Toggle light / dark theme

What Was There Before the Big Bang? 3 Good Hypotheses!

Support this channel: Sign up for ESET Home internet security for FREE: https://www.eset.com/us/protecting-ar
ESET is sponsoring the STARMUS festival in Bratislava, Slovakia May 12–17, 2024: https://www.starmus.com/

TALK TO ME on Patreon:
/ arvinash.

REFERENCES
Video: A Universe from nothing: • What came before the Big Bang? Quantu…
Video: Eternal Inflation: • Eternal Inflation: The BEST MULTIVERS…
Multiverse Theory: https://tinyurl.com/2cv2qxbm.
Math proof universe can come from nothing: https://tinyurl.com/np2vrty.
Paper of above: https://tinyurl.com/223t86z6
What came before big bang: https://tinyurl.com/y7g4pgwp.

CHAPTERS
0:00 Big bang: Lamda-CDM model.
3:09 Sponsor: ESET
4:22 Cyclic universe.
5:33 How likely is cyclic model?
7:53 Multiverse: Eternal Inflation.
11:27 Universe from nothing.
15:23 Why can’t we answer this question?

SUMMARY
What came before the Big Bang? what happened before the big bang? Since time is thought to have started at the big bang, asking what happened \.

Space Age Security: How Satellites Could Extend Quantum Encryption Globally

How can we guarantee that data sent over the internet is only accessible to its intended recipient? Currently, our data is secured using encryption methods based on the premise that factoring large numbers is a complex task. However, as quantum computing advances, these encryption techniques may become vulnerable and potentially ineffective in the future.

Encryption by means of physical laws

Tobias Vogl, a professor of Quantum Communication Systems Engineering, is working on an encryption process that relies on principles of physics. “Security will be based on the information being encoded into individual light particles and then transmitted. The laws of physics do not permit this information to be extracted or copied. When the information is intercepted, the light particles change their characteristics. Because we can measure these state changes, any attempt to intercept the transmitted data will be recognized immediately, regardless of future advances in technology,” says Tobias Vogl.

Navigating The Generative AI Divide: Open-Source Vs. Closed-Source Solutions

If you’re considering how your organization can use this revolutionary technology, one of the choices that have to be made is whether to go with open-source or closed-source (proprietary) tools, models and algorithms.

Why is this decision important? Well, each option offers advantages and disadvantages when it comes to customization, scalability, support and security.

In this article, we’ll explore the key differences as well as the pros and cons of each approach, as well as explain the factors that need to be considered when deciding which is right for your organization.

A National Security Insider Does the Math on the Dangers of AI

Jason Matheny is a delight to speak with, provided you’re up for a lengthy conversation about potential technological and biomedical catastrophe.

Now CEO and president of Rand Corporation, Matheny has built a career out of thinking about such gloomy scenarios. An economist by training with a focus on public health, he dived into the worlds of pharmaceutical development and cultivated meat before turning his attention to national security.

As director of Intelligence Advanced Research Projects Activity, the US intelligence community’s research agency, he pushed for more attention to the dangers of biological weapons and badly designed artificial intelligence. In 2021, Matheny was tapped to be President Biden’s senior adviser on technology and national security issues. And then, in July of last year, he became CEO and president of Rand, the oldest nonprofit think tank in the US, which has shaped government policy on nuclear strategy, the Vietnam War, and the development of the internet.

SpaceX’s Upcoming Starship Launch Schedule and FAA Approval Update

SpaceX is preparing for upcoming Starship launches and is working on upgrading launch support infrastructure, but still needs FAA approval for the new launch schedule.

Questions to inspire discussion.

What upgrades is SpaceX making to the Starship launch support infrastructure?

—SpaceX is repairing and upgrading the infrastructure to improve vehicle landing, engine burn control, booster landing, heat shield tile security, and re-entry roll issues.

22,500 Palo Alto firewalls “possibly vulnerable” to ongoing attacks

Approximately 22,500 exposed Palo Alto GlobalProtect firewall devices are likely vulnerable to the CVE-2024–3400 flaw, a critical command injection vulnerability that has been actively exploited in attacks since at least March 26, 2024.

CVE-2024–3400 is a critical vulnerability impacting specific Palo Alto Networks’ PAN-OS versions in the GlobalProtect feature that allows unauthenticated attackers to execute commands with root privileges using command injection triggered by arbitrary file creation.

The flaw was disclosed by Palo Alto Networks on April 12, with the security advisory urging system administrators to apply provided mitigations immediately until a patch was made available.

Tesla set to roll out awesome new Sentry Mode feature

Tesla is set to roll out an awesome new feature with Sentry Mode, allowing owners to watch the video clip recorded by the car on their phone.

Sentry Mode is a security feature on Tesla vehicles that records instances and events that occur near the car. It has helped solve things as simple as petty vandalism, like keying, and even liability in accidents.

For years, it has been available on Tesla vehicles. Yet, people are still not aware of this capability and continue to commit crimes on the cars, not realizing they are being recorded.

Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack

Threat actors have been exploiting the newly disclosed zero-day flaw in Palo Alto Networks PAN-OS software dating back to March 26, 2024, nearly three weeks before it came to light yesterday.

The network security company’s Unit 42 division is tracking the activity under the name Operation MidnightEclipse, attributing it as the work of a single threat actor of unknown provenance.

The security vulnerability, tracked as CVE-2024–3400 (CVSS score: 10.0), is a command injection flaw that enables unauthenticated attackers to execute arbitrary code with root privileges on the firewall.

/* */