Toggle light / dark theme

If you wanted to, you could access an “evil” version of OpenAI’s ChatGPT today—though it’s going to cost you. It also might not necessarily be legal depending on where you live.

However, getting access is a bit tricky. You’ll have to find the right web forums with the right users. One of those users might have a post marketing a private and powerful large language model (LLM). You’ll connect with them on an encrypted messaging service like Telegram where they’ll ask you for a few hundred dollars in cryptocurrency in exchange for the LLM.

Once you have access to it, though, you’ll be able to use it for all the things that ChatGPT or Google’s Bard prohibits you from doing: have conversations about any illicit or ethically dubious topic under the sun, learn how to cook meth or create pipe bombs, or even use it to fuel a cybercriminal enterprise by way of phishing schemes.

Get a Wonderful Person Tee: https://teespring.com/stores/whatdamath.
More cool designs are on Amazon: https://amzn.to/3wDGy2i.
Alternatively, PayPal donations can be sent here: http://paypal.me/whatdamath.

Hello and welcome! My name is Anton and in this video, we will talk about a study that potentially created the world’s first quantum piston engine.
Links:
https://www.nature.com/articles/s41586-023-06469-8
https://www.oist.jp/news-center/news/2023/9/28/powering-quan…es-horizon.
#quantum #engine #breakthrough.

Support this channel on Patreon to help me make this a full time job:
https://www.patreon.com/whatdamath.

Bitcoin/Ethereum to spare? Donate them here to help this channel grow!
bc1qnkl3nk0zt7w0xzrgur9pnkcduj7a3xxllcn7d4
or ETH: 0x60f088B10b03115405d313f964BeA93eF0Bd3DbF

Space Engine is available for free here: http://spaceengine.org.
Enjoy and please subscribe.

Twitter: https://twitter.com/WhatDaMath.

‘Etherhiding’ Blockchain Technique Hides Malicious Code in WordPress Sites: https://informatech.co/3S3tw


A threat actor has been abusing proprietary blockchain technology to hide malicious code in a campaign that uses fake browser updates to spread various malware, including the infostealers RedLine, Amadey, and Lumma.

While abuse of blockchain is typically seen in attacks aimed at stealing cryptocurrency — as the security technology is best known for protecting these transactions — EtherHiding demonstrates how attackers can leverage it for other types of malicious activity.

Researchers from Guardio have been tracking a campaign dubbed ClearFake over the last two months in which users are misled into downloading malicious fake browser updates from at least 30 highjacked WordPress sites.

In the intricate landscape of global cybersecurity, Webwyrm malware has surfaced as a formidable adversary, casting its ominous shadow across 50 nations and leaving in its wake over 100,000 compromised victims. This insidious digital menace successfully emulates in excess of 1,000 reputable companies globally, with the ensuing potential financial fallout estimated to surpass a staggering $100 million. It is imperative for cybersecurity professionals and organizations alike to comprehend the multifaceted nature of this threat to devise and implement robust defensive strategies effectively.

In the dynamic realm of cyber threats, malicious actors incessantly refine their Tactics, Techniques, and Procedures (TTPs), exploiting extant vulnerabilities and augmenting the efficacy of their malicious campaigns. Webwyrm epitomizes this relentless pursuit of evolution, embodying a level of sophistication reminiscent of infamous cyber threats of yore, such as the notorious ‘Blue Whale Challenge.’

WebWyrm malware orchestrates a complex, deceptive narrative aimed at duping unsuspecting job seekers into relinquishing their cryptocurrency. Initiating contact predominantly via WhatsApp, the malefactors likely leverage data procured from employment portals to pinpoint and engage individuals predisposed to their deceptive overtures. Prospective victims are enticed with promises of lucrative weekly remuneration, ranging between $1200 and $1500, contingent upon the completion of daily task “packets” or “resets.”

Get a Wonderful Person Tee: https://teespring.com/stores/whatdamath.
More cool designs are on Amazon: https://amzn.to/3wDGy2i.
Alternatively, PayPal donations can be sent here: http://paypal.me/whatdamath.

Hello and welcome! My name is Anton and in this video, we will talk about an invention of a DNA bio computer.
Links:
https://www.nature.com/articles/s41586-023-06484-9
https://www.washington.edu/news/2016/04/07/uw-team-stores-di…perfectly/
Other videos:
https://youtu.be/x3jiY8rZAZs.
https://youtu.be/JGWbVENukKc.


#dna #biocomputer #genetics.

0:00 Quantum computer hype.
0:50 Biocomputers?
1:55 Original DNA computers from decades ago.
3:10 Problems with this idea.
3:50 New advances.
5:35 First breakthrough — DNA circuit.
7:30 Huge potential…maybe.

Support this channel on Patreon to help me make this a full time job:
https://www.patreon.com/whatdamath.

Bitcoin/Ethereum to spare? Donate them here to help this channel grow!
bc1qnkl3nk0zt7w0xzrgur9pnkcduj7a3xxllcn7d4
or ETH: 0x60f088B10b03115405d313f964BeA93eF0Bd3DbF

Space Engine is available for free here: http://spaceengine.org.

https://informatech.co/3RVp6BM by Elizabeth Montalbano.


Attackers are employing a new type of certificate abuse in an attempt to spread info-stealing malware, with the aim of collecting credentials and other sensitive data. In some instances, the goal is to steal cryptocurrency from Windows systems.

The campaign uses search engine optimization (SEO) poisoning to deliver search results featuring malicious pages promoting illegal software cracks and downloads. In the background, the pages deliver remote access Trojans (RATs) known as LummaC2, and RecordBreaker (aka Raccoon Stealer V2) researchers from South Korea-based AhnLab revealed in a blog post on Oct. 10.

Notably, the malware uses abnormal certificates featuring Subject Name and Issuer Name fields that have unusually long strings, which means they require specific tools or infrastructure to inspect the certificates and are not visible in Windows systems. Specifically, the signature strings include Arabic, Japanese, and other non-English languages, along with special characters and punctuation marks, diverging from the typical English character string structures, the researchers noted.

Year 2018 face_with_colon_three


Computers are shrinking rapidly. You can build a pretty capable little machine powered by a device like the Raspberry Pi, but that’s still huge compared with IBM’s latest machine. The company that started out selling massive mainframe computers has developed the world’s smallest computer (Opens in a new window). Each one is smaller than a grain of salt, but it packs more computing power than you’d expect.

The micro-computer is a complete system-on-a-chip (SoC) with a processor, memory, storage, and a communication module. The CPU contains several hundred thousand transistors, and IBM says it’s capable of performance on par with an x86 CPU from 1990. That’s not very fast compared with even the slowest modern computers, but it’s impressive for something you can’t see without a magnifying glass. It makes more sense when you look at the impressive developments in other SoC designs. The latest Qualcomm Snapdragon chips are about 1 square centimeter and have more processing power than supercomputers from the early 90s.

The chip is just a prototype right now, but IBM has big plans (Opens in a new window) for this (literally) microscopic computer. It’s touting this as a significant advancement for blockchain technology, but not the same blockchain that’s used to track Bitcoin transactions. A blockchain is merely a distributed ledger that can be used for various purposes. IBM and other companies have been looking for ways to use blockchains without the cryptocurrency attached.

For every NFT sold, there are four more that weren’t giving buyers ample choice on what they wanted to pick and at what price.

As many as 95 percent of the non-fungible tokens or NFTs created during the bull run of cryptocurrencies just a couple of years ago are now worthless, according to a new report from a website dappGambl that reviews crypto products.

NFTs were all over the news in 2021–22 when celebrities splurged millions of dollars to buy images features Bored Apes and a digital copy of events such as the completion of the code of the World Wide Web or the first tweet from Jack Dorsey on the platform that has now become X.

Table of Contents:

0) — Intro : 0:00 — 1:49
1) — Ionopocalypse : 1:49 — 7:32
2) — Petrocalypse : 7:32 — 17:03
3) — Ecocalypse : 17:03 — 25:43
4) — Nuclear Apocalypse : 25:43 — 31:06
5) — Biopocalypse : 31:06 — 35:39
6) — Nanopocalypse : 35:40 — 40:15
6) — Infopocalypse : 40:15 — 52:57
7) — Geopocalypse : 52:58 — 58:59
8) — Astropocalypse : 58:59 — 1:04:14
9) — Xenopocalypse1:04:14 — 1:13:10

TWITTER https://twitter.com/hyperontic.
PATREON https://www.patreon.com/hyperontic.
BITCOIN 14ZMLNppEdZCN4bu8FB1BwDaxbWteQKs8i.
BITCOIN CASH 1LhXJjN4FrfJh8LywR3dLG2uGXSaZjey9f.
ETHEREUM 0x1f89b261562C8D4C14aA01590EB42b2378572164
LITECOIN LdB94n8sTUXBto5ZKt82YhEsEmxomFGz3j.
CHAINLINK 0xDF560E12fF416eC2D4BAECC66E323C56af2f6666.