vimarsana.com

Page 5 - System Security Hackers News Today : Breaking News, Live Updates & Top Stories | Vimarsana

Blockchain-based copyright protect

 E-Mail Blockchain is a decentralized technology used to protect the security and privacy of online transactions and is usually associated with cryptocurrencies such as Bitcoin. However, it is a mechanism that can be applied to all kinds of digital exchanges. In a new study, researchers from the K-riptography and Information Security for Open Networks (KISON) group at the Internet Interdisciplinary Institute (IN3) Amna Qureshi and professor David Megías (who is also the director of the IN3) analysed existing blockchain-based multimedia content protection systems and established a taxonomy to classify them according to their technical features, the protection techniques they use and their performance. The study is the first detailed analysis of this type of application and looks at the technological and scientific challenges for their improvement and implementation.

More privacy when using WhatsApp, Signal and Co

 E-Mail IMAGE: This is how the planned ContactGuard integration in the address book application could look like: Activating a sensitive contact function denies messenger services and third-party providers access to the data.. view more  Credit: © Lunghammer - TU Graz/TU Darmstadt When installing a messaging service on a smartphone, users are usually prompted to give the app access to their own phone address book. This will automatically connect them with those contacts from their address book who already use the messaging service. For this purpose, the service provider matches the telephone address books with its own contact database. This process currently uploads the complete address books to the service provider s servers.

Finnish study shows how the uncertainty in the Bitcoin market responds to cyberattacks

A University of Vaasa researcher, Klaus Grobys, investigates how the uncertainty in the Bitcoin market reacts if Bitcoin is subject to hacking incidents - or so-called cyberattacks. The study finds two effects on Bitcoin volatility - an immediate effect and a delayed effect. The proposed model could potentially serve as a tool for investors that are active in the derivative market for cryptocurrencies.

Deepfake detectors can be defeated, computer scientists show for the first time

Loading video. VIDEO: XceptionNet, a deep fake detector, labels an adversarial video created by the researchers as real. view more  Credit: University of California San Diego Systems designed to detect deepfakes videos that manipulate real-life footage via artificial intelligence can be deceived, computer scientists showed for the first time at the WACV 2021 conference which took place online Jan. 5 to 9, 2021. Researchers showed detectors can be defeated by inserting inputs called adversarial examples into every video frame. The adversarial examples are slightly manipulated inputs which cause artificial intelligence systems such as machine learning models to make a mistake. In addition, the team showed that the attack still works after videos are compressed.

© 2025 Vimarsana

vimarsana © 2020. All Rights Reserved.