Photo by Scott Webb on Unsplash

WiFi is broken, Big Brother lives in China and robots are coming for Wall Street!

Gregory B.
Oct 23, 2017 · 4 min read

🌍 Around the web

Serious flaw in WPA2 protocol lets attackers intercept passwords and much more

Researchers have disclosed a serious weakness in the WPA2 protocol that allows attackers within range of vulnerable device or access point to intercept passwords, e-mails, and other data presumed to be encrypted, and in some cases, to inject ransomware or other malicious content into a website a client is visiting.
The proof-of-concept exploit is called KRACK, short for Key Reinstallation Attacks.

If you want to try it for yourself, the PoC is on Github and all the additional info you need are on the official website. Check out the list of companies potentially affected here and who’s already fixed it (or not).

The World Once Laughed at North Korean Cyberpower. No More.

When North Korean hackers tried to steal $1 billion from the New York Federal Reserve last year, only a spelling error stopped them. They were digitally looting an account of the Bangladesh Central Bank, when bankers grew suspicious about a withdrawal request that had misspelled “foundation” as “fandation.”
Even so, Kim Jong-un’s minions still got away with $81 million in that heist.

Big data meets Big Brother as China moves to rate its citizens

Imagine a world where many of your daily activities were constantly monitored and evaluated: what you buy at the shops and online; where you are at any given time; who your friends are and how you interact with them; how many hours you spend watching content or playing video games; and what bills and taxes you pay (or not). It’s not hard to picture, because most of that already happens, thanks to all those data-collecting behemoths like Google, Facebook and Instagram or health-tracking apps such as Fitbit. But now imagine a system where all these behaviours are rated as either positive or negative and distilled into a single number, according to rules set by the government. That would create your Citizen Score and it would tell everyone whether or not you were trustworthy.

🤖 Technology / AI / Blockchain

Welcoming Our New Robot Overlords

Automation was bringing greater and greater efficiency, even though, at a certain point, the logic of increasing efficiency would catch up with him, and he wouldn’t be around any longer to witness it. One day, the factory might go dark. In the meantime, he was enjoying the advantages of work that involved less work.

Robots Are Coming for These Wall Street Jobs

Banks and investment funds have been tinkering for years, prompting anxiety for employees. Now, firms are rolling out machine-learning software to suggest bets, set prices and craft hedges. The tools will relieve staff of routine tasks and offer an edge to those who stay. But one day, machines may not need much help.

Spotify’s Discover Weekly: How machine learning finds your new music

There are three main types of recommendation models that Spotify employs:
Collaborative Filtering models (i.e. the ones that originally used), which work by analyzing your behavior and others’ behavior.
Natural Language Processing (NLP) models, which work by analyzing text.
Audio models, which work by analyzing the raw audio tracks themselves.

⚙️ Development / Design / DIY projects

Web development explained to a time traveler from 10 years ago

I’m glad that you’re still interested in computers! Today we have many more of them than we did 10 years ago, and that comes with new challenges. We wear computers on our wrists and faces, keep them in our pockets, and have them in our fridges and kettles. The cars are driving themselves pretty well, and we’ve taught programs to be better than humans at pretty much every game out there — except maybe drinking.

OverTheWire: Wargames

The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games.

Practical Public Key Cryptography

Today you can send an encrypted message to anyone. This is accomplished by the use of a pair of keys: one public key and one private key. The key properties are such that when something is encrypted with the public key, only the private key can decrypt it and vice-versa. (…) But the game changer is that the public key doesn’t have to be kept secret. This allows cryptography to be used for authentication — proving who someone is — as well as for encryption, without requiring you to have previously exchanged secrets.

🔥 Bits and pieces

Check out Woebot, the AI for mental health. See how this guy sold his SaaS business. Also, apparently you shouldn’t design your emails and stick to plain text. If you find MailChimp too expensive, check this: MailChimp vs. Amazon SES — How I Reduced My Monthly Bill by 92%.

See how this guy Snatched 153,037 ETH After A Bad Tinder Date. Serious Crypto-Flaw Lets Hackers Recover Private RSA Keys Used in Billions of Devices. And finally, want to see something crazy? Open this link on your phone with WiFi turned off.

The Aspiring Nerd

Weekly curated articles at the crossroads of web marketing, development and technology.

Gregory B.

Written by

Web strategist with a conscience.

The Aspiring Nerd

Weekly curated articles at the crossroads of web marketing, development and technology.

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade