Fascinating playlist about hacking Google

You love Google? Hate it? In any case – cool video playlist on how Google deals with hacking. Want it or not – your information is in Google servers and somebody has to protect it. https://www.youtube.com/playlist?list=PL590L5WQmH8dsxxz7ooJAgmijwOz0lh2H Five elite security teams. Six never-before-told stories. Go behind the scenes with the hacking teams at Google keeping more…

Transhuman Principles 1.0a – DRAFT 1.0

1. Transcend! Strive to remove the evolved limits of our biological and intellectual inheritance, the physical limits of our environment, and the cultural and historical limits of society that constrain individual and collective progress. 2. Pragmatism. Use whatever tools prove effective toward this goal. Technology, and the intellectual disciplines used to develop it, are currently…

Attack on computer memory reveals vulnerability of widely used security systems

  Attack on computer memory reveals vulnerability of widely used security systems . An interesting news about breaking into laptops, which are "secured" by encrypting disks. TrueCrypt is also vulnerable (due to generic design of the encryption suite). "Disk encryption technologies rely on the use of secret keys — essentially large random numbers — to…