Article Trunk



Archive for the ‘Computer Articles’ Category

Trump’s stealth attack on Social Security: “Chained CPI”

Trump was elected by old white people who are certain they'll be dead before climate change renders the planet uninhabitable, but who are also seriously invested in continuing to receive Social Security benefits, which is why Trump repeatedly promised to protect Social Security during the 2016 presidential race.

Trump always lies about everything, so of course ...

Amazon has turned warehouse tasks into a (literal) game

Working at an Amazon fulfillment center is tough and tedious. Stories of problematic working conditions have plagued the company for years now, and pressure has likely only increased as the retail giant is pushing to get packages out even faster. To give the company some credit, it has worked to improve conditions, including the addition ...

Woman in stolen RV leads police on a wild high-speed chase in California

A woman allegedly stole a recreational vehicle in Los Angeles County and caused at least six accidents and three hospitalizations while police chased after her.

The driver, Julie Ann Rainbird (52) of Winnetka was arrested and has been charged with "evading a police officer causing injury or death" and is being held on $100,000 bail.

Image: Skyfox/YouTube ...

In less than one second, a malicious web-page can uniquely fingerprint an Iphone, Pixel 2 or Pixel 3 without any explicit user interaction

In a new paper for IEEE Security, a trio of researchers (two from Cambridge, one from private industry) identify a de-anonymizing attack on Iphones that exploits minute differences in sensor calibration: an Iphone user who visits a webpage running the attack code can have their phone uniquely identified in less than a second, through ...

Thangrycat: a deadly Cisco vulnerability named after an emoji 😾😾😾

Thangrycat is a newly disclosed vulnerability in Cisco routers that allows attackers to subvert the router's trusted computing module, which allows malicious software to run undetectably and makes it virtually impossible to eliminate malware once it has been installed.

Thangrycat relies on attackers being able to run processes as the system's administrator, and Red Balloon, ...

Asymmetric warfare: someone is pulling emergency brakes on NYC subway cars

Modern metropolises are teeming with police and national guards at the ready. They are well-equipped for dealing with riots, hostage situations, and the like. But they can't do much against people who wage asymmetric warfare. One person (or maybe a few people) were able to shut down London Gatwick Airport during the busy holiday season ...

Americans believe that they should own the mountains of data produced by their cars, but they don’t

Your car is basically a smartphone with wheels, and it gathers up to 25gb/hour worth of data on you and your driving habits -- everything from where you're going to how much you weigh. Cars gather your financial data, data on the number of kids in the back seat, and, once they're connected to your ...

These people on a remote Japanese island enjoy eating a poisonous plant

Amami Ōshima is a small Japanese island a little north of Okinawa. A plant called cycad grows in abundance there. It's poisonous unless it is properly prepared by drying and fermenting it. This video shows you the process and has interviews with people who explain why they revere the cycad plant.

Image: YouTube Read ...