For one reason or the other, all of us delete plenty of photos from our phones while choosing the keepers. If you have an iPhone X, your “deleted” images are not entirely gone. As a result – they may be accessible to hackers. Two researchers have recently found a vulnerability that could let hackers access your images, even if you previously deleted them.
There have been a lot of positive. useful and sometimes amusing stories about various image AI & machine learning systems over the past couple of years. There have also been some that are either quite creepy or simply the stuff of nightmares. Whatever you use image recognition AI for, though, it seems it can be easily fooled, with a little bit of work.
A team at MIT’s Computer Science and Artificial Intelligence Laboratoy (CSAIL) these systems are even easier to fool than they thought. In a new paper, they’ve developed a system that is up to 1,000 times faster than existing methods. And it works with “black box” systems, too – these are closed source systems to which a hacker has no access to the code.
Rugged cases like Pelicans are great at protecting your gear. They’re waterproof, climate proof, indestructible and makes a great apple box when you need to sit or stand on something. After having more camera equipment than I am willing to carry on my shoulders, I bought a Pelican 1560 with padded dividers to carry it all.
The way the cases are structured, it is very difficult to put anything large inside, like reflectors or umbrellas into the case, and it is also very space consuming / uneconomical to put things like clamps and power cables and grip equipment inside the case, and almost always stupid to put water bottles inside the watertight case.
Chinese electronics component manufacturer Hangzhou Xiongmai Technology (Xiongmai) has said that its products inadvertently played a roll in Friday’s massive cyber attack that disrupted major internet sites including Twitter, Spotify and PayPal throughout the USA and other parts of the world on Friday.
Xiongmai are a vendor of Internet-connected cameras and DVRs. The company admitted that security vulnerabilities involving weak and unchanged passwords were partly to blame for the attacks. According to security researchers, an Internet of Things (IoT) bot called Mirai is responsible. It’s estimated that Mirai infects over 500,000 devices, and around 10% of these were used in Friday’s DDoS attack.
The internet is slowly (and painfully) discovering that security is a hard mistress. I mean fingerprints have been hacked, and passwords have not been delivering for a long time. Next step was having a camera look at your face to see if you are really you.
Of course, the early systems could be hacked with a high quality printed photo. So security added a “check if it’s alive” method. That in turn was hacked using tablets and videos. The next step was to check if the received images makes sense (so videos were out). But then hackers started using 3D printed masks.
But 3D masks are hard to create. Why not just grab a few of your social media photos, and use those to create a model that looks so real that it fools security systems.
And this is what the team at University of North Carolina did.
I needed an action camera to document DIYP’s trip to Photokina in September. I didn’t really want to have to fork out for a GoPro. It’s just not something I’d use often enough to justify the cost. So, I looked into the cheaper alternatives. This is when I found the Yi HD Action Camera, and some of the side-by-side examples I was seeing with the GoPro Hero3+ Silver just blew me away.
In a world of GoPros and a million cheap competitors, finding the good ones can often be difficult. It doesn’t help that every reviewer out there has a different definition of “good”. So, seeing side-by-side comparisons of footage taken with two cameras at the same time is usually the best way to really see the difference. Even if YouTube’s compression does often destroy what you really want to see.