Menu

Blog

Archive for the ‘hacking’ category: Page 3

Apr 24, 2015

A Tool That Lets Designers Tweak iPhone Apps Without Code

Posted by in categories: hacking, innovation, software

— Wiredhttp://www.wired.com/wp-content/uploads/2015/04/hone-582x340.jpgJaanus Kase isn’t sure we should teach every kid to code.

Wait, don’t grab your pitchfork just yet. He thinks it’s a perfectly noble idea, just that it ignores a basic fact: Programming as it exists today is tedious and a highly specialized skill—one that, frankly, not everyone is well-suited to. “Saying that everybody is a programmer, everybody must code, it’s dangerous,” he says. “It trivializes the art of programming. And it is an art—a craft.”

Rather than teach everyone to code, maybe it makes more sense to build tools that let some people side-step programming altogether? Read more

Feb 9, 2015

WTF! It Should Not Be Illegal to Hack Your Own Car’s Computer

Posted by in categories: ethics, hacking

By — Wired
carhack-ft
I spent last weekend elbow-deep in engine grease, hands tangled in the steel guts of my wife’s Mazda 3. It’s a good little car, but lately its bellyachings have sent me out to the driveway to tinker under the hood.

I regularly hurl invectives at the internal combustion engine—but the truth is, I live for this kind of stuff. I come away from each bout caked in engine crud and sated by the sound of a purring engine. For me, tinkering and repairing are primal human instincts: part of the drive to explore the materials at hand, to make them better, and to make them whole again.

Cars, especially, have a profound legacy of tinkering. Hobbyists have always modded them, rearranged their guts, and reframed their exteriors. Which is why it’s mind-boggling to me that the Electronic Frontier Foundation (EFF) just had to ask permission from the Copyright Office for tinkerers to modify and repair their own cars.
Read more

Feb 2, 2015

The Mathematical Wonders behind Bitcoin

Posted by in categories: bitcoin, business, education, encryption, finance, hacking, hardware, information science, innovation, privacy

Vires in Bitcoin
Bitcoin as a cryptocurrency has had its moments of strength and weakness. The technology behind bitcoins, however, is a different story. While skeptics don’t expect a lot from Bitcoin as an alternative currency because of its volatility, they do have high hopes for the technological innovation that powers it, believing that it can be further developed to create something much powerful than Bitcoin itself.

To those who know Bitcoin as a great way of transacting online, but don’t completely understand its dynamics, it’s time to get acquainted with the cryptocurrency’s mathematical wonders that make anonymous, faster, and cheaper transactions of moving funds on the internet possible.

Most of us know that Bitcoin uses the SHA-256 hashing algorithm, but hashing serves a different function and purpose from that of digital signatures. Hashing actually provides proof that a message has not been changed because running the same hash always generates similar result.

Any message, regardless of the size can go into a hash function where the algorithm breaks it down, combines the parts, and “digests” it until it makes a fixed-length outcome called “digest”. However, a good hashing algorithm possesses some critical characteristics, in which the same message always produces the same result, as mentioned above, and it only works in one direction.

Continue reading “The Mathematical Wonders behind Bitcoin” »

Jan 4, 2015

New Book: An Irreverent Singularity Funcyclopedia, by Mondo 2000’s R.U. Sirius.

Posted by in categories: 3D printing, alien life, automation, big data, bionic, bioprinting, biotech/medical, complex systems, computing, cosmology, cryptocurrencies, cybercrime/malcode, cyborgs, defense, disruptive technology, DNA, driverless cars, drones, economics, electronics, encryption, energy, engineering, entertainment, environmental, ethics, existential risks, exoskeleton, finance, first contact, food, fun, futurism, general relativity, genetics, hacking, hardware, human trajectories, information science, innovation, internet, life extension, media & arts, military, mobile phones, nanotechnology, neuroscience, nuclear weapons, posthumanism, privacy, quantum physics, robotics/AI, science, security, singularity, software, solar power, space, space travel, supercomputing, time travel, transhumanism

Quoted: “Legendary cyberculture icon (and iconoclast) R.U. Sirius and Jay Cornell have written a delicious funcyclopedia of the Singularity, transhumanism, and radical futurism, just published on January 1.” And: “The book, “Transcendence – The Disinformation Encyclopedia of Transhumanism and the Singularity,” is a collection of alphabetically-ordered short chapters about artificial intelligence, cognitive science, genomics, information technology, nanotechnology, neuroscience, space exploration, synthetic biology, robotics, and virtual worlds. Entries range from Cloning and Cyborg Feminism to Designer Babies and Memory-Editing Drugs.” And: “If you are young and don’t remember the 1980s you should know that, before Wired magazine, the cyberculture magazine Mondo 2000 edited by R.U. Sirius covered dangerous hacking, new media and cyberpunk topics such as virtual reality and smart drugs, with an anarchic and subversive slant. As it often happens the more sedate Wired, a watered-down later version of Mondo 2000, was much more successful and went mainstream.”


Read the article here >https://hacked.com/irreverent-singularity-funcyclopedia-mondo-2000s-r-u-sirius/

Dec 30, 2014

The Blockchain is the New Database, Get Ready to Rewrite Everything

Posted by in categories: architecture, automation, big data, bitcoin, business, complex systems, computing, cryptocurrencies, cyborgs, defense, disruptive technology, economics, education, encryption, engineering, finance, futurism, genetics, geopolitics, governance, government, hacking, hardware, human trajectories, information science, internet, law, military, mobile phones, nanotechnology, neuroscience, open access, open source, philosophy, physics, privacy, robotics/AI, science, scientific freedom, security, singularity, software, strategy, supercomputing, transhumanism, transparency

Quoted: “If you understand the core innovations around the blockchain idea, you’ll realize that the technology concept behind it is similar to that of a database, except that the way you interact with that database is very different.

The blockchain concept represents a paradigm shift in how software engineers will write software applications in the future, and it is one of the key concepts behind the Bitcoin revolution that need to be well understood. In this post, I’d like to explain 5 of these concepts, and how they interrelate to one another in the context of this new computing paradigm that is unravelling in front of us. They are: the blockchain, decentralized consensus, trusted computing, smart contracts and proof of work / stake. This computing paradigm is important, because it is a catalyst for the creation of decentralized applications, a next-step evolution from distributed computing architectural constructs.

Screen Shot 2014-12-23 at 10.30.59 PM

Read the article here > http://startupmanagement.org/2014/12/27/the-blockchain-is-th…verything/

Nov 29, 2014

The Most Wanted Man in the World

Posted by in categories: government, hacking, privacy, security, surveillance

Wired.com

The message arrives on my “clean machine,” a MacBook Air loaded only with a sophisticated encryption package. “Change in plans,” my contact says. “Be in the lobby of the Hotel ______ by 1 pm. Bring a book and wait for ES to find you.”

ES is Edward Snowden, the most wanted man in the world. For almost nine months, I have been trying to set up an interview with him—traveling to Berlin, Rio de Janeiro twice, and New York multiple times to talk with the handful of his confidants who can arrange a meeting. Among other things, I want to answer a burning question: What drove Snowden to leak hundreds of thousands of top-secret documents, revelations that have laid bare the vast scope of the government’s domestic surveillance programs? In May I received an email from his lawyer, ACLU attorney Ben Wizner, confirming that Snowden would meet me in Moscow and let me hang out and chat with him for what turned out to be three solid days over several weeks. It is the most time that any journalist has been allowed to spend with him since he arrived in Russia in June 2013. But the finer details of the rendezvous remain shrouded in mystery. I landed in Moscow without knowing precisely where or when Snowden and I would actually meet. Now, at last, the details are set.

Read more

Nov 23, 2014

BitCoin, Cryptocurrency, and Blockchain Technology — The Ethereum Primer

Posted by in categories: automation, big data, biotech/medical, bitcoin, business, complex systems, computing, disruptive technology, economics, encryption, energy, engineering, ethics, finance, futurism, geopolitics, government, hacking, hardware, human trajectories, information science, innovation, internet, journalism, law, materials, military, neuroscience, open access, open source, philosophy, physics, policy, privacy, science, scientific freedom, security, software, supercomputing, transparency

Quoted: “Ethereum will also be a decentralised exchange system, but with one big distinction. While Bitcoin allows transactions, Ethereum aims to offer a system by which arbitrary messages can be passed to the blockchain. More to the point, these messages can contain code, written in a Turing-complete scripting language native to Ethereum. In simple terms, Ethereum claims to allow users to write entire programs and have the blockchain execute them on the creator’s behalf. Crucially, Turing-completeness means that in theory any program that could be made to run on a computer should run in Ethereum.” And, quoted: “As a more concrete use-case, Ethereum could be utilised to create smart contracts, pieces of code that once deployed become autonomous agents in their own right, executing pre-programmed instructions. An example could be escrow services, which automatically release funds to a seller once a buyer verifies that they have received the agreed products.”

Read Part One of this Series here » Ethereum — Bitcoin 2.0? And, What Is Ethereum.

Read Part Two of this Series here » Ethereum — Opportunities and Challenges.

Read Part Three of this Series here » Ethereum — A Summary.

Nov 20, 2014

Bitcoin, Cryptocurrency, and Blockchain Technology — Voting Systems

Posted by in categories: automation, big data, bitcoin, business, complex systems, computing, disruptive technology, economics, encryption, engineering, ethics, geopolitics, government, hacking, hardware, information science, innovation, law, materials, open access, open source, philosophy, policy, polls, privacy, science, security, software, supercomputing, transparency, treaties

Quoted: “Bitcoin technology offers a fundamentally different approach to vote collection with its decentralized and automated secure protocol. It solves the problems of both paper ballot and electronic voting machines, enabling a cost effective, efficient, open system that is easily audited by both individual voters and the entire community. Bitcoin technology can enable a system where every voter can verify that their vote was counted, see votes for different candidates/issues cast in real time, and be sure that there is no fraud or manipulation by election workers.”


Read the article here » http://www.entrepreneur.com/article/239809?hootPostID=ba473f…aacc8412c7

Nov 19, 2014

BitCoin, Cryptocurrency, and Blockchain Technology — FACTOM

Posted by in categories: automation, big data, biotech/medical, bitcoin, business, complex systems, computing, disruptive technology, economics, education, encryption, engineering, environmental, ethics, finance, futurism, geopolitics, hacking, information science, law, materials, open access, policy, science, security, software, supercomputing, transparency

Quoted: “The Factom team suggested that its proposal could be leveraged to execute some of the crypto 2.0 functionalities that are beginning to take shape on the market today. These include creating trustless audit chains, property title chains, record keeping for sensitive personal, medical and corporate materials, and public accountability mechanisms.

During the AMA, the Factom president was asked how the technology could be leveraged to shape the average person’s daily life.”

Kirby responded:

“Factom creates permanent records that can’t be changed later. In a Factom world, there’s no more robo-signing scandals. In a Factom world, there are no more missing voting records. In a Factom world, you know where every dollar of government money was spent. Basically, the whole world is made up of record keeping and, as a consumer, you’re at the mercy of the fragmented systems that run these records.”

Continue reading “BitCoin, Cryptocurrency, and Blockchain Technology — FACTOM” »

Nov 17, 2014

A New Economic Layer — BitCoin, Cryptorcurrency, and Blockchain Technology

Posted by in categories: big data, bitcoin, business, complex systems, computing, disruptive technology, economics, electronics, encryption, engineering, ethics, finance, futurism, geopolitics, hacking, human trajectories, information science, innovation, internet, law, materials, media & arts, military, open access, open source, policy, privacy, science, scientific freedom, security, software, supercomputing

Preamble: Bitcoin 1.0 is currency — the deployment of cryptocurrencies in applications related to cash such as currency transfer, remittance, and digital payment systems. Bitcoin 2.0 is contracts — the whole slate of economic, market, and financial applications using the blockchain that are more extensive than simple cash transactions like stocks, bonds, futures, loans, mortgages, titles, smart property, and smart contracts

Bitcoin 3.0 is blockchain applications beyond currency, finance, and markets, particularly in the areas of government, health, science, literacy, culture, and art.

Read the article here » http://ieet.org/index.php/IEET/more/swan20141110

Page 3 of 41234