I found this vid informative and interesting at the same time.
Researchers have calculated the quantum computer size necessary to break 256-bit elliptic curve public-key cryptography: Finally, we calculate the number of physical qubits required to break the 256-bit elliptic curve encryption of keys in the Bitcoin network within the small available time frame in which it would actually pose a threat to do so.
The Department of Defense is Prioritizing Open Source Software. Here’s How Open Source Projects Can Benefit.
On January 26, 2022, the new Chief Information Officer (CIO) of the U.S. Department of Defense (DoD), John B. Sherman, released a memo to the entire Department titled “Software Development and Open Source Software” . In this memo, the CIO addresses two primary concerns: 1) using open source software (OSS) introduces supply chain risks for DoD software programs, and 2) sharing DoD code via open source channels without proper checks enables potential leaks of proprietary DoD information to adversaries.
At long last, the Qubes 4.1.0 stable release has arrived! The culmination of years of development, this release brings a host of new features, major improvements, and numerous bug fixes. Read on to find out what’s new, how to install or upgrade to the new release, and all the noteworthy changes it includes.
Senators have reintroduced the EARN IT Act, requiring social media companies (among others) to administer a massive surveillance operation on their users: A group of lawmakers led by Sen. Richard Blumenthal (D-CT) and Sen. Lindsey Graham (R-SC) have re-introduced the EARN IT Act , an incredibly unpopular bill from 2020 that was dropped in the face of overwhelming opposition .
Source: The EARN IT Act Is Back
As always I have my suspicions with these and the NSA having prior knowledge and spinning their narrative so to offset that info to the public. Can’t burn your bridges so keep it close to the vest.
Why new users are perceived as they are to Linux. we all start from some where.
Awesome vid of the inner working of TCP.
- Is this the future of the Internet?
- Will QUIC Kill TCP? // Wireshark Talk
- Emergency Alert System Flaws Could Let Attackers Transmit Fake Messages
- Microsoft Catches Austrian Company Exploiting Windows, Adobe Zero-Days
- Discovery Of New UEFI Rootkit Exposes An Ugly Truth: The Attacks Are Invisible To Us