8.5 C
New York
Monday, June 23, 2025
Blog Page 29

Do yourself a favor and buy an iPad during lockdown

Do yourself a favor and buy an iPad during lockdown

We’re all consuming a whole lot of content these days as we’re stuck at home due to the spread of coronavirus. Most of us have plenty of screens to distract ourselves with, from TVs to computers to the phone in your pocket, and that last one is probably running Android if you’re one of our readers. Even so, if you pick up a tablet to watch content at home right now, it should probably be an iPad, for a few key reasons.

I should preface this by saying there are nice Android tablets out there, and Amazon’s Kindle Fires are an incredible value and probably the best cheap content consumption devices you can get. But if you want the best tablet experience, you should really just get an iPad.

The Apps

By far, the biggest advantage of having an iPad comes down to apps. iOS has more of them. It also has more exclusives, it usually gets apps for new services or games first, and apps for iPads often make better use of big-screen layouts than Android apps do. Even if you hate iOS and its weird dated home screen layout, awkwardly monolithic Settings app, arbitrary and draconian default app restrictions, and the lack of deep Google services integration, the apps kind of make up for it.

I will never not be salty that Android didn’t get FTL. Also, don’t buy that keyboard, it’s bad. 

You get well-known games like Civilization VI, FTL, ROME: Total War, and Hyper Light Drifter. It has powerful photo editing tools like Pixelmator Photo: a RAW editor that can almost go toe-to-toe with the desktop version of Adobe’s Lightroom. If you prefer drawing to photography, iPads are also the only way to use Procreate, which is the golden standard for digital illustration right now. And if more office-style productivity is up your alley, award-winning apps like like Things, a popular to-do list/task manager,  and Bear, a powerful markdown text editor/note taker, can’t be found on Android.

This is all ignoring the fact that apps available on both platforms are often just better on iOS. Although Gmail is up to parity on the two platforms now, other productivity/work apps (like WordPress, for example) offer a far better interface and experience on the iPad. Even the iPad version of Spotify spanks the tablet layout on Android, which is basically just a blown-up phone, and apps like Slack just run better.

It won’t beat a laptop for work, but you can get some things done.

Even in my personal experience as a blogger, able to do almost all of my job from the web, the iPad still offers a better overall environment compared to Android tablets (or even Chromebooks, sometimes). Importing and processing photos is a breeze, and multi-window workflows that have me interacting with our CMS in a browser, coordinating over Slack, and organizing coverage may not be as smooth as they would be on a desktop, but they beat the pants off an Android tablet.

Updates

Software isn’t just about the apps you run, it’s also about the system itself. Again, there are a lot of things to dislike coming from the relative freedom of Android, but iPads have one big advantage over most Android tablets, and that’s Apple’s relatively bonkers commitment to updates. Although the first iPad model only got updates for a couple years (about standard with Android), all the other models have gotten around 5-6 years of support. That’s ages further than you can expect from an Android device — though it’s important to note: Google has promised updates for its Chrome OS-powered Pixel Slate tablet until 2026.

Even if you manage to get more than two years of updates from an Android tablet, the odds are pretty good it won’t see any new features land later in its life. While Android manufacturers are content to switch older devices over to security-only maintenance updates after a year or two, Apple continues to deliver major new versions of iOS (now iPad OS) to its devices for far longer. A Samsung Galaxy Tab Whatever just can’t compete when it comes to software updates.

Hardware

Lastly, there’s the hardware, and it’s another area in which Apple does pretty well. iPads might not have AMOLED displays like the latest Samsung tablets do, but its screens are still among the best out there. If you can spend the cash, the iPad Pro line has super-smooth (and very bright) 120Hz displays, but even the 60Hz screens on the less expensive iPad Air and iPad have accurate color calibration and great brightness. That’s not to mention how snappy Apple’s A-series chipsets are — they really do fly on iOS.

In fact, Apple’s hardware is so good, you can get away with buying an older model to save a bit of cash, too. Even a 2017 iPad Pro performs quite well in 2020 — I’m still using one, myself, and I see no reason to upgrade. But if you want something a little better, you can get an Apple-refurbished 2018 iPad Pro purchased directly from the company right now starting at just $550, though I think the base 2019 iPad is fine for most people, and it starts at just $329 brand new (and frequently much cheaper, it’s often on sale). Do steer away from the super-old iPad and iPad Air models frequently sold for very low prices at places like Woot, though.

You don’t need the “Pro” version, the base iPad is fine for most folks.

In fact, if you’re willing to accept a refurb, Apple’s deals are pretty decent, since they come with a first-party warranty and the option for extended AppleCare+.

And it’s not just the iPad’s hardware itself. When it comes to accessories, no other tablet is as widely supported. There’s a crazy selection of cases, stands, screen protectors, and keyboards that Android tablet owners only wish they could choose between.

Even if you don’t like Apple, or you think iOS is derpy and restrictive — which is, in my opinion, unarguably true — iPads really do offer the best big-screen tablet environment. A Kindle Fire should probably be the budget choice for a content consumption device given the value they represent, but if you’d like to get yourself something genuinely nice to enjoy as you’re trapped indoors for the foreseeable future, just buy an iPad. You might even get some work done on it.

Read More

How we recovered over $300K of Bitcoin

How we recovered over $300K of Bitcoin

Story time! Around twenty years ago, I was working as a reverse-engineer and cryptanalyst for AccessData while getting my Physics degree at BYU. It was the late 90s and early 2000s. The US government had been gradually easing off export restrictions on software containing cryptography, but most software still contained pretty worthless password protection. We’d buy desktop office software, I’d reverse-engineer it to figure out what algorithm it was using for access control, and then break the crypto. It was a never-ending stream of interesting-but-not-impossible math puzzles. I wrote about forty password crackers during my time there. We would sell them to home users, system administrators, and local and federal law enforcement agencies. I got to go down to the Federal Law Enforcement Training Center in Glynco a few times to teach the Secret Service, FBI, and ATF about cryptography and the use of our products.

Two projects really stand out in my memory. The first was Microsoft Word 97. Before Word 97, the files were encrypted by xoring the bytes with a repeating 16-byte string derived from the password. The most common bytes in a Word file were usually either 0x00, 0xFF, or 0x20 (space), so we’d just look at the most common character in each column and try the 316 variations on those. Recovering the key was usually instantaneous, but to help people feel like they’d gotten their money’s worth, we’d put on a little animated show like a Hollywood hacking scene with lots of random characters that gradually revealed the right password.

Microsoft 97 changed that. It might have been possible to find out the encryption format through MSDN, but we were small and couldn’t afford a subscription. It also wasn’t clear that we’d be allowed to write the cracker if we did get the info from them. To figure out how it worked, I used SoftICE to stop the software immediately after typing in the password, then walked slowly up the stack until I could find the algorithm. This was before IDA Pro, so I printed out a few dozen pages of assembly code, taped it to the wall, and drew all over it with a red crayon. I was very pleased when I finally worked it all out. At the time, Microsoft was only allowed to export 40 bit cryptography, so they did as much as they were legally permitted: they’d repeatedly MD5 hash the password with “salt” (randomly chosen bytes stored in the file) to get the 40 bit key, then add salt to that and repeatedly hash it again. It took roughly half a second to test a password on the computers of the time. We had to resort to a dictionary attack, because breaking it outright was pretty much impossible. We did eventually write a cracker for larger companies and agencies that brute-forced the 40-bit keyspace using those fancy MMX instructions on the Pentium. I knew of one place that ran the software for nine months before finally getting in.

The other really fun one one was zip archives. The developer of PKZIP, Phil Katz, made the decision—unusual at the time—to document his file format and include it with his software, making it a favorite of developers. Roger Schlafly designed the stream cipher used for encrypting the archives. The zip standard quickly became by far the most popular compression format on Windows, and many other formats like Java’s .jar format and OpenOffice’s document formats are really zip files with a particular directory structure inside. InfoZIP is an open-source version of the software; its implementation was used as the basis for nearly all other branded zip software, like WinZip. At the time I was trying to crack it, WinZip had 95% of the market.

Eli Biham and Paul Kocher had published a known-plaintext attack on the cipher, but the known plaintext was compressed plaintext. To get the Huffman codes at the start of a deflated file, you basically need the whole file. The attack was practically useless to law enforcement agencies.

The zip cipher has 96 bits of internal state split into three 32-bit chunks called key0, key1, and key2. key0 and key2 are the internal state of two copies of CRC32, a linear feedback shift register. Basically, to update the state with a new byte of data, you shift all the bytes down by one byte (dropping the low byte) then xor in a constant from a lookup table indexed by the byte of data xored with the low byte. key1 is the internal state of a truncated linear congruential generator (TLCG). To update its internal state, you add the data byte, multiply by a constant I’ll call c, and add 1. The cipher works like this: you feed in a data byte to the first CRC32, then take the low byte of that and feed it into the TLCG, then take the high byte of that and feed it into the second CRC32, then take the state and (roughly) square it, then output the second byte of the result as the stream byte. To initialize the 96-bit state, you start from a known state and encrypt the password, then encrypt ten bytes of salt.

PKZIP got its salt bytes by allocating memory without initializing it, so it would contain bits of stuff from other programs you’d been running or images or documents, whatever. That worked fine on Windows, but on many Unix systems, memory gets initialized automatically when it’s allocated. InfoZIP chose the salt bytes by using C’s rand function. It would initialize the state of the random number generator by xoring the timestamp with the process ID, then generate ten bytes per file. Had they left it that way, knowing the timestamp and process ID would be enough information to recover the header bytes, which in turn would let you mount Biham and Kocher’s attack. It seems the InfoZIP authors knew about that attack, because they went one step further and encrypted the headers once using the password. That way an attacker had only doubly-encrypted plaintext, and their attack wouldn’t work.

I noticed that because the password was the same in both passes, the first stream byte was the same each pass. Just like toggling a light switch twice leaves it where it started, xoring a byte twice with the same stream byte leaves it unaffected. This let me mount a very powerful ciphertext only attack: given five encrypted files in an archive, I could derive the internal state of C’s rand function without having to look at the timestamp or knowing the process ID. That let me generate the original, unencrypted headers. Because only a few bits of each part of the cipher affected the next part, I could also guess only a few bits of the state and check whether decrypting the next bytes twice gave me the answer I was expecting. I had to guess fewer and fewer bits of key material as I went on. Each extra file also let me exclude more potential key material; at the time, it took a few hours on a single desktop machine. I published a paper on it and got to present it in Japan at Fast Software Encryption 2001.

I left AccessData in 2002. I worked for a neural networking startup for a year, spent three years on a Master’s degree in Computer Science at the University of Auckland with Cris Calude, started a PhD with the mathematical physicist John Baez at UC Riverside, worked on Google’s applied security team for six years and finished the PhD, and after a few more years ended up as CTO of a startup.

About six months ago, I received, out of the blue, a message on LinkedIn from a Russian guy. He had read that paper I’d written 19 years ago and wanted to know if the attack could work on a file with only two files. A quick analysis said not without an enormous amount of processing power and a lot of money. Because I only had two files to work with, a lot more false positives would advance at each stage. There would end up being 273 possible keys to test, nearly 10 sextillion. I estimated it would take a large GPU farm a year to break, with a cost on the order of $100K. He astounded me by saying he could spend that much to recover the key.

Back in January of 2016, he had bought around $10K or $15K of Bitcoin and put the keys in an encrypted zip file. Now they were worth upwards of $300K and he couldn’t remember the password. Luckily, he still had the original laptop and knew exactly when the encryption took place. Because InfoZip seeds its entropy using the timestamp, that promised to reduce the work enormously—”only” 10 quintillion—and made it quite feasible, a matter of a couple of months on a medium GPU farm. We made a contract and I got to work.

I spent a while reconstructing the attack from the overview in the paper. To my chagrin, there were certain tricky details I had skimmed over in my paper, but I worked them out again. Then I discovered I’d made a terrible mistake while estimating the work!

In my original attack, I would guess the high bytes of key1·c, key1·c², key1·c³, and key1·c⁴. By the time I guessed that fourth byte, I knew the complete state of the rest of the cipher; I just had to convert those four bytes into the original key1 and I was done. I would run through the 32-bit state space for key1 and check each one to see if it gave the proper high bytes. Here, though, I had trillions of keys to check; if I had to do 232 tests on each one, it would take a few hundred thousand years.

I vaguely remembered that there had been some work done on cryptanalyzing TLCGs using lattice reduction, so I dug out the original paper. It was perfect! I just needed to define a lattice with basis vectors given by 232 and the powers of the constant from the TLCG, then do lattice reduction. Given the reduced basis, I could recover the original state from the high bytes just by doing a matrix multiplication.

At least, that was the idea. I would need five bytes to constrain it to a single outcome, and at that point in the attack, I only had four. The process described in the paper rarely gave the right answer. However, I knew the answer had to be close to the right one, so I ran through all the possible key1 values and checked the difference from the answer it gave me and the true one. The difference was always one of 36 vectors! With this optimization, I could run through just 36 possibilities instead of four billion. We were still in business.

The next thing we ran into was the problem of transferring data between the machines with the GPUs on them. My business partner, Nash Foster, was working on the GPU implementation, advising me on how fast different operations are and writing a lot of the support structure for the application into which I put my crypto cracking code. How would we get these petabytes of candidate keys to the GPUs that would test them? They’d be almost idle, twiddling their thumbs waiting for stuff to work on. It occurred to me that each stage of my attack was guessing a lot of bits and then keeping only one candidate out of roughly 65K. If I had some way of using that information to derive bits rather than just guess and check, I’d save a lot of work, and more importantly, a lot of network traffic. The problem with that idea was that the math was too complicated; it involved mixing the math of finite fields with the math of integer rings, and those don’t play nicely together.

I thought about other cryptanalytic attacks I knew, and one that seemed promising was a meet-in-the-middle attack. A meet-in-the-middle attack applies to a block cipher when it uses one part of the key material to do the first half of the encryption and the other part of the key material to do the second half. That sort-of applied to the zip cipher, but the key material far outweighed the number of bits in the middle. Then it occurred to me that I could use the linearity of CRC32 to my advantage: by xoring together two outputs of the last CRC32, the result would be independent of key2! Rather than compute the intermediate state of the cipher and store it in a table, I’d calculate the xor of two intermediate states and store that instead.

I wrote up the differential meet-in-the-middle attack and ran it on my laptop. A stage that had taken hours on my laptop before now finished in mere seconds. The next stage, which I expected to take a week on the GPU farm finished in a few hours on a powerful CPU. I couldn’t quite make it work fast enough on the third stage to be useful in speeding up the overall attack, but it completely obviated the need to move data around: we simply computed the candidates for each GPU on the computer with the cards in it. Nash wrote the GPU code, which ran screamingly fast.

The attack ran for ten days and failed.

I was heartbroken. Had we missed one of the candidate keys? We went back and looked at the maximum process ID on his laptop and discovered it was a few bits larger than we had expected, and therefore there were a couple of other possible initial seeds for rand. I also went back and double-checked all our tests. Was there something we’d missed? Did the CPU-based version behave any differently from the GPU version? Finally I discovered that the GPU version failed to find the correct key when it was the second in a list of candidates, but it worked when it was the first one. Digging into the code, we found that we had swapped the block index with the thread index in computing the offset into the data structure.

We fixed the bug, re-ran the code, and found the correct key within a day. Our client was very happy and gave us a large bonus for finding the key so quickly and saving him so much money over our initial estimate.

I’m currently looking for work in a staff or senior staff engineering or data scientist role. If you’ve got interesting technical analysis or optimization problems, please reach out to me and let’s talk.

Read More

WINDOWS FORMS: TEXT TO SPEECH IN C#

This demo explains how to convert text to speech using C# in Visual Studio 2017 using System.Speech Library

Microsoft .NET framework provides System.Speech.Synthesis for voice synthesis

Step 1: Click New Project, then select Visual C# on the left, then Windows and then select Windows Forms Application. Name your project “TextToSpeech” and then click OK

 

Step 2: Design your form as below

 

 

Step 3: Add code to handle your form as below

 

using System;
using System.Windows.Forms;
using System.Speech.Synthesis;
using System.IO;

namespace TextToSpeech
{
public partial class frmMain : Form
{
SpeechSynthesizer voice;

public frmMain()
{
InitializeComponent();
}

private void frmMain_Load(object sender, EventArgs e)
{
voice = new SpeechSynthesizer();
}

private void btnSpeak_Click(object sender, EventArgs e)
{
try
{
//Select voice
switch (cboSelectVoice.SelectedIndex)
{
case 0:
voice.SelectVoiceByHints(VoiceGender.NotSet);
break;
case 1:
voice.SelectVoiceByHints(VoiceGender.Male);
break;
case 2:
voice.SelectVoiceByHints(VoiceGender.Female);
break;
case 3:
voice.SelectVoiceByHints(VoiceGender.Neutral);
break;
default:
break;
}
voice.SpeakAsync(txtContent.Text);
}
catch (Exception ex)
{
MessageBox.Show(ex.Message, “Message”, MessageBoxButtons.OK, MessageBoxIcon.Error);
}
}

private void btnPause_Click(object sender, EventArgs e)
{
try
{
voice.Pause();
}
catch (Exception ex)
{
MessageBox.Show(ex.Message, “Message”, MessageBoxButtons.OK, MessageBoxIcon.Error);
}
}

private void btnResume_Click(object sender, EventArgs e)
{
try
{
voice.Resume();
}
catch (Exception ex)
{
MessageBox.Show(ex.Message, “Message”, MessageBoxButtons.OK, MessageBoxIcon.Error);
}
}

private void btnSave_Click(object sender, EventArgs e)
{
try
{
//Save text to wav file
using (SaveFileDialog sfd = new SaveFileDialog())
{
sfd.Filter = “Wav files|*.wav”;
sfd.Title = “Save to a wave file”;
if (sfd.ShowDialog() == DialogResult.OK)
{
FileStream fs = new FileStream(sfd.FileName, FileMode.Create, FileAccess.Write);
voice.SetOutputToWaveStream(fs);
voice.Speak(txtContent.Text);
}
}
}
catch (Exception ex)
{
MessageBox.Show(ex.Message, “Message”, MessageBoxButtons.OK, MessageBoxIcon.Error);
}
}
}
}

 

 

WINDOWS FORMS: ADD / EMBED YOUTUBE VIDEOS IN C#

Add / Embed Flash Player to Windows Form Application allows you to view YouTube Videos in C#

Step 1: Click New Project, then select Visual C# on the left, then Windows and then select Windows Forms Application. Name your project “FlashEmbed” and then click OK

Step 2: Design your form as below

Step 3: Add a reference to AxShockwaveFlashObjects library

 

 

Step 4: Add code to handle your form as below

 

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Threading.Tasks;
using System.Windows.Forms;

namespace FlashEmbed
{
public partial class Form1 : Form
{
public Form1()
{
InitializeComponent();
}

private void btnGo_Click(object sender, EventArgs e)
{
if (!string.IsNullOrEmpty(txtUrl.Text))
{
//Get url video
string url = txtUrl.Text.Replace(“watch?v=”, “v/”);
axShockwaveFlash.Movie = url;
axShockwaveFlash.Play();
}
}
}
}

WINDOWS FORMS: HOW TO CREATE A LICENSE KEY IN C#

Create License key, Serial Key Maker, Generate Product Key, Validate a software License Key in C#

Step 1: Click New Project, then select Visual C# on the left, then Windows and then select Windows Forms Application. Name your project “LicenseKey” and then click OK

 

Step 2: Download FoxLearn.License.dll, then add a reference to the FoxLearn.License.dll

Step 3: Design your form as below

Name your main form: Form1

Name your generate license form: frmGenerate

Name  about form: frmAbout

 

Add code to handle Form1

 

namespace LicenseKey
{
    public partial class Form1 : Form
    {
        public Form1()
        {
            InitializeComponent();
        }
        private void btnGenerate_Click(object sender, EventArgs e)
        {
            using(frmGenerate frm = new frmGenerate())
            {
                frm.ShowDialog();
            }
        }
        private void btnRegistration_Click(object sender, EventArgs e)
        {
            using (frmRegistration frm = new frmRegistration())
            {
                frm.ShowDialog();
            }
        }
        private void btnAbout_Click(object sender, EventArgs e)
        {
            using (frmAbout frm = new frmAbout())
            {
                frm.ShowDialog();
            }
        }
    }
}
https://www.youtube.com/watch?v=ctP910qdHhA&feature=youtu.be

Create License key, Serial Key Maker, Generate Product Key, Validate a software License Key in C#

Add code to handle frmGenerate form

namespace LicenseKey
{
public partial class frmGenerate : Form
{
public frmGenerate()
{
InitializeComponent();
}

private void btnGenerate_Click(object sender, EventArgs e)
{
KeyManager km = new KeyManager(txtProductID.Text);
KeyValuesClass kv;
string productKey = string.Empty;
if (cboLicenseType.SelectedIndex == 0)
{
kv = new KeyValuesClass()
{
Type = LicenseType.FULL,
Header = Convert.ToByte(9),
Footer = Convert.ToByte(6),
ProductCode = (byte)ProductCode,//As order of your software
Edition = Edition.ENTERPRISE,
Version = 1
};
if (!km.GenerateKey(kv, ref productKey))//Generate full license key
txtProductKey.Text = “ERROR”;
}
else
{
kv = new KeyValuesClass()
{
Type = LicenseType.TRIAL,
Header = Convert.ToByte(9),
Footer = Convert.ToByte(6),
ProductCode = (byte)ProductCode,
Edition = Edition.ENTERPRISE,
Version = 1,
Expiration = DateTime.Now.Date.AddDays(Convert.ToInt32(txtExperience.Text))
};
if (!km.GenerateKey(kv, ref productKey))//Generate trial license key
txtProductKey.Text = “ERROR”;
}
txtProductKey.Text = productKey;
}

const int ProductCode = 1;

private void frmGenerate_Load(object sender, EventArgs e)
{
cboLicenseType.SelectedIndex = 0;
//Get computer id, it’s unique for each computer
txtProductID.Text = ComputerInfo.GetComputerId();
}
}
}

 

Add code to handle frmRegistration form

 

namespace LicenseKey
{
public partial class frmRegistration : Form
{
public frmRegistration()
{
InitializeComponent();
}

const int ProductCode = 1;

private void btnOK_Click(object sender, EventArgs e)
{
KeyManager km = new KeyManager(txtProductID.Text);
string productKey = txtProductKey.Text;
//Check valid
if(km.ValidKey(ref productKey))
{
KeyValuesClass kv = new KeyValuesClass();
//Decrypt license key
if (km.DisassembleKey(productKey, ref kv))
{
LicenseInfo lic = new LicenseInfo();
lic.ProductKey = productKey;
lic.FullName = “FoxLearn”;
if (kv.Type == LicenseType.TRIAL)
{
lic.Day = kv.Expiration.Day;
lic.Month = kv.Expiration.Month;
lic.Year = kv.Expiration.Year;
}
//Save license key to file
km.SaveSuretyFile(string.Format(@”{0}\Key.lic”, Application.StartupPath), lic);
MessageBox.Show(“You have been successfully registered.”, “Message”, MessageBoxButtons.OK, MessageBoxIcon.Information);
this.Close();
}
}
else
MessageBox.Show(“Your product key is invalid.”, “Message”, MessageBoxButtons.OK, MessageBoxIcon.Information);
}

private void frmRegistration_Load(object sender, EventArgs e)
{
txtProductID.Text = ComputerInfo.GetComputerId();
}
}
}

 

Add code to handle frmAbout form

 

namespace LicenseKey
{
public partial class frmAbout : Form
{
public frmAbout()
{
InitializeComponent();
}

private void btnOK_Click(object sender, EventArgs e)
{
this.Close();
}

const int ProductCode = 1;

private void frmAbout_Load(object sender, EventArgs e)
{
lblProductID.Text = ComputerInfo.GetComputerId();
KeyManager km = new KeyManager(lblProductID.Text);
LicenseInfo lic = new LicenseInfo();
//Get license information from license file
int value = km.LoadSuretyFile(string.Format(@”{0}\Key.lic”, Application.StartupPath), ref lic);
string productKey = lic.ProductKey;
//Check valid
if(km.ValidKey(ref productKey))
{
KeyValuesClass kv = new KeyValuesClass();
//Decrypt license key
if(km.DisassembleKey(productKey, ref kv))
{
lblProductName.Text = “FoxLearn”;
lblProductKey.Text = productKey;
if (kv.Type == LicenseType.TRIAL)
lblLicenseType.Text = string.Format(“{0} days”, (kv.Expiration – DateTime.Now.Date).Days);
else
lblLicenseType.Text = “Full”;
}
}
}
}
}

 

 

If you need the code Leave your email in comment I send you the code in Email.

China kick-starts development of 6G technology a week after 5G network

China kick-starts development of 6G technology less than a week after rolling out its superfast 5G network

  • China has officially begun developing the next-generation internet connection
  • Beijing has drafted 37 experts from universities and institutions for the project
  • The news was announced during a 6G launching ceremony in Beijing on Sunday
  • China’s state-owned telecom carriers launched their 5G data plans last week

China has officially begun the research and development of 6G technology.

The news came less than a week after the country rolled out its superfast 5G network.

The country’s Technology Bureau has formally set up a team of experts to work on the next-generation mobile internet connection, state media said today.

A total of 37 telecommunication specialists drawn from universities, institutions and corporations are on the panel, which is tasked with laying out the development of 6G and proving the scientific feasibility of it.

 

The news was announced during a 6G launch ceremony in Beijing on Sunday, according to a report by Chinanews.com.

Wang Xi, deputy minister of the Technology Bureau, said at the conference that the bureau was set to work with the experts to design a specific research plan for 6G and carry out preliminary research.

China’s three state-owned telecommunication carriers – China Mobile, China Unicom and China Telecom – launched their 5G data plans just last Thursday.

The country is due to activate more than 130,000 5G base stations by the end of this year to support the network, which is one of the world’s largest 5G deployments.

Chinese engineers have already built a ‘5G smart town’ near Shanghai, where residents will be able to download TV series, movies or games at an impressive speed of 1.7GB per second.

5G signal is sent out to the nooks and crannies of the 27-square-mile town of Wuzhen by more than 140 transmitters, which went into service recently.

The country is also on its way to completing a 5G-equipped high-speed train station, in collaboration with Chinese tech giant Huawei.

The ‘superfast’ 5G network will be fitted to the existing Shanghai Hongqiao Railway Station, which is one of Asia’s busiest traffic hubs and handles some 60 million passengers a year.

 

Visitors to the station will be able to download a 2GB high-definition film in less than 20 seconds, according to Huawei.

In comparison, it would take three minutes and 20 seconds to download the same film on a standard 4G network.

WHAT IS 5G AND WHAT DOES IT DO?

The evolution of the G system started in 1980 with the invention of the mobile phone which allowed for analogue data to be transmitted via phone calls.

Digital came into play in 1991 with 2G and SMS and MMS capabilities were launched.

Since then, the capabilities and carrying capacity for the mobile network has increased massively.

More data can be transferred from one point to another via the mobile network quicker than ever.

5G is expected to be up to 1,000 times faster than the currently used 4G.

Whilst the jump from 3G to 4G was most beneficial for mobile browsing and working, the step to 5G will be so fast they become almost real-time.

That means mobile operations will be just as fast as office-based internet connections.

 

 

Potential uses for 5g include:

  • Simultaneous translation of several languages in a party conference call
  • Self-driving cars can stream movies, music and navigation information from the cloud
  • A full-length 8GB film can be downloaded in six seconds.

5G is expected to be so quick and efficient it is possible it could start the end of wired connections.

By the end of 2020, industry estimates claim 50 billion devices will be connected to 5G.

The evolution of from 1G to 5G. The predicted speed of 5G is more than 1Gbps – 1,000 times greater than the existing speed of 4G and could be implemented in laptops of the future

! دنیا کا سب سے خطرناک ہتھیار: ہارپ !

اگر آپ کا خیال ہے کہ جوہری ہتھیار اس وقت سب سے زیادہ طاقت ور ہیں، تو آپ یقینا غلطی پر ہیں۔ امریکی حکومت ایک لمبے عرصہ سے ہارپ ٹیکنولوجی کو فائننس کر رہی ہے، جسکے ذریعہ سے زمین کے موسم، زمین کی سطح اور پورے  کرہ ارض کو اپنی مرضی سے کنٹرول کیا جا سکتا ہے۔ قیاس کیا جارہا ہے کہ پچھلے مہینوں میں آنے والا برما کے ٹائفون اور چین میں آنے والا زلزلہ انہی ہتھیاروں کی کاروائی ہے۔ :eek:
یقینا بہت سے لوگ یہ سن کر حیران ہوں گے، کیونکہ اس قسم کی معلومات بہت کم منظر عام پر آتی ہیں، لیکن یہ سب بالکل جھوٹ بھی نہیں۔ یہ ویڈیو ان ہی شکوک و شبہات پر مشتمل ہے:

چین کے زلزلہ سے 30 منٹ قبل، آسمان پر مختلف رنگوں کا ظاہر ہونا؟:

نیٹ پر سرچ کے دوران آپ کو ہارپ کے متعلق بہت کچھ ملے گا۔

Source:   https://en.wikipedia.org/wiki/High_Frequency_Active_Auroral_Research_Program

 

HAARP stands for High-frequency Active Auroral Research Program. A secret project where human can control weather.

HAARP have been kept secret but by the time secrets are coming out. This weapons have been in testing and used by some countries against others to send earthquakes/heavy rain storms/wind storms/lightning storms/tsunami/volcano etc.

In 1915 American scientist Nikola Tesla presented theory to control weather and use it as weapon. Pentagon started researching about it to make weather control weapon, a weapon superior to nuclear weapons.

America kept refusing about this project but several secrets were revealed by the time that America is working interestingly on HAARP project and wants to make a powerful weather controlling weapon for US military till 2020.

Several private organizations who want control over oil of other countries have been secretly funding this project for America. Later these years USA admitted officially that US army, US navy and US air force are also funding this project.

Russian intelligence agency GRU revealed that once an American senator Ted Stevens who was against HAARP and was investigating about it, he was murdered. GRU also revealed that from the investigations of Ted Stevens America is controlling HAARP from a secret base in US state Alaska.

GRU intelligence also revealed that another person in contact with Ted Stevens, Major Aaron Malone who was working as guard in Alaska Air National was murdered by the secret weapon attack “Tesla” (a laser beam fired from satellite) on his C17 aircraft.

US investors are a threat to Pakistan:

Russia and Wikileaks revealed that America is testing HAARP weapon on other countries. They revealed that America is trying to control nuclear power Pakistan with weather control weapon. America have sent spies/secret agency workers and engineers to the Pakistan by labeling them as investors, NGO workers.

Russian scholar and strategic culture foundation deputy head Andrei Areshev, who is researching on HAARP technology said that: we investigated and found that in 2012 America used HAARP on Pakistan’s North-West part. He said that America tried to drown Pakistan in water by floods. War against nuclear Pakistan cannot be won easily, so HAARP is the second method against Pakistan by America.

Wikileaks and Russia revealed several times that America sends army personals in Pakistan in the name of aid workers. US have tried to send marines several times in Pakistan but due to protests of Pakistani people government couldn’t fulfil this demand of America. Wikileaks revealed that America sent spy agents and army commandos in the Pakistan during flood times by telling Pakistan government that they are normal citizens came to help Pakistani flood affected people.

Most Wanted Carding Tips for Beginners

1. Use socks 5 ( don’t use socks4 or HTTP proxies as they might leak DNS info) which match the cardholder’s billing address.

2. If your CC is from UK, try to use a UK drop and so on for other countries

3. If the gift option is there, put it so it looks like you are shipping a gift to some friend, girlfriend etc.

4. Try to make orders before holidays like valentines etc. Now this is an old trick but it works for 2 reasons. The shops get many orders these days, so they can pass your fraud one as legitimate too. And it looks like you are sending a legit gift

5. For your security, use cracked/open wifi + changed MAC, VPN in some offshore country + 2-3 socks in a virtual machine. I suggest VMWare and do download a ready made image so just open it. Try to create a proxy chain for your own security, with the last external IP being the one to match cardholders address.

6. Use Firefox in private mode with extensions. Find some security related extensions which don’t track your links, clear cookies, LSO & flash cookies, etc. Be creative and explore.

7. Use gmail / hotmail  /yahoo when ordering or Use @some hipster email provider, one which is not really used by a lot of people. It makes it look legit.

8. If your card holder is John Jones, use email which is similar to his name.
Have a ready VoIP account and call the shop if they have to confirm information. Usually they only ask about CC info and shipping address. You don’t want to call them with a man voice when CC is a female’s, do you ? Use voice changers instead. Do this even when confirming orders for man CCs, to mask your identity.

9. Checking CCs before making purchase is highly discouraged as most checkers flag/kill cc. Try this on your own risk.

10. Check BIN before trying order. If it is credit platinum, chances are you can buy a fuckton of things. If its debit classic, good luck with that.

11. There are some services that offer DOB and SSN checks. You might want to use them if you don’t have fullz.

12. Try to use different sites and your own tuts in different Ways. However, don’t be lazy because laziness in carding can cost you badly.

13. Don’t tell anyone, don’t show off. (My Rule), Real Carder likes to earn silently

Differences Between (Forward) Proxy and Reverse Proxy

Hello guys, after a while, I come back to you with a new tutorial… Our topic today is about Differences Between Forward Proxy and Reverse Proxy. You may notice I just used Forward Proxy instead of using just Proxy, Forward Proxy, This one called proxy by most of people, Second type which is Reverse Proxy.. We will knock each doors and get into details soon.. I hope you enjoy reading my tutorials.

Proxy is server that acts like a intermediary between any device and the internet. Proxy can accept requests and forward them then return the responses or data for those requests.

Let us knock the first door, Forward Proxy. We just knocked the door and asked Forward Proxy: Who are you?! Biggrin

Forward Proxy kindly replied and said: I keep people safe, When a client send requests to internet, I’m working as an intermediate between the client and the internet, I’m getting people requests and returning back responses from internet to the client. Just a note, most of people calling me “Proxy” so if you hear, they mean Forward Proxy.

:punsh: Anything else??! well no.. thank you xD…. ahhhhh What is the benefit of Forward Proxy???

1- It’ll help Client bypass blocked websites on network(The website Blocked by ISP or Your country have been blocked by the website), Your IP or IP range may get blocked in any kind of situations(Blocked by school or Government), By using Forward Proxy, Client will get a new IP and it’ll hide the Real IP of the client.. AS we just said it will work intermediately between the client and internet..

2- It’ll keep the client Anonymous on internet, For example VPN is a Forward Proxy service, The clients connect to the Forward Proxy Server(FPS) they will use one IP together for coming online… So if a client visit google and the other one visit yahoo They have used one IP and the same FPS, You can’t identify the client who visited google… One FPS can be used by thousands of users. This will keep the client anonymous.

3- Routers is using FPS to allow more than one user to connect, Like Mifi or Wifi.. We can connect our computers and phones together without facing any problem. Each user on the local network having an unique IP Address, The FPS or Router work as an intermediate between the internet and the Local Network Clients.

4- FPS can keep Caches so if a client visited google. FPS will keep the DATA like Google Page source and the images on the Page. IF another Client visited google the FPS will send the client directly cached files and this will reduce Bandwidth of internet usage and increase your browsing speed.

I feel it is enough… :dodgy: Don’t you agree with me… Let us go to Reverse Proxy home, We knocked his door and asked him the same question.. His answer was:

Reverse ProxyI’m keeping the origin server safe, Origin server is the server that host for example our website(https://sinister.ly). Reverse Proxy Server(RPS) will sits between the client and origin server but here the purpose is for keeping the origin server safe and improving its security also it prevent the client from connecting directly to the origin server. So basically, it will get requests from clients and returning back responses from the OS(Origin Server) to clients.

We will understand better while talking about its Benefits:

1- Load Balancing Confused , What is that? -.-‘ . Well, Load Balancing is way to prevent server over load, for example when a popular website like google or yahoo gets million or billion of requests a day. of course Single server can’t handle all these requests. They will setup more than one origin server, depend on how many they need. Imagine that our website have three backend servers(S1, S2, S3). While we are getting so many requests RPS will distribute the incoming traffic evenly among the three servers to prevent any single server from becoming overloaded. or When one of them or S1 stops, it will send the requests to S2 and S3.

2- Content cachingRPS can cache contents resulting in faster performance, Caching mirror version of the website. This will facilitate content delivery. Also we can have more than one RPS caching depending on geolocation for example having two RPS. One in Washington and the other one in Paris IF you are from Paris or near to Paris than Washington, Connecting through Paris RPS will reduce load time. 

3- Protecting OS from any kind of attacks, Block malicious traffic from reaching the origin server. if DDOS attack reaches the Origin server, it will lead to Server Overload and this will shut it down. RPS can stop and block these type of attacking before reaching the OS.

4- Masking IPRPS will mask your OS(Origin Server) IP, this will protect it from Directly connecting and also Reaching its content. We have many type of attacks depending on exploiting the Server directly or attacking the OS IP for example DDOS attack.

5- SSL EncryptingEncrypting and Decrypting communications for clients will need more resource. Using more of the RAM and CPU. RPS can take this job too, By encrypting out going responses and decrypting incoming requests to the origin server from the client.

Am done, if you have any questions feel free asking me here or in  Telegram -.-‘ IF you don’t have any question, Giving a positive comment will be likely a motivation for me. Don’t go without posting below. This thread took two days of writing xD and Three days of reading and one month of planning… I don’t have much time.

How To Receive All Your Android SMS On PC

Many of you works on your PC for a long and at that it looks quite difficult to pickup android and read out every SMS received on it.

:small_blue_diamond: Mostly when you device is on charging and you working at distance from it

:small_blue_diamond:Steps To Get All Your Android SMS On PC:-

1. First of all download and install app Mighty Text in your android device.

2. Now in your Google Chrome browser add the extension Mighty Text.

3. Now open the app you will need an initial pair up with your PC as it will be done over wifi network on which both the devices being connected.

4. Now when you setup is done now you will see your android name on the icon when you click on it.

5. Thats it all done, now when you android receive any SMS it will transfer on your extension of PC and you can read it there.