morning of Monday, May 14, I was just starting to close my eyes and drift off to sleep when my phone buzzed a few times. I …

Ex-Google Engineer Introduces Blockchain Core System for Banks

Researchers have built the first ransomware for smart thermostats

Security experts have constructed the first ransomware for smart thermostats, according to Motherboard.<p>On August 6, at cybersecurity conference Def Con, hackers Andrew Tierney and Ken Monroe revealed the malware that infected a Linux-based internet connected thermostat. The white hat hackers said …

Facebook’s new DeepText AI categorizes everything you write

If Facebook knows what your status update is about, it can show it to people who care about that topic. If it understands the difference between “I just got out of the taxi” and “I need a ride” messages, it can ask if you want an Uber. If it detects that you’re trying to sell something in a status …

deeptext

Pirate Bay co-founder builds a perpetual piracy machine

Pirate Pay co-founder Peter Sunde has created a device that'll duplicate a single MP3 in perpetuity, as long as it's plugged in. Sunde, who spent five months in jail for his involvement with the torrenting site, has built Kopimashin, a Raspberry Pi with a screen that creates 100 copies of <i>Crazy</i> by …

How Banks Use Machine Learning to Know a Crook's Using Your Credit Card Details

You’re sitting at home minding your own business when you get a call from your credit card’s fraud detection unit asking if you’ve just made a …

Machine Learning

“There will be 1 billion digital nomads by 2035”

I did a presentation on the future of digital nomads (and remote workers) in the next 20 years. I used public data to show actual social and …

15 Big Data Analysis Platforms, Databases/Data Warehouses and Tools

Today, organizations face a lot of difficulty in managing data, because of the sheer size of datasets. It’s coming from so many different mediums, be …

How Uber Uses Spark and Hadoop to Optimize Customer Experience

If you’ve ever used Uber, you’re aware of how ridiculously simple the process is. You press a button, a car shows up, you go for a ride, and you …

Ubiquitous Computing

Could Target Have Prevented Its Security Breach?

How Target Blew It<p>Missed Alarms and 40 Million Stolen Credit Card Numbers<p>Businessweek<p>Less than a year before the Thanksgiving security breach in which credit-card info for 40 million shoppers was stolen en masse, Target bumped up its security staff and brought in software from a top-notch firm, …

The Complex Science of Cyber Defense

Traditionally, cyber security research has focused on technical solutions to specific threats — for example, how to filter spam or protect PCs and mobile devices against the latest malware. This approach has greatly enhanced our ability to defend information systems against attack. Widespread use …

Cyber Security Depends on Education

We’re facing an eyebrow-raising talent shortfall in cyber security. Consider the findings of a recent inquiry by the UK’s National Audit Office. Its report stressed not only that the current pool of security-educated graduates and practitioners falls far short of demand, but also that “it could …

5 Russian-Made Surveillance Technologies Used in the West

We all know surveillance is big in Putin's Russia. What you may not know is that Russia's surveillance tech is being used all over – even here in the …

Biometric Database of All Adult Americans Hidden in Immigration Reform

The immigration reform measure the Senate began debating yesterday would create a national biometric database of virtually every adult in the U.S., …

Nyet! Now Russia Won't Sell Badass Missile to Syria

American pilots can officially exhale. If they're called upon to enforce a no-fly zone over Syria, they won't have to outmaneuver one of the most …

Cities and their millionaires

<b>Which city has the most millionaires?</b><p>MORE millionaires live in Tokyo than in any other city, according to a new report from WealthInsight, a …

Coming Soon: Your Personal Flying Car

It's 2013. Where's my flying car? Answer: about eight years away.<p>Terrafugia is a Massachusetts company previously best known for the Transition, …

Is Eye Tracking a Privacy-Invading Technology?

Eye-tracking technology has been in the news lately, thanks to rumors indicating that it would be included in the new Samsung Galaxy S4. As it turned …

Pentagon Lifts Veil on 7 New Obscure Chinese Weapons | WIRED

Two new models of stealthy jet fighter. A new(ish) aircraft carrier. Separate ballistic missiles for targeting orbital satellites and ships at sea. A …

Easter Cryptogram

Reading Time: 1 minute<p>Here is the puzzle as originally presented:<p>Happy Easter to those who celebrate, and a happy Sunday all around. After the annual …

The 10 best real-life spies – in pictures

La «nonna» hacker ruba i soldi dalla carta di credito di un operaio

CRIMINI INFORMATICI<p>Nonostante l'età anagrafica si è rivelata un asso dell'informatica e del furto: dal Veneto era riuscita a decodificare la carta di …

Iterations: How Five Real Economists Think About Bitcoin’s Future

<b>Editor’s Note:</b> <i>Semil Shah is a contributor to</i> TechCrunch<i>. You can follow him on Twitter at @semil.</i><p>There isn’t just a bubble in the Bitcoin economy, there’s a bubble in the number of posts about Bitcoin. I’ll pile on, even after this week’s mini-crash, but with a twist. A few weeks ago, I <b>wrote some</b> …

This is how astronauts sleep in space (video)

Recent scientific breakthroughs by NASA and SpaceX have increased the public’s thirst for knowledge about the stars and the science of space. Rocket launches and landings get a lot of coverage, but what about some of the everyday activities happening in space?<p>Canadian astronaut Chris Hadfield, a …

English - Global

Latest posts<p>Pen Test Partners demonstrates how to send vessels off-course or even onto a path to collision — fairly easily.<p>Categories: Cloud …