Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.
0349 8e1a 420



recently found out that pobeda (this old soviet watch brand i really like) produced a line of watches inexplicably packed with masonic occult symbolism and i am extremely here for it

y'all seen this? wild

Reposted frombwana bwana
4098 4277 420
Reposted fromteijakool teijakool viatgs tgs
1397 f6ee 420



Reposted fromsimonsayer simonsayer viazorax zorax
6675 6c81 420
Reposted frombaeren baeren viagruetze gruetze

Scientists Create DNA-Based Exploit of a Computer System

Archeron writes:

It seems that scientists at University of Washington in Seattle have managed to encode malware into genomic data, allowing them to gain full access to a computer being used to analyze the data. While this may be a highly contrived attack scenario, it does ask the question whether we pay sufficient attention to data-driven exploits, especially where the data is instrument-derived. What other systems could be vulnerable to a tampered raw data source? Perhaps audio and RF analysis systems?
MIT Technology Review reports: "To carry out the hack, researchers led by Tadayoshi Kohno and Luis Ceze encoded malicious software in a short stretch of DNA they purchased online. They then used it to gain 'full control' over a computer that tried to process the genetic data after it was read by a DNA sequencing machine. The researchers warn that hackers could one day use faked blood or spit samples to gain access to university computers, steal information from police forensics labs, or infect genome files shared by scientists. To make the malware, the team translated a simple computer command into a short stretch of 176 DNA letters, denoted as A, G, C, and T. After ordering copies of the DNA from a vendor for $89, they fed the strands to a sequencing machine, which read off the gene letters, storing them as binary digits, 0s and 1s. Yaniv Erlich, a geneticist and programmer who is chief scientific officer of MyHertige.com, a genealogy website, says the attack took advantage of a spill-over effect, when data that exceeds a storage buffer can be interpreted as a computer command. In this case, the command contacted a server controlled by Kohno's team, from which they took control of a computer in their lab they were using to analyze the DNA file." You can read their paper here.
Reposted fromdarksideofthemoon darksideofthemoon
4919 2f0d
old skool
Reposted fromnazarena nazarena viaDagarhen Dagarhen
8410 256c 420
Reposted fromsohryu sohryu viaDagarhen Dagarhen
2609 8c95 420
Karygodne Krakoskie Memy
Reposted fromtfu tfu viaqbshtall qbshtall
2435 a2d1 420
Reposted fromzciach zciach viaDagarhen Dagarhen
7106 e6ae 420
Reposted fromTenSigis TenSigis viaqbshtall qbshtall
4589 f64d 420
Reposted frommrgn mrgn
In the 1985 Terry Gilliam dystopian film, Brazil, there is a short scene wherein the protagonist, Sam, phones into the “Central Services” to get his heating and air conditioning fixed. He finds his requests dispassionately and politely declined. Amusingly, renegade repairman Archibald Tuttle intercepts the request and infiltrates Sam’s apartment in order to repair his air conditioning. This, of course, is a dangerous and highly illegal endeavor- “Central Services” eventually seizes Sam’s apartment because of the unauthorized repairs. Apple would be proud. In Brazil, Gilliam frames Tuttle, the third party repairman, as a literal subversive. To me, the third party repairmen who fix cracked IPhone screens are probably not that far off Gilliam’s Archibald Tuttle.
Reading cyberpunk as a guide to surviving hyper consumerism - Cyborgology
Reposted fromwonko wonko viagingerglue gingerglue
3338 dd16 420
Reposted byDagarhenKillMysellfpdg
3335 14d0 420
Reposted byDagarhen Dagarhen
3334 2f14 420
0286 2f06 420
Reposted fromniemadokaduciec niemadokaduciec
Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!