The Internet - The first Worldwide Tool of Unification ("The End of History")

" ... Now I give you something that few think about: What do you think the Internet is all about, historically? Citizens of all the countries on Earth can talk to one another without electronic borders. The young people of those nations can all see each other, talk to each other, and express opinions. No matter what the country does to suppress it, they're doing it anyway. They are putting together a network of consciousness, of oneness, a multicultural consciousness. It's here to stay. It's part of the new energy. The young people know it and are leading the way.... "

" ... I gave you a prophecy more than 10 years ago. I told you there would come a day when everyone could talk to everyone and, therefore, there could be no conspiracy. For conspiracy depends on separation and secrecy - something hiding in the dark that only a few know about. Seen the news lately? What is happening? Could it be that there is a new paradigm happening that seems to go against history?... " Read More …. "The End of History"- Nov 20, 2010 (Kryon channelled by Lee Carroll)

"Recalibration of Free Choice"– Mar 3, 2012 (Kryon Channelling by Lee Carroll) - (Subjects: (Old) Souls, Midpoint on 21-12-2012, Shift of Human Consciousness, Black & White vs. Color, 1 - Spirituality (Religions) shifting, Loose a Pope “soon”, 2 - Humans will change react to drama, 3 - Civilizations/Population on Earth, 4 - Alternate energy sources (Geothermal, Tidal (Paddle wheels), Wind), 5 – Financials Institutes/concepts will change (Integrity – Ethical) , 6 - News/Media/TV to change, 7 – Big Pharmaceutical company will collapse “soon”, (Keep people sick), (Integrity – Ethical) 8 – Wars will be over on Earth, Global Unity, … etc.) - (Text version)

“…5 - Integrity That May Surprise…

Have you seen innovation and invention in the past decade that required thinking out of the box of an old reality? Indeed, you have. I can't tell you what's coming, because you haven't thought of it yet! But the potentials of it are looming large. Let me give you an example, Let us say that 20 years ago, you predicted that there would be something called the Internet on a device you don't really have yet using technology that you can't imagine. You will have full libraries, buildings filled with books, in your hand - a worldwide encyclopedia of everything knowable, with the ability to look it up instantly! Not only that, but that look-up service isn't going to cost a penny! You can call friends and see them on a video screen, and it won't cost a penny! No matter how long you use this service and to what depth you use it, the service itself will be free.

Now, anyone listening to you back then would perhaps have said, "Even if we can believe the technological part, which we think is impossible, everything costs something. There has to be a charge for it! Otherwise, how would they stay in business?" The answer is this: With new invention comes new paradigms of business. You don't know what you don't know, so don't decide in advance what you think is coming based on an old energy world. ..."
(Subjects: Who/What is Kryon ?, Egypt Uprising, Iran/Persia Uprising, Peace in Middle East without Israel actively involved, Muhammad, "Conceptual" Youth Revolution, "Conceptual" Managed Business, Internet, Social Media, News Media, Google, Bankers, Global Unity,..... etc.)

German anti-hate speech group counters Facebook trolls

German anti-hate speech group counters Facebook trolls
Logo No Hate Speech Movement

Bundestag passes law to fine social media companies for not deleting hate speech

Honouring computing’s 1843 visionary, Lady Ada Lovelace. (Design of doodle by Kevin Laughlin)

Friday, July 27, 2012

Black Hat: Iris scanners 'can be tricked' by hackers

BBC News, 26 July 2012

Related Stories 

Iris scanners are widely recognised
 as one of the most secure biometric
security measures
Security researchers have discovered a way to replicate a person's eye to bypass iris-scanning security systems.

A team at the Universidad Autonoma de Madrid was able to recreate the image of an iris from digital codes of real irises stored in security databases.

The findings were shared at the annual Black Hat security conference in Las Vegas.

It raises doubts over what is considered to be one of the most secure methods of biometric security.

Researcher Javier Galbally and his team, which included researchers from West Virginia University, were able to print out synthetic images of irises.

In one experiment, the researchers tested their fake irises against a leading commercial-recognition system. In 80% of attempts, they said, the scanner believed it was a real eye.

While researchers have been able to create realistic iris images for some time, it is thought that this is the first instance where the fake image can be generated from the iris code of a real person - a method which could be used to steal someone's identity.

An iris code is the data stored by recognition systems when it scans a person's eye. It contains around 5,000 different pieces of information.

Digital WMD

The research was explained to an audience at the annual Black Hat conference, a meeting of the leading figures in IT security from across the world.

Shawn Henry, the former head of the FBI's cybercrime unit, gave a key speech at the event.

He urged security experts to counter-attack in their attempts to stamp out criminal activity.

"We need warriors to fight our enemies, particularly in the cyber world right now," he told his audience.

"I believe the threat from computer network attack is the most significant threat we face as a civilised world, other than a weapon of mass destruction."

He called on the computer security industry to begin looking at ways of gathering intelligence on possible attacks and attackers, rather than seeking simply to block them when they happen.

"It is not enough to watch the perimeter," Mr Henry said.

"We have to be constantly hunting, looking for tripwires.

"Intelligence is the key to all of this. If we understand who the adversary is, we can take specific actions."

Apple appearance

For the first time, Apple representatives will be speaking at the Black Hat event.

The company is expected to outline security features in the coming release of its latest mobile operating system, iOS.

The appearance comes at a crucial time for Apple. Earlier in the year, the company's Mac range suffered a malware attack, with more than 500,000 machines infected.

The fallout put a dent in Apple's reputation for producing computers that were safe from the kind of attacks which are common on PCs.

According to Black Hat's general manager Trey Ford, Apple was scheduled to appear at the event in 2008, but pulled out after the company's marketing team intervened.

"Bottom line - no-one at Apple speaks without marketing approval," Mr Ford wrote in an email quoted by Bloomberg.

"Apple will be at Black Hat 2012, and marketing is on board."

No comments: