Home Blog Page 46

Worldcoin: Sam Altman’s New Crypto That Wants to Scan Your Eye

Worldcoin

Sam Altman, the mastermind behind OpenAI and the creator of ChatGPT, has unveiled his latest venture, a cryptocurrency named Worldcoin. 

Worldcoin was founded over three years ago with the ambitious goal of creating a “new identity and financial network owned by everyone.” The concept is simple yet groundbreaking. People can scan their iris to create a digital identity in exchange for free tokens. Already, over 2 million people have jumped on board this digital identity creation train.

The Worldcoin project aims to distinguish humans from AI online while preserving privacy. It’s about creating a digital identity and a digital currency, WLD, that one receives simply for being human. 

Worldcoin’s unique approach involves the use of an Orb, a metallic device designed to manage the entire process. This Orb, a biometric verification device, is the key to creating a World ID, a proof of your unique and real existence on the internet. As the distribution of Orbs increases, they’re being made available in various locations worldwide, allowing people to find the nearest one and book a time for verification.

World ID and Orb

Once a person verifies their identity and confirms they’re human (not an AI), they receive a global identification that can be used as a digital global passport for logging into websites, mobile apps, and web3 dapps. The goal is to eliminate the need to share personal data like names and emails on the websites you access.

But what about the tokens? When Worldcoin began, there was no intention to develop a physical device. The initial goal was to distribute a new digital token freely to everyone worldwide, helping them access and participate in the global economy. Over time, they concluded that “biometrics is the only realistic way to achieve our goal,” leading to the creation of the Orbs.

Registered users receive tokens weekly, though their current value is virtually nil. The underlying idea is that if the project becomes a huge success, these tokens will increase in value, making the offered tokens valuable.

The Worldcoin Foundation, Altman’s brainchild, is headquartered in Berlin and San Francisco. The foundation plans to retain about 20% of all issued tokens. Initially, the technology will be available in 35 cities across 20 countries. However, due to regulatory complexities, the US is not on the list.

Altman and his co-founder, Alex Blania, hope that Worldcoin will become the largest network of real people on the internet and have a positive impact on society. 

Despite the company’s reassurances, the project has raised numerous privacy concerns. The thought of scanning one’s iris for a digital identity and currency has left many wondering about the potential misuse of such sensitive data. As Worldcoin continues to grow, these privacy concerns with Worldcoin will undoubtedly remain a hot topic of discussion.

From Tweets to X: Elon Musk’s Radical Transformation of Twitter

Tweets to X

Elon Musk has announced a radical rebranding of the popular social media platform. The iconic blue bird that has been synonymous with Twitter has been replaced by a simple yet enigmatic ‘X’. This is not just a logo change; it’s a complete transformation of Twitter’s identity, marking a significant shift in Musk’s vision for the platform.

Elon Musk’s love affair with the letter ‘X’ is well-documented. From SpaceX, his space exploration venture, to the Model X of Tesla, and his AI company named xAI, the ‘X’ has been a recurring theme in Musk’s entrepreneurial journey. Now, it has found its way to Twitter, or should we say, ‘X’.

The transformation was announced over the weekend when Musk revealed the new logo and name for Twitter. The blue bird, a symbol that has been with Twitter since its inception, has been replaced by a specially designed ‘X’. Musk stated that this change “should have been made a long time ago” and that we would soon be saying goodbye “to the Twitter brand and, gradually, all the birds.”

The new ‘X’ logo is already visible on the platform, and it was even projected onto the facade of Twitter’s headquarters in San Francisco. Linda Yaccarino, the current CEO of Twitter under Musk’s leadership, described ‘X’ as “the future state of unlimited interactivity.” She further added that critics have pushed Twitter to “dream bigger, to innovate faster, and to fulfill our great potential. X will do that and more.”

The rebranding of Twitter to ‘X’ is a significant step towards Musk’s grand plan of turning the platform into ‘everything app’, that he has been talking about for quite some time. Musk envisions ‘X’ as a platform that goes beyond just tweets. It will focus on audio, video, messaging, payments, and will be powered by artificial intelligence (AI), connecting everyone in ways we are just beginning to imagine.

However, the transformation is still in progress. While the ‘X’ logo has replaced the blue bird, many elements of Twitter remain unchanged. The domain ‘x.com’ still redirects to ‘twitter.com’, and the subscription to Twitter Blue is still available. It seems like the metamorphosis of Twitter into ‘X’ will take some time to complete.

Arm Officially Announced Its Support For The Panfrost Open-Source Mali GPU Driver

arm news and stories on web

ARM has renewed its collaboration with open-source developer Collabora. This partnership aims to fund the continued development of the Panfrost driver, an open-source graphics driver for ARM Mali GPUs.

For years, GPU drivers in Arm processors have been notoriously closed-source, making bug fixes a tedious and time-consuming process. Developers were left at the mercy of the silicon vendor, who might not deem certain bugs important enough to fix. This led to a concerted effort by the developer community to reverse-engineer GPU drivers, with projects like Freedreno for Qualcomm Adreno, Etnaviv for Vivante, and Lima and Panfrost for Arm Mali GPUs taking center stage.

The Panfrost driver has undergone extensive changes recently, with the third generation of Valhall GPUs utilizing a revamped Command Stream Frontend designed for Vulkan. The driver is almost ready for integration into the Linux Kernel, a significant milestone that follows ARM’s introduction of the next GPU generation in 2022.

This renewed collaboration with ARM has spurred Collabora to push other projects forward. They are currently working on a Vulkan driver to complement the existing OpenGL and OpenGL-ES drivers. Progress is also expected in the support for OpenCL for GPU computations, although the corresponding driver is still considered “experimental” at this stage.

ARM’s trust in Panfrost is evident, assuring customers that they can use Mali systems without any concerns, regardless of the operating system and graphics middleware. This confidence underscores the potential of open-source projects in enhancing system performance and flexibility.

In addition to their work on the Panfrost driver, Arm is also making strides in other areas of open-source development. The company is working with Linaro to make development work easier and is contributing to the open-source Python community. Arm is also focusing on getting more embedded software to run on Arm and has moved its RAN Accelerator Library (RAL) to an open-source project to aid 5G infrastructure.

Ubisoft Begun Deleting Inactive Connect Accounts With All Purchased Games

Ubisoft Begun Deleting Inactive Connect Accounts

Ubisoft has begun deleting inactive accounts on its Ubisoft Connect platform. The decision has been met with a barrage of criticism from users and media outlets alike, who argue that the company is infringing on consumer rights.

Ubisoft Connect users have been receiving emails warning of the imminent deletion of their accounts. The only way to save an account, according to Ubisoft’s Twitter page, is to use the service or log into the profile once a notification is received. If the user fails to click on the “Cancel Account Closure” button within 30 days of receiving the notification, the account will be permanently closed, and all purchased games will become inaccessible.

https://twitter.com/PC_enjoyer/status/1681655629276930048

Ubisoft justifies this decision by citing the General Data Protection Regulation (GDPR), which mandates companies to comply with personal information protection laws. According to Ubisoft, only inactive accounts that have not been used for four years or more are being closed. However, this explanation has not quelled the backlash.

Critics argue that Ubisoft is violating consumer rights and ignoring the laws of certain countries where digital purchases are considered equivalent to physical ones and cannot be revoked by the seller. The uproar over Ubisoft’s new policy has led to a surge in criticism, with some users even calling for a boycott of the company’s products.

As the controversy continues to unfold, it remains to be seen how Ubisoft will respond to the backlash and whether it will reconsider its policy.

NVIDIA’s Journey: From Graphics Cards to AI Dominance

NVIDIA story

NVIDIA, the Santa Clara-based company, has been a privileged spectator in the arena of artificial intelligence (AI). As the biggest tech companies battle to make their AI applications and chatbots more user-friendly, NVIDIA reaps the benefits. Why? Because NVIDIA’s hardware powers these tools, making the company a winner, regardless of who comes out on top in the AI race.

NVIDIA’s Dominance in the AI Sector

It’s estimated that around 80% of the GPUs used by tech giants like Google and OpenAI to train and run their language models bear the NVIDIA logo. This dominance is something few companies can boast about in their respective sectors. This favorable position has led NVIDIA to join the exclusive club of publicly traded companies valued at over a trillion dollars, a club that includes other tech giants like Apple, Alphabet, Amazon, and Microsoft.

The Birth of NVIDIA

The story of NVIDIA begins on April 5, 1993. It was founded by Jensen Huang, Chris Malachowsky, and Curtis Priem, who foresaw the PC becoming an essential device for running games, music, and images. While other major companies focused on developing CPUs (Central Processing Units) for large manufacturers, NVIDIA concentrated on GPUs (Graphics Processing Units). These have proven to be the most suitable chips for large AI models.

NVIDIA’s first product, the NV1, was launched in 1993. This GPU stood out for its ability to handle 2D and 3D video, as well as its integrated audio processing hardware. It was so innovative that Sega decided to use it in its Saturn console.

In 1997, NVIDIA introduced the RIVA 128, also known as NV3, a graphics card that achieved great success because it changed the mapping paradigm and processed frames faster.

The Vision of Jensen Huang, NVIDIA’s CEO

However, NVIDIA would have been left behind if not for the decision of its CEO, Jensen Huang. In 2006, Huang made a crucial decision: to make NVIDIA’s chips programmable. This allowed them to be adapted to different uses, such as cryptocurrency mining, and to take advantage of the burgeoning field of AI research.

NVIDIA’s Growth and Challenges

NVIDIA has grown spectacularly since then, surpassing its competitors and joining the club of companies with a market value exceeding a trillion dollars. In 2023, its AI business generated about $15 billion in revenue, a 40% increase from the previous year. As a result, its shares have soared more than 180% this year.

Only AMD seems to be a direct competitor today. However, the future is also changing for them. Both Google and Microsoft are working on what could be their own TPUs (Tensor Processing Units), a processor specifically designed for processing AI tasks that require large amounts of matrix multiplication operations.

Conclusion

Although NVIDIA is currently a successful company, it will have to continue innovating if it wants to keep feeding a sector that needs to grow non-stop to keep being talked about.

Top 15+ Operating Systems for Ethical Hacking and Pen Testing (2023 List)

Favourite Operating Systems Of Hackers - ethical hacking operating systems
Favourite Operating Systems Of Hackers - ethical hacking operating systems

Like to learn about computer and network security or to find vulnerabilities in your network or are you searching for the best operating systems for ethical hacking and pen testing or like to know which is the favourite operating system of hackers? — then stop! Here is the list of the most widely used infamous ethical hacking operating systems or we can say digital forensic tools.

Almost all the best ethical hacking operating systems for security experts are based on Linux kernel, so favourite operating systems of all types of hackers are always Linux — though security-focused operating system is a security analyst’s best friend. But also keep in mind that, simply having these operating systems doesn’t make anyone a security expert or hacker — you should also learn some essential programming languages to enrich your knowledge in this field.

Note : Only For Educational Purposes

Listed operating systems are for educational purposes only. Do not try to use it if it’s not legal in your country. And also not use them to harm anybody or to gain unauthorized access to any account you do not own. Use this software only for analyzing your own security. I do not take any responsibility for anything you do using this application. Use at your own risk.

Favourite Operating Systems of Ethical Hackers :

So check out the best Linux hacking os used for pen testing and other security measures.

1. Kali Linux

kali linux operating system

Kali Linux maintained and funded by Offensive Security Ltd. is one of the well-known and favorite ethical hacking operating systems used by hackers and security professionals. Kali is a Debian-derived Linux distribution designed for real hackers or digital forensics and penetration testing. It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous forensics Linux distribution based on Ubuntu.

Apart from desktop support, Kali Linux also has a dedicated project set-aside for compatibility and porting to specific Android devices, called Kali Linux NetHunter. When comes to security tools, this top ethical hacking operating system is equipped with 600+ preinstalled pen testing tools and they are frequently updated and are offered for different platforms like ARM and VMware. Now Kali Linux is based on a rolling release model.

2. BackBox

backbox operating system

BackBox is an Ubuntu-based penetration testing Linux distribution. It provides penetration test and security assessment oriented providing a network and informatics systems analysis toolkit along with a complete set of other tools required for ethical hacking and security testing.

It includes some of the most used security and analysis Linux tools to help out security experts from stress tests to sniffing including vulnerability assessment, computer forensic analysis, and exploitation.

3. Parrot Security Edition

parrot security os

Parrot Security OS (or ParrotSec) is a GNU/LINUX distribution based on Debian. This Linux distribution for hackers is built in order to perform penetration testing, vulnerability assessment and mitigation, computer forensics and anonymous surfing. It has been developed by Frozenbox’s Team.

Parrot is cloud-friendly Linux distribution and unlike other ethical hacking operating systems, Parrot OS is a lightweight Linux distro —  runs over machines which have a minimum 265Mb of RAM and it is suitable for both 32bit (i386) and 64bit (amd64), with a special edition it works on old 32bit machines (486).

4. Live Hacking OS

live hacking os

Live Hacking OS is a Linux distribution packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification. It includes the graphical user interface GNOME inbuilt. There is a second variation available that has command line only, and it requires very fewer hardware requirements.

5. OWASP SamuraiWTF

samurai web testing framework

The Samurai Web Testing Framework is a live Linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open-source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test.

6. Network Security Toolkit

Network Security Toolkit

The Network Security Toolkit (NST) is a Linux-based Live CD that provides a set of open-source computer security and networking tools to perform routine security and networking diagnostic and monitoring tasks. The distribution can be used as a network security analysis, validation and monitoring tool on servers hosting virtual machines. The majority of tools published in the article “Top 125 security tools” by Insecure.org are available in the toolkit.

7. NodeZero

nodezero

NodeZero is an open-source Linux kernel-based ethical hacking operating system derived from Ubuntu and designed to be used for penetration testing operations. Besides the fact that it allows you to start the live system, the boot menu contains various advanced options, such as the ability to perform a system memory diagnostic test, boot from a local drive, start the installer directly, as well as to boot in safe graphics mode, text mode or debug mode.

With NodeZero you will have instant access to over 300 penetration testing tools, as well as a set of basic services that are needed in penetration testing operations.

8. Pentoo

pentoo

Pentoo is a Live CD and Live USB designed for penetration testing and security assessment. Based on Gentoo Linux, Pentoo is provided both as 32 and 64 bit installable LiveCD. Pentoo is also available as an overlay for an existing Gentoo installation. The Pentoo kernel includes grsecurity and PAX hardening and extra patches – with binaries compiled from a hardened toolchain with the latest nightly versions of some tools available.

9. BlackBuntu

blackbuntu

BlackBuntu is penetration testing distribution with GNOME Desktop Environment which was specially designed for security training students and practitioners of information security. It’s currently being built using the Ubuntu 10.10 and work on reference BackTrack.

10. Cyborg Hawk Linux

Cyborg Hawk Linux

CYBORG HAWK LINUX is a Ubuntu-based hacking operating system created by the team of Ztrela Knowledge Solutions Pvt. Ltd. Cyborg Hawk penetration testing distro can be used for network security and assessment and also for digital forensics. It has various tools also fit for the Mobile Security and Wireless testing. It has 700+ tools while other penetration distros has 300+ and also dedicated tools for and menu for mobile security and malware analysis.

11. Knoppix STD

Knoppix STD

STD is a Linux-based Security Tool used by hackers. Actually, it is a collection of hundreds if not thousands of open source security tools. It’s a Live Linux distro and its sole purpose in life is to put as many security tools at your disposal with as slick an interface as it can. STD is meant to be used by both novice and professional security personnel but is not ideal for the Linux uninitiated.

12. BlackArch Linux

Favourite Operating Systems Of Hackers - BlackArch Linux

BlackArch Linux -an Arch Linux-based ethical hacking operating system for penetration testers and security researchers. The new version also has a total of 1400 penetration testing tools with the old ones updated and the new ones added, making it a must-have download for hackers and security researchers.

13. Matriux Linux

Favourite Operating Systems Of Hackers - Matriux Linux

Matriux Linux – a Debian-based security distribution designed for penetration testing and hacking. Although suited best for hackers, it can also be used by any Linux user as a desktop system for day-to-day computing. Matriux has more than 300 open source tools for penetration testing and hacking. Since its the new one, many security researchers claims that it is a better alternative to Kali Linux.

14. Fedora Security Lab

Fedora Security Lab - ethical hacking os

Fedora Security Lab comes with the clean and fast Xfce Desktop Environment and essential set of tools like — Wireshark, Sqlninja, Yersinia, Medusa, etc — to follow a proper test path for security and pen-testing. Fedora Security Lab is maintained by a community of security testers and developers.

15. Caine

Caine - ethical hacking os

Caine — Computer-Aided Investigation Environment — is an Ubuntu-based GNU/Linux live distribution created for ethical hackers and digital forensics experts. It provides a complete forensic environment with a friendly graphical interface.

16. ArchStrike

ArchStrike Linux - ethical hacking os

ArchStrike is one of the perfect Arch Linux based ethical hacking operating systems for security experts. ArchStrike provides a live desktop environment based on the Openbox window manager along with an extra repository of security software of 32-bit and 64-bit builds.

That’s all!! If you think we forget to add some other favourite operating systems of hackers, please comment below. And also soon we will add more ethical hacking operating systems to the list.

One more thing click the below button to find out where to get the above-mentioned operating systems.

Google Launched Final Version of Nearby Share for Windows

Android Nearby Share Feature to Windows

Google’s Nearby Share, a feature that has simplified file transfer between Android devices, has now extended its reach to Windows systems. This article will guide you through the ins and outs of Nearby Share for Windows, and how it stands as Google’s answer to Apple’s AirDrop.

Google’s Nearby Share, initially designed for uncomplicated file transfer between Android smartphones, tablets, and Chromebooks, has now been made available for Windows systems. The final version of Nearby Share for Windows has now been released.

The application for wireless transfer between Android devices and PCs can now be downloaded for free for Windows. It requires a Windows computer with a 64-bit version of Windows 10 or higher, active Wi-Fi, and Bluetooth. However, ARM devices are not supported by Google. On the Android side, Nearby Share, available since 2020, is automatically installed on devices with Android 6 or higher, eliminating the need for an additional app download.

Since the beta launch in March this year, Google has reported continuous improvements in transfer speed and reliability for Android. The updates released over time have reduced the number of crashes and increased successful transfers. With the official availability for Windows systems, Nearby Share brings two optimizations.

The application now displays an estimated remaining time until the completion of the file transfer on Windows. This feature is particularly useful when transferring large files or entire folders. According to Google, photos and videos are the most popular file formats for transfer, with over 50 million identified since the beta version for PCs was available. Nearby Share has been installed over 1.7 million times since its initial release for Windows.

The second update pertains to notifications on Windows. Users now receive a visual preview during the transfer of images in the “Notification Center,” ensuring the correct photo has been selected and transferred.

Google has also announced that it will continue to work on further improvements for Nearby Share. In collaboration with partners, Google plans to offer Nearby Share pre-installed on Windows systems. HP’s Dragonfly Pro is one such example mentioned by Google.