Hacking a Linux PC at a Close Distance without Being Connected to a Network

The attack allows the attacker to execute arbitrary code on another PC running Linux. The exploit is possible due to an extremely serious vulnerability in Bluetooth stack inside Linux. The attacker literally can run an application of his choice on the other PC. The exploit was found by Andy Nguyen, a security researcher at Google. …

Continue reading ‘Hacking a Linux PC at a Close Distance without Being Connected to a Network’ »

China is Banning TCP/IP

Arguably an open free and neutral Internet network has never existed and it was all a cynical game of telcos, pretending to obey a bunch of public standards and apply international treaties, in order to expand their monopolistic empires abroad and steal business from other telcos. This world of deception, which also has enabled intelligence …

Continue reading ‘China is Banning TCP/IP’ »

What is the Purpose of REF?

Today, Jo Grady, general secretary of my university trade Union (UCU) wrote these words to all academic staff who are members of the union: “we are asking you to withdraw, where possible, from activities relating to the REF […] […]   These activities are important to employers but they damage our sector. They rely on inappropriate …

Continue reading ‘What is the Purpose of REF?’ »

30 Years Ago

Exactly 30 years ago, Stasi was dissolved. 13 January 1990. 91,000 full time employees and 189,000 unofficial collaborators and informants lost their jobs and privileges. The German government has done a lot to preserve anything which Stasi has ever done. Some links: At this moment in Brussels, inside the EU Parliament there is an exposition on this …

Continue reading ‘30 Years Ago’ »

The Low Cost of 51% Attacks

A web page shows that many crypto currencies lack protection against 51% attacks. For example to double spend in Dash, one needs to pay only 14K$ per hour. To double spend in bitcoin private, 1000$ will suffice. And course benefits of double spending can easily outweigh the costs. In addition some of the higher numbers are questionable. There …

Continue reading ‘The Low Cost of 51% Attacks’ »

Who Can Stand Up Against Abusive Internet Giants? And the Original Sin of the Internet

These companies (Facebook, Google, etc) known as Internet Giants violate our privacy everyday and they have corrupted our minds and our economy worldwide. They have built a totalitarian dystopian future which is here already, where humans and business alike are enslaved by a digital mafia which aims at controlling and taxing the whole global economy through mass surveillance and …

Continue reading ‘Who Can Stand Up Against Abusive Internet Giants? And the Original Sin of the Internet’ »

My Position on UCL Strike

A large number of UCL academics have yesterday started a large scale strike lasting for many weeks. These people are sacrificing their salary [UCL will cut their pay down] and there is a strong support for the strike. The strike is organised on the premises that our employer, UCL, are? cutting down their pension contributions or ending guaranteed income schemes …

Continue reading ‘My Position on UCL Strike’ »

How to Recover Your Coins Lost due to ViaCoin Multisig Bug

In November 2017, users have lost 300 M$ in Ethereum due to a bug in Parity wallet multisig features. At this moment the history repeats with ViaCoin: There is a serious bug in Windows ViaCoin 2.8.3. wallet found here and available since April 2017. As a world premiere, here is the solution! How to Recover Coins …

Continue reading ‘How to Recover Your Coins Lost due to ViaCoin Multisig Bug’ »

Storm is Brewing Over Bitcoin Future

If you read recent media reports about future of bitcoin, you wonder what is going on. For sure it is NOT clear which software or which blockchain we will be calling the “true” or “real” bitcoin in the future. Here is a selection of citations, all very recent, and all about the fork expected to …

Continue reading ‘Storm is Brewing Over Bitcoin Future’ »