A D.C. Department of Transportation employee removes a paper cover from the "Hidden Figures Way" street sign in front of NASA Headquarters at the corner of 3rd and E Street SW. via NASA https://go.nasa.gov/2X4t27j
'How Close Are We to Self-Driving Cars, Really?' Published on June 16, 2019 at 01:04PM Chris Urmson helped pioneer self-driving car technology at Google before founding Aurora (which sells self-driving car software to automakers, and this week announced a new partnership with Chrysler and a new round of investment by Hyundai). In a new interview, Urmson "says he expects that in about five to 10 years, Americans will start seeing robots cruising down the road in a handful of cities and towns across the country," reports Slate. "It will be about 30 to 50 years, he says, until they're everywhere. " I think within the next five years we'll see small-scale deployment. That'll be a few hundred or a few thousand vehicles. Really this is the, it's Silicon Valley speak, this is the zero-to-one moment of proving that the technology actually works, understanding how customers want to use it, convincing ourselves that -- and when I say ourselves, I mean ...
Telegram Blames China For DDoS Attack Coinciding With Hong Kong Protests Published on June 13, 2019 at 07:31PM The distributed denial of service attack that hit Telegram Wednesday came from China, the secure messaging app's founder said. Pavel Durov's tweet suggested that the country's government may have done it to disrupt protests in Hong Kong. From a report: In a DDoS attack, an online service gets bombarded with traffic from networks of bots, to the point where it's overwhelmed and legit users get frozen out. In an explanation Wednesday, Telegram compared it to an "army of lemmings" jumping the line at a McDonald's and making innumerable "garbage requests." Durov said, "IP addresses coming mostly from China. Historically, all state actor-sized DDoS (200-400 Gb/s of junk) we experienced coincided in time with protests in Hong Kong (coordinated on Telegram). This case was not an exception." Tens of thousands took to Hong Kong's st...
A New Hidden Way of Web Browser Profiling, Identification and Tracking Published on June 17, 2019 at 04:35AM Researchers from Austria's Graz University of Technology "have devised an automated system for browser profiling using two new side channel attacks that can help expose information about software and hardware," reports The Register. The researchers recently presented a paper titled "JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits," which The Register says "calls into question the effectiveness of anonymized browsing and browser privacy extensions... " Long-time Slashdot reader Artem S. Tashkinov shared their report: One of the side-channel attacks developed for JavaScript Template Attacks involve measuring runtime differences between two code snippets to infer the underlying instruction set architecture through variations in JIT compiler behavior. The other involves measuring timing differences in the ...
Comments
Post a Comment