Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

GPT-5 Rumors and Predictions — It’s about to get real silly

Patreon: https://www.patreon.com/daveshap.
GitHub: https://github.com/daveshap.
Cognitive AI Lab Discord: https://discord.gg/yqaBG5rh4j.

Artificial Sentience Reddit: https://www.reddit.com/r/ArtificialSentience/
Heuristic Imperatives Reddit: https://www.reddit.com/r/HeuristicImperatives/

DISCLAIMER: This video is not medical, financial, or legal advice. This is just my personal story and research findings. Always consult a licensed professional.

I work to better myself and the rest of humanity.

Researchers Discover Critical Remote Code Execution Flaw in vm2 Sandbox Library

The maintainers of the vm2 JavaScript sandbox module have shipped a patch to address a critical flaw that could be abused to break out of security boundaries and execute arbitrary shellcode.

The flaw, which affects all versions, including and prior to 3.9.14, was reported by researchers from South Korea-based KAIST WSP Lab on April 6, 2023, prompting vm2 to release a fix with version 3.9.15 on Friday.

“A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox,” vm2 disclosed in an advisory.

How an AI drawing program shook the art world in the 1970s

In 1971, artist Harold Cohen (1928 – 2016) became a visiting scholar at Stanford’s Artificial Intelligence Laboratory. There, he created a computer program called Aaron to answer the question, “What are the minimum conditions under which a set of marks functions as an image?”

The first iteration of Aaron generated abstract drawings. Later iterations in the 1980s drew rocks, plants, people, and other animals. Cohen’s program was one of the first examples of how AI could be used in creative fields like art.

In a paper titled “How to Make a Drawing,” which Cohen submitted to the National Bureau of Standards in 1982, he predicted that advancements in AI would result in a “cultural shock-wave of unprecedented proportions.”

How Zelensky’s Forces Are Using Stealthy Cardboard Drones To Bleed Russian Forces In The Ukraine War

Ukrainian troops have been using Corvo Precision Payload Delivery System (PPDS) drones that are made out of cardboard. At least 100 of the flat-packed drones are being supplied to Ukraine each month, as per a report by The Australian. These cardboard UAVs allow Ukrainian forces to drop bombs, deliver supplies and undertake vital reconnaissance missions. Watch the video to find out what the Precision Payload Delivery System is?

#russiaukrainewar #warinukraine #cardboarddrones #ppdsdrones #worldnews.

00:00 – INTRODUCTION
01:15 — WHAT IS PRECISION PAYLOAD DELIVERY SYSTEM (PPDS)?
02:28 — WHAT MAKES ‘CARDBOARD DRONES’ STEALTHIER?
02:58 — WHAT IS THEIR PRIMARY USE?
05:00 — WHEN WAS PPDS SUPPLIED TO UKRAINE?
06:05 — SIGNIFICANCE OF DRONES IN UKRAINE WAR

N18oc_world n18oc_crux.

CRUX is your daily video news guide to the big events that are shaping our world. We track news, geopolitics, diplomacy and defence strategies and explain how they shape national policies. Crux makes sense of global developments, and analyses their impact on daily lives.

Follow CRUX on Telegram: https://bit.ly/3fnlLua.

Boyd Bushman On Antigravity

Former Lockheed Martin Skunkworks Senior Scientist comes out about Antigravity Propulsion Devices and how they tie into what is known as “Singularity” which allow you to move anywhere within the universe instantaneously.

Humans have this technology, and have had for more than 50 years.

How Variable Speed of Light Explains Gravity

A little more technical account how GR tests are describes by VSL and how Newton’s law is recovered.

14:18: c is the lower speed of light IN the gravitational field, not OUTSIDE. Same for frequencies and wavelengths.

16:42: 1,75″ was not yet found by Einstein in 1911, but in 1915.

18:00 Discussing the blueshift wen photons fall into the gravitational field. The redshift occurs of course when the photons come out.

Computer hardware company MSI hacked, BIOS source code and private keys stolen

According to reports, the Taiwanese computer hardware company MSI (Micro-Star International) was recently joined to the list of victims of a new ransomware gang that goes by the name “Money Message.” The perpetrators of the cybercrime say that they have taken source code along with other critical material from the company’s network. MSI is a world-renowned leader in the production of computer components, such as motherboards, graphics cards, desktop computers, laptop computers, servers, and other electronic equipment. It brings in more than $6.5 billion in income every year.

Money Message has included MSI on the website that it maintains for the publication of leaked material and has published images of the company’s CTMS and ERP databases in addition to files that include software source code, private keys, and BIOS firmware. If MSI does not comply with the threat actors’ demand for a ransom payment, they will now threaten to release all of the information that was taken.

The perpetrators of the hack claim to have taken 1.5 terabytes worth of data, including databases and source code, from MSI’s servers. They are holding out for a ransom payment of four million dollars.