domingo, 10 de novembro de 2019

Grupo financiado por Elon Musk libera IA poderosa e assustadora

Por Claudio Yuge | 09 de Novembro de 2019 no site Canaltech.


Resultado de imagem para I.A.


Em fevereiro deste ano, a OpenAI, instituição sem fins lucrativos que realiza pesquisas sobre inteligência artificial (IA), anunciou o projeto GPT-2, um algoritmo poderoso, capaz de criar vários parágrafos coerentes sobre os mais variados assuntos. Na ocasião, ela disse que não liberaria por completo a novidade para o público, por se tratar de algo muito poderoso, que poderia trazer problemas se mal utilizada. Mas… agora, o monstro saiu da jaula.
O gerador de textos foi treinado em cerca de 40 GB de dados de oito milhões de sites. Para testar, é só colocar algumas palavras em inglês e receber, em questão de segundos, uma história convincente, com dados plausíveis. Veja no exemplo abaixo:
(Imagem: Reprodução/Talk to Transformer)
Em uma postagem no blog, a OpenAI disse nesta semana que decidiu disponibilizar o GPT-2 por completo porque, desde que distribuiu uma versão menor do mesmo software, não notou nenhum comportamento de uso indevido — embora não tenha havido assim tanto tempo para alguém usar a IA para fins, digamos, inadequados.
Se quiser experimentar, basta acessar o endereço https://talktotransformer.com/. E pensar que a OpenIA tem como um dos maiores financiadores Elon Musk, fundador da Tesla e da Space X e que também é conhecido justamente por conta do seu medo de que um dia a IA vai se voltar contra os humanos.
Fonte: Gizmodo 

sábado, 9 de novembro de 2019

Amazon's Ring Video Doorbell Lets Attackers Steal Your Wi-Fi Password

Por Mohit Kumar em 047/11/2019 no site The Hacker News

ring video doorbell wifi password
Security researchers at Bitdefender have discovered a high-severity security vulnerability in Amazon's Ring Video Doorbell Pro devices that could allow nearby attackers to steal your WiFi password and launch a variety of cyberattacks using MitM against other devices connected to the same network.

In case you don't own one of these, Amazon's Ring Video Doorbell is a smart wireless home security doorbell camera that lets you see, hear and speak to anyone on your property from anywhere in the World.

The smart doorbell needs to be connected to your WiFi network, allowing you to remotely access the device from a smartphone app to perform all tasks wirelessly.

While setting up the device for the very first time and share your WiFi password with it, you need to enable the configuration mode from the doorbell.

Entering into the configuration mode turns on a built-in, unprotected wireless access point, allowing the RING smartphone app installed on your device to automatically connect to the doorbell.

However, researchers told The Hacker News that besides using an access point with no password, the initial communication between the Ring app and the doorbell, i.e., when you share your home's WiFi password with the doorbell, is performed insecurely through plain HTTP.

ring video doorbell wifi password hacking


Thus, a nearby attacker can simply connect to the same unprotected wireless access point, while the setup in the process, and steal your WiFi password using a man-in-the-middle attack.

Since this attack can only be performed during the "one-time initial configuration" of the device, you might be wondering how an attacker can leverage this loophole after the device has already been configured.
Researchers suggested that by continuously sending de-authentication messages to the device, an attacker can trick the user into believing that the device is malfunctioning, forcing him to re-configure it.

"Attackers can trigger the reconfiguration of the Ring Video Doorbell Pro. One way to do this is to continuously send deauthentication packets, so that the device is dropped from the wireless network. At this point, the App loses connectivity and tells the user to reconfigure the device," the researchers told The Hacker News.

"The live view button becomes greyed out and, when clicked, the app will suggest restarting the router or pressing the setup button twice on the doorbell. Pressing the button twice will trigger the device to try to reconnect to the network – an action that will fail. The last resort is to try and reconfigure the device," Bitdefender said in a blog post.

Once the owner enters into the configuration mode to re-share WiFi credentials, the attacker sniffing the traffic would capture the password in plaintext, as shown in the screenshot.

Once in possession of a user's WiFi password, an attacker can launch various network-based attacks, including:

  • Interact with all devices within the household network;
  • Intercept network traffic and run man-in-the-middle attacks
  • Access all local storage (NAS, for example) and subsequently access private photos, videos and other types of information,
  • Exploit all vulnerabilities existing in the devices connected to the local network and get full access to each device; that may lead to reading emails and private conversations,
  • Get access to security cameras and steal video recordings.

Bitdefender discovered this vulnerability in Ring Video Doorbell Pro devices in June this year and responsibly reported it to Amazon, but got no update from the company.

hacking wifi password

When requested for an update in late July, the vendor closed the vulnerability report in August and marked it as a duplicate without saying whether a third party already reported this issue.

However, after some communication with the vendor, an automatic fix for the vulnerability was partially issued on 5th September.

"However, to be on the safe side Ring Video Doorbell Pro users should make sure they have the latest update installed. If so, they're safe."

A similar security vulnerability was discovered and patched in the Ring Video Doorbell devices in early 2016 that was also exposing the owner's WiFi network password to attackers.

Have something to say about this article? Comment below or share it with us on Facebook, Twitter or our LinkedIn Group.

TIOBE Index for November 2019

November Headline: C getting close to Java, Swift enters top 10 and Rust scores all time high

This month there are couple of interesting moves in the TIOBE index top 20. First of all, C is getting really close to Java now. The difference is only 0.2%. May be C will become number 1 again before the end of the year. It is also exciting to see who is taking the top 10 position. This changes almost every month. Two months ago this was SQL, last month it was Objective-C, but this month Swift takes over. The gap with Ruby at position 11 is almost 0.4%, which might indicate that Swift is keeping its top 10 position at least for a couple of months. It is also interesting to note that Rust scored an all time high by jumping from position 34 to 25 in one month. If the positive news about Rust continues it might become a member of the top 20.
The TIOBE Programming Community index is an indicator of the popularity of programming languages. The index is updated once a month. The ratings are based on the number of skilled engineers world-wide, courses and third party vendors. Popular search engines such as Google, Bing, Yahoo!, Wikipedia, Amazon, YouTube and Baidu are used to calculate the ratings. It is important to note that the TIOBE index is not about the best programming language or the language in which most lines of code have been written.
The index can be used to check whether your programming skills are still up to date or to make a strategic decision about what programming language should be adopted when starting to build a new software system. The definition of the TIOBE index can be found here.
Nov 2019 Nov 2018 Change Programming Language Ratings Change
11
Java16.246%-0.50%
22
C16.037%+1.64%
34changePython9.842%+2.16%
43changeC++5.605%-2.68%
56changeC#4.316%+0.36%
65changeVisual Basic .NET4.229%-2.26%
77
JavaScript1.929%-0.73%
88
PHP1.720%-0.66%
99
SQL1.690%-0.15%
1012changeSwift1.653%+0.20%
1116changeRuby1.261%+0.17%
1211changeObjective-C1.195%-0.28%
1313
Delphi/Object Pascal1.142%-0.28%
1425changeGroovy1.099%+0.50%
1515
Assembly language1.022%-0.09%
1614changeR0.980%-0.43%
1720changeVisual Basic0.957%+0.10%
1823changeD0.927%+0.25%
1917changeMATLAB0.890%-0.14%
2010changeGo0.853%-0.64%

PHP:

Other programming languages

The complete top 50 of programming languages is listed below. This overview is published unofficially, because it could be the case that we missed a language. If you have the impression there is a programming language lacking, please notify us at tpci@tiobe.com. Please also check the overview of all programming languages that we monitor.
PositionProgramming LanguageRatings
21Perl0.831%
22SAS0.825%
23PL/SQL0.641%
24Dart0.615%
25Rust0.506%
26Scratch0.463%
27Lisp0.407%
28COBOL0.391%
29Fortran0.390%
30Scala0.387%
31RPG0.385%
32Transact-SQL0.380%
33Logo0.324%
34ABAP0.306%
35Kotlin0.300%
36Ada0.296%
37Scheme0.288%
38Lua0.270%
39ML0.251%
40Julia0.249%
41F#0.235%
42LabVIEW0.234%
43TypeScript0.222%
44Haskell0.203%
45Prolog0.181%
46ActionScript0.180%
47VBScript0.180%
48Bash0.178%
49Tcl0.178%
50PostScript0.175%

Criador da programação C++ diz que o Bitcoin é um mal uso de linguagem

Por Rafael Ferreira em 08/11/2019 no site Cointelegrafh.


Criador da programação C++ diz que o Bitcoin é um mal uso de linguagem
Em uma recente entrevista ao Artificial Intelligence Podcast de Lex Fridman, o criador da programação C++, Bjarne Stroustrup, lamentou profundamente alguns casos de uso de sua criação, principalmente o Bitcoin.
O cientista dinamarquês de computação Bjarne Stroustrup, conhecido por criar a linguagem de programação C++, mencionou o Bitcoin como um exemplo desse uso indevido.
Durante a recente entrevista, Stroustrup falou sobre as diferenças entre o design de linguagens de programação. O criador do C ++ expressou ceticismo quanto ao uso da sua linguagem para a criação do Bitcoin:
"Deixe-me dizer assim. Quando você cria a ferramenta, não sabe como ela será usada. Você tenta melhorar a ferramenta observando como está sendo usada, mas (...) realmente não tem controle sobre como a coisa é usada. Então, estou muito feliz e orgulhoso de algumas coisas em que o C ++ está sendo usado e outras que eu gostaria que as pessoas não fizessem. A mineração de Bitcoin é meu exemplo favorito. Utiliza tanta energia quanto a Suíça e serve principalmente criminosos."
Stroustrup parece ser crítico em relação às criptomoedas em duas áreas - consumo maciço de eletricidade e transações ilegais.
No que tange ao alto consumo de energia elétrica, existem vários estudos que analisam o gasto de energia com a mineração de Bitcoin.
Segundo um estudo da empresa CoinShares, 74% de toda a energia gasta com a mineração do ativo digital é de origem renovável.
Muitos analistas acreditam que o sistema de consenso do Bitcoin - que é sustentado pelos mineradores - estimula a competição por novas formas de energia renovável.
Quanto menos se gasta com energia, mais se lucra com a industria de mineração do Bitcoin. Isso faz com que a competição por energias renováveis e baratas seja estimulada.
Na questão da criminalidade, o panorama atual não é mais como o que acontecia a alguns anos atrás. Outras criptomoedas focadas na privacidade - como o Monero - são preferidas para a realização de atividade criminal.
Como mostrou o Cointelegraph, o CEO da exchange CoinCorner afirmou que o Bitcoin não é mais a opção utilizada por criminosos.