Toggle light / dark theme

Terrifying AI Matches DNA to Facial Recognition Databases

Cops would love to have a system that uses DNA from a crime scene to generate a picture of a suspect’s face, but that tech is still restricted to science fiction.

That technology may never exist, but a team of Belgian and American engineers just developed something similar. Using what they know about how DNA shapes the human face, the researchers built an algorithm that scans through a database of images and selects the faces that could be linked to the DNA found at a crime scene, according to research published Wednesday in the journal Nature Communications — a powerful crime-fighting tool, but also a terrifying new way to subvert privacy.

Read more

The New Era of Exponential Encryption

In their book “Era of Exponential Encryption — Beyond Cryptographic Routing” the authors provide a vision that can demonstrate an increasing multiplication of options for encryption and decryption processes: Similar to a grain of rice that doubles exponentially in every field of a chessboard, more and more newer concepts and programming in the area of cryptography increase these manifolds: both, encryption and decryption, require more session-related and multiple keys, so that numerous options even exist for configuring hybrid encryption: with different keys and algorithms, symmetric and asymmetrical methods, or even modern multiple encryption, with that ciphertext is converted again and again to ciphertext. It will be analyzed how a handful of newer applications like e.g. Spot-On and GoldBug E-Mail Client & Crypto Chat Messenger and other open source software programming implement these encryption mechanisms. Renewing a key several times — within the dedicated session with “cryptographic calling” — has forwarded the term of “perfect forward secrecy” to “instant perfect forward secrecy” (IPFS). But even more: if in advance a bunch of keys is sent, a decoding of a message has to consider not only one present session key, but over dozens of keys are sent — prior before the message arrives. The new paradigm of IPFS has already turned into the newer concept of these Fiasco Keys are keys, which provide over a dozen possible ephemeral keys within one session and define Fiasco Forwarding, the approach which complements and follows IPFS. And further: by adding routing- and graph-theory to the encryption process, which is a constant part of the so called Echo Protocol, an encrypted packet might take different graphs and routes within the network. This shifts the current status to a new age: The Era of Exponential Encryption, so the vision and description of the authors. If routing does not require destination information but is replaced by cryptographic in.

Read more

These $10 Sensor-Packed Gloves Could Give Robots a Sense of Touch

Machines are mastering vision and language, but one sense they’re lagging behind on is touch. Now researchers have created a sensor-laden glove for just $10 and recorded the most comprehensive tactile dataset to date, which can be used to train machine learning algorithms to feel the world around them.

Dexterity would be an incredibly useful skill for robots to master, opening up new applications everywhere from hospitals to our homes. And they’ve been coming along in leaps and strides in their ability to manipulate objects, OpenAI’s cube juggling robotic hand being a particularly impressive example.

So far, though, they’ve had one hand tied behind their backs. Most approaches have relied on using either visual data or demonstrations to show machines how they should grasp objects. But if you look at how humans learn to manipulate objects, you realize that’s just one part of the puzzle.

Read more

I wanted to have a long running post where i will be tracking serious papers about time travel

Also, loosely following technology that could be used to build a real working time machine. Anyone with an interest in time travel is welcome to participate.

But, I have been watching tech news for what could be used to build a time machine. I think we are pretty close. You’d still need a few physics guys with 150+ IQ’s to work on the equations, a guy with a 200+ IQ to figure out how to put the whole thing together, and a guy with billions of dollars to fund it. But most of this stuff is for sale to the public, (short list):

1. quantum computer; to run the calculations.

Read more

/* */