Skip to main content

Posts

Showing posts with the label Security

Featured Post

The Economics of Autonomy

In ancient legend, there is a Creation story: in contemporary times, it is known as the first book of Moses called the book of Genesis. When God IS creating the world, Genesis (KJV) states, “And God said, Let there be light: and there was light” (Genesis 1:3). According to legend, the 1st great Prophet, named Isaiah, told his faith to his friends, his people, and his enemies. Isaiah wrote, “Behold, God is my salvation; I will trust, and not be afraid: for the LORD JEHOVAH is my strength and my song; he also is become my salvation” (Isaiah 12:2) A man called the Christ was crucified, then according to Roman Empire record, died, but according to Christian legend, rose again. In Christian tradition, Jesus the Christ stated Christians should conclude our prayers to God, our Father, this way: “And lead us not into temptation, but deliver us from evil: For thine is the kingdom, and the power, and the glory, for ever. Amen” (Matthew 6:13). Following Jesus of Nazareth, a New Testament writer,

On Hacking the Axis and Securing History Records

  On Security Requirements, Review Physical Might On May 7, 2020, John Arquilla wrote the August, 2020 blog column, Hacking the Axis . When qualifying great acts, consider Arquilla’s statement and regard for the twenty first century anno domini second World War, acronymed WWII. Arquilla wrote, “Observations of the 75 th anniversary of the end of World War II in Europe (May 8, 1945) included remembrances of such searing events as the struggle on Omaha Beach on D-Day, the Battle of the Bulge, and at least some recognition of the enormous contribution made by the Russian people to the defeat of Fascism” (Arquilla, 2020). Arquilla mentioned that the second World War’s European conclusion involved great physical struggles. Arquilla’s lesson learned began at the beginning of his column: in public security, physical might is important, and this is an utter security aspect. Emergent Cybersecurity Requirements With physical security, there is an emergent cybersecurity necessity that John

Law and Security, but Privacy: Tensorflow ImageNet

During yesterday and today, I studied the Machine Learning language, Tensorflow: on Android Pie, I built an ImageNet app, but it, the first version; but it is Google Copyrighted. I figured that Tensorflow should have a JS library, so I searched Google, but I found Google's result . It is the first page and top result. On GitHub, Google's Tensorflow.js models , Image Classification, but called MobileNet , is available. On Google Developer Codelabs, there is a MobileNet lab . As I studied, I learned Machine Learning. Of the ImageNet camera app is my Rasperry Pi 3 B+ 4GB image. but view its result: This script did not work. Testing the MindNet Camera: Try it Yourself On the Google Developer CodeLabs , I finished all three parts, but here is part two, but enable your camera: On The Synergy of Autonomy and Pervasiveness, William John Brinkman and Alton F. Sanders discussed Automated Security Cameras, but they wrote Ethics i

Analysis: Faketoshi

On November 3, 2019, Anton Lucian wrote A New Fake Satoshi Appears, Claims to Be the ‘Co-Founder of Bitcoin’ ( link ). Lucian reported, "A new fake Satoshi Nakamoto has come onto the scene, and it didn’t take a second for him to ridiculed on crypto-Twitter and beyond." More than one faketoshi has claimed Bitcoin copyright. SIMS Gave Fake News The SIMS (Symbiosis Institute of Management Studies) is a Pune, India University ( link ). At 11:28 PM, 16 Dec 2018, SIMS, Pune, India hosted Jorg Molt, but SIMS Pune reported Jorg Molt is a Bitcoin co-founder. A New Fake Satoshi Appears, Claims to Be the ‘Co-Founder of Bitcoin’ via @beincrypto https://t.co/6Zz8YOkdIC #Faketoshi — Jonathan M. Kelly (@BitJetKit) November 4, 2019 This had been disproven, but I have trouble even getting an audience because I am a Christian Computer Scientist: but hypocrisy exists. Today, Emilio Janus reported: during the Nevada World Crypto Conference, Molt f

Analysis: On November 2, 2018 Forbes Senior Contributor Davey Winder reported Android Security Warning As ‘Unremovable’ Malware Infects 45,000 Phones So Far

On November 2, 2018 Forbes Senior Contributor Davey Winder reported Android Security Warning As Unremovable’ Malware Infects 45,000 Phones So Far ( link ). Davey Winder wrote, "It is not unusual for Android smartphone users to be the target of malware, which is hardly surprising given that there are more than 2.5 billion active Android devices out there." Winder supported an undefined time record: Android smartphone users are malware targets because he gave an undefined maximum total Android device count. Winder next claimed: cybersecurity criminals will never not follow money, but more users threaten themselves, but they can become worse infected. On the problem, the Xhelper malware, Winder reported: after uninstalled, the Xhelper malware can reinstall, but after a FDR (factory data reset) this malware can reinstall. On Symantec, Winder reporter May Ying Tee's analysis: this software is not a system applications, but the FDR is the solution.

Contact Form

Name

Email *

Message *