10 Physical Bitcoins: The Good, The Bad and The Ugly

Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.

Flatten the Curve. Part 48. Source Here
It's getting crazier day by day now, so are you following the Boy Scout motto?
On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.”
Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island.
But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply.
Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it.
But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here
December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right?
Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court.
'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act.
Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies.
The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here
Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here
Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you.
Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more.
Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered.
PACOM? Why isn't that command group responsible for the South China Sea?
Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India.
Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here
Nah. I'm just fear mongering and Doomscrolling again.
Heads up and eyes open. Talk soon.
submitted by biggreekgeek to conspiracy [link] [comments]

IoT Testing !!!

IoT is a whole ecosystem that contains intelligent devices equipped with sensors (sensors) that provide remote control, storage, transmission and security of data. The Internet of Things (IoT) is an innovative solution in various areas such as healthcare, insurance, labor protection, logistics, ecology, etc. To unleash the full potential of using IoT devices, it is necessary to solve many problems related to standards, security, architecture, ecosystem construction, channels and device connection protocols. Today in the world, large organizations such as NIST, IEEE, ISO / IEC, and others make enormous efforts in addressing the issues of standardization, security, and the architecture of developed devices. Analysis of recent scientific research in the field of solving information security issues and data privacy of IoT devices showed positive results, but these methods and approaches are based on traditional methods of network security. The development and application of security mechanisms for IoT devices is a complex and heterogeneous task. In this regard, ensuring information security and the protection of sensitive data, as well as the availability of IoT devices, is the main purpose of writing this article. Given the above, many questions arise related to the security status of IoT devices, namely: What are the current standards and protocols for IoT? What are the requirements for ensuring information security of IoT devices? What security mechanisms do IoT devices have? What methods of testing IoT devices exist? Manufacturers and developers of IoT devices do not pay enough attention to security issues. With the development of cyber-attacks, attack vectors are becoming more sophisticated and aimed at several infrastructure elements at the same time. IoT infrastructure typically includes millions of connected objects and devices that store and share confidential information. Scenarios of theft and fraud, such as hacking and falsifying personal data, pose a serious threat to such IoT devices. Most IoT devices use the public Internet to exchange data, which makes them vulnerable to cyber-attacks. Modern approaches to information security often offer solutions to individual problems, when multi-level approaches offer increased resistance to cyber-attacks.
Challenges of testing IoT devices
To a request to name essential items, many would answer: food, a roof over your head, clothes … With one caveat: this was the case in the last century.
Since then, the species Homo Sapiens has accumulated needs. We need automatic sensors to control the lighting, not just switches, for smart systems to monitor health and car traffic. The list goes on … In general, we can make life easier and better.
Let’s try to figure out how all this Internet of things works before moving on to testing.
IoT testing
Content
What is the Internet of Things (IoT)? Examples of IoT devices # 1) Wearable technology: # 2) Infrastructure and development # 3) Health Technologies that are present in IoT IoT Testing # 1) Usability: # 2) IoT Security: # 3) Network features: # 4) Efficiency: # 5) Compatibility testing: # 6) Pilot testing: # 7) Check for compliance: # 8) Testing updates: IoT testing challenges # 1) Hard / soft # 2) Device Interaction Model # 3) Testing data coming in real time # 4) UI # 5) Network Availability IoT Testing Tools # 1) Software: # 2) Hard: Total What is the Internet of Things (IoT)? The Internet of things (or IoT) is a network that combines many objects: vehicles, home automation, medical equipment, microchips, etc. All these constituent elements accumulate and transmit data. Through this technology, the user controls the devices remotely.

Examples of IoT devices

# 1) Wearable technology: Fitbit Fitness Bracelets and Apple Watch smart watches sync seamlessly with other mobile devices.

IoT – watches and bracelets

Itís easier to collect health information: heart rate, body activity during sleep, etc.
# 2) Infrastructure and development The CitySense app analyzes lighting data online and turns lights on and off automatically. There are applications that control traffic lights or report on the availability of parking lots.
# 3) Health Some health monitoring systems are used in hospitals. The basis of their work is indicative data. These services control the dosage of drugs at different times of the day. For example, the UroSense application monitors the level of fluid in the body and, if necessary, increases this level. And doctors will learn about patient information wirelessly.
Technologies that are present in IoT RFID (Radio Frequency Identification), EPC (Electronic Product Code) NFC (ìNear Field Communicationî) provides two-way communication between devices. This technology is present in smartphones and is used for contactless transactions.
Bluetooth It is widely used in situations where near-field communication is sufficient. Most often present in wearable devices. Z-Wave. Low frequency RF technology. Most often used for home automation, lighting control, etc. WiFi. The most popular network for IoT (file, data and message transfer). IoT Testing Consider an example : a medical system that monitors health status, heart rate, fluid content, and sends reports to healthcare providers. Data is displayed in the system; archives available. And doctors are already deciding whether to take medication for the patient remotely.
IoT architecture
There are several approaches for testing the IoT architecture.
# 1) Usability: It is necessary to provide usability testing of each device. A medical device that monitors your health should be portable.
Sufficiently thought out equipment is needed that would send not only notifications, but also error messages, warnings, etc. The system must have an option that captures events, so that the end user understands. If this is not possible, event information is stored in the database. The ability to process data and exchange tasks between devices is carefully checked. # 2) IoT Security: Data is at the heart of all connected devices. Therefore, unauthorized access during data transfer is not ruled out. From the point of view of software testing, it is necessary to check how secure / encrypted the data is. If there is a UI, you need to check if it is password protected. # 3) Network features: Network connectivity and IoT functionality are critical. After all, we are talking about a system that is used for health purposes. Two main aspects are tested: The presence of a network , the possibility of data transfer (whether jobs are transferred from one device to another without any hitch). The scenario when there is no connection . Regardless of the level of reliability of the system, it is likely that the status of the system will be ìofflineî. If the network is unavailable, employees of the hospital or other organization need to know about it (notifications). Thus, they will be able to monitor the condition of the patient themselves, and not wait for the system to work. On the other hand, in such systems there is usually a mechanism that saves data if the system is offline. That is, data loss is eliminated. # 4) Efficiency: It is necessary to take into account the extent to which the healthcare solution is applicable in specific conditions. In testing, from 2 to 10 patients participate, data is transmitted to 10-20 devices. If the entire hospital is connected to the network, this is already 180-200 patients. That is, there will be more actual data than test data. In addition, it is necessary to test the utility for monitoring the system: current load, power consumption, temperature, etc. # 5) Compatibility testing: This item is always present in the plan for testing the IoT system. The compatibility of different versions of operating systems, browser types and their respective versions, devices of different generations, communication modes [for example, Bluetooth 2.0, 3.0] is extremely important for IoT. # 6) Pilot testing: Pilot testing is a mandatory point of the test plan. Only tests in the laboratory will allow us to conclude that the system is functional. In pilot testing, the number of users is limited. They make manipulations with the application and express their opinion. These comments turn out to be very helpful, they make a reliable application. # 7) Check for compliance: The system, which monitors the state of health, undergoes many compliance checks. It also happens that a software product passes all stages of testing, but fails the final test for compliance [testing is carried out by the regulatory body]. It is more advisable to check for compliance with norms and standards before starting the development cycle. # 8) Testing updates: IoT is a combination of many protocols, devices, operating systems, firmware, hardware, network layers, etc. When an update occurs – be it a system or something else of the above – rigorous regression testing is required. The overall strategy is being amended to avoid the difficulties associated with the upgrade.

IoT testing challengesIoT testing

# 1) Hard / soft IoT is an architecture in which software and hardware components are closely intertwined. Not only software is important, but also hard: sensors, gateways, etc.
Functional testing alone will not be enough to certify the system. All components are interdependent. IoT is much more complicated than simpler systems [only software or only hard].
# 2) Device Interaction Model Components of the network must interact in real time or close to real. All this becomes a single whole – hence the additional difficulties associated with IoT (security, backward compatibility and updates).
# 3) Testing data coming in real time Obtaining this data is extremely difficult. The matter is complicated by the fact that the system, as in the described case, may relate to the health sector.
# 4) UI An IoT network usually consists of different devices that are controlled by different platforms [iOS, Android, Windows, linux]. Testing is possible only on some devices, since testing on all possible devices is almost impossible.
# 5) Network Availability Network connectivity plays an important role in IoT. The data rate is increasing. IoT architecture should be tested under various connection conditions, at different speeds. Virtual network emulators in most cases are used to diversify network load, connectivity, stability, and other elements of load testing . But the evidence is always new scenarios, and the testing team does not know where the difficulties will arise in the future.

IoT Testing ToolsIoT and software

There are many tools that are used in testing IoT systems.
They are classified depending on the purpose:
# 1) Software: Wireshark : An open source tool. Used to monitor traffic in the interface, source / given host address, etc. Tcpdump : This tool does a similar job. The utility does not have a GUI, its interface is the command line. It enables the user to flash TCP / IP and other packets that are transmitted over the network. # 2) Hard: JTAG Dongle: A tool similar to debuggers in PC applications. Allows you to find defects in the code of the target platform and shows the changes step by step. Digital Storage Oscilloscope : checks various events using time stamps, power outages, signal integrity. Software Defined Radio : emulates a transmitter and receiver for various wireless gateways. IoT is an emerging market and many opportunities. In the foreseeable future, the Internet of things will become one of the main areas of work for tester teams. Network devices, smart gadget applications, communication modules – all this plays an important role in the study and evaluation of various services.
Total The approach to testing IoT may vary depending on the specific system / architecture.
Itís difficult to test IoT, but at the same time itís an interesting job, since testers have a good place to swing – there are many devices, protocols and operating systems.
PS You should try out the TAAS format (“tests from the user’s point of view”), and not just fulfill the formal requirements.
—————
Smart watches, baby-sitters, wireless gadgets and devices such as, for example, a portable radio station have long been part of everyday life.
Hackers have already proven that many of these attacks on IoT are possible.
Many people in general first learned about IoT security threats when they heard about the Mirai botnet in September 2016.
According to some estimates, Mirai infected about 2.5 million IoT devices, including printers, routers and cameras connected to the Internet.
The botnetís creators used it to launch distributed denial of service (DDoS) attacks, including an attack on the KrebsonSecurity cybersecurity blog.
In fact, the attackers used all devices infected with Mirai to try to connect to the target site at the same time, in the hope of suppressing the servers and preventing access to the site.
Since Mirai was first published on the news, attackers launched other botnet attacks on IoT, including Reaper and Hajime.
Experts say that such attacks are most likely in the future.
The Internet of Things (IoT) can bring many advantages to modern life, but it also has one huge drawback: security threats.
In its 2018 IOT forecasts, Forroter Research notes: ìSecurity threats are a major concern for companies deploying IoT solutions – in fact, this is the main task of organizations looking to deploy IoT solutions.
However, most firms do not regularly prevent IoT-specific security threats, and business pressure suppresses technical security issues. î
IoT security risks can be even more significant on the consumer side, where people are often unaware of potential threats and what they should do to avoid threats.
A 2017 IoT security survey sponsored by Gemalto Security Provider found that only 14 percent of consumers surveyed consider themselves IoT-aware.
This number is particularly noteworthy because 54 percent of the respondents owned an average of four IoT devices.
And these IoT security threats are not just theoretical.
Hackers and cybercriminals have already found ways to compromise many IoT devices and networks, and experts say that successful attacks are likely to increase.
Forrester predicted: “In 2018, we will see more attacks related to IoT … except that they will increase in scale and loss.”
What types of IoT security threats will enterprises and consumers face in 2018?
Based on historical precedent, here are ten of the most likely types of attacks.
  1. Botnets and DDoS attacks
  2. Remote recording The possibility that attackers can hack IoT devices and record owners without their knowledge is not revealed as a result of the work of hackers, but as a result of the work of the Central Intelligence Agency (CIA).
Documents released by WikiLeaks implied that the spy agency knew about dozens of zero-day exploits for IoT devices, but did not disclose errors, because they hoped to use vulnerabilities to secretly record conversations that would reveal the actions of alleged opponents of America.
Documents pointed to vulnerabilities in smart TVs, as well as on Android and iOS smartphones.
The obvious consequence is that criminals can also exploit these vulnerabilities for their vile purposes.
  1. Spam In January 2014, one of the first known attacks using IoT devices used more than 100,000 Internet-connected devices, including televisions, routers, and at least one smart refrigerator to send 300,000 spam emails per day.
The attackers sent no more than 10 messages from each device, which makes it very difficult to block or determine the location of the incident.
This first attack was not far from the last.
IoT spam attacks continued in the fall with the Linux.ProxyM IoT botnet.
  1. APTs In recent years, advanced persistent threats (APTs) have become a serious concern for security professionals.
APTs are carried out by funded and widespread attackers such as nation states or corporations that launch complex cyberattacks that are difficult to prevent or mitigate.
For example, the Stuxnet worm, which destroyed Iranian nuclear centrifuges and hacking Sony Pictures 2014, was attributed to nation states.
Because the critical infrastructure is connected to the Internet, many experts warn that APTs may launch a power-oriented IoT attack, industrial control systems, or other systems connected to the Internet.
Some even warn that terrorists could launch an attack on iOT, which could harm the global economy.
  1. Ransomware Ransomware has become too common on home PCs and corporate networks. Now experts say that it is only a matter of time before the attackers begin to block smart devices. Security researchers have already demonstrated the ability to install ransomware on smart thermostats. For example, they can raise the temperature to 95 degrees and refuse to return it to its normal state until the owner agrees to pay a ransom in Bitcoins. They can also launch similar attacks on garage doors, vehicles, or even appliances. How much would you pay to unlock your smart coffee pot first thing in the morning?
  2. Data theft Obtaining important data, such as customer names, credit card numbers, social security numbers, and other personal information, is still one of the main goals of cyber attacks.
IoT devices represent a whole new vector of attack for criminals looking for ways to invade corporate or home networks.
For example, if an improperly configured device or IoT sensor is connected to corporate networks, this can give attackers a new way to enter the network and potentially find the valuable data that they need.
  1. Home theft As smart locks and smart garage doors become more commonplace, it is also more likely that cybercriminals can become real thieves.
Home systems that are not properly protected can be vulnerable to criminals with sophisticated tools and software.
Security researchers are unlikely to have shown that itís quite easy to break into a house through smart locks from several different manufacturers, and smart garage doors do not seem to be much safer.
  1. Communication with children One of the most disturbing IoT security stories came from children.
One couple discovered that the stranger not only used his monitor for children to spy on their three-year-old son, this stranger also spoke with his child through the device.
Mother heard an unknown voice: ìWake up, boy, dad is looking for you,î and the child said that he was scared because at night someone was talking to him on an electronic device.
As more and more children’s gadgets and toys connect to the Internet, it seems likely that these frightening scenarios may become more common.
  1. Remote control of a vehicle As vehicles become smarter and more accessible on the Internet, they also become vulnerable to attack.
Hackers have shown that they can take control of a jeep, maximize air conditioning, change the radio station, start the wipers, and ultimately slow down the car.
The news led to the recall of 1.4 million cars, but whitehat researchers, following the original exploit, said they discovered additional vulnerabilities that were not fixed by the Chrysler patch applied to the recalled cars.
Although experts say the automotive industry is doing a great job of ensuring vehicle safety, it is almost certain that attackers will find new vulnerabilities in such smart cars.
  1. Personal attacks Sometimes IoT covers more than just devices – it can also include people who have connected medical devices implanted in their bodies.
An episode of the television series Homeland attempted a murder aimed at an implanted medical device, and former vice president Dick Cheney was so worried about this scenario that he turned off the wireless capabilities on his implanted defibrillator.
This kind of attack has not yet happened in real life, but it remains possible, as many medical devices become part of the IoT.
submitted by farabijfa to u/farabijfa [link] [comments]

The Master Plan for BitcoinDiscussion: An Outline of the Goals and Intentions and Response to Moderation Questions

Introduction

There's been a surge in users and interest over the past few weeks. Welcome! It's a pleasure to have you join us here! Along with this new influx of users, there have been a lot of questions about this sub and its moderation.
A lot of questions should already be answered in the manifesto, and the posting rules and guidelines, so make sure you've read them both. I'm going to answer questions from these two threads here and here. If you asked a question there, and feel that I still haven't answered it in here, please post below.
There will be three main sections in this thread.
 

The Destination

This is already described in the manifesto, but I'm also going to clarify several things. Make sure you read it first.
This is a place for high quality, serious content. To my knowledge, there does not yet exist a publicly accessible space in the Bitcoin ecosystem that caters to the exchange of ideas in a thoughtful, respectful, and meaningful way. This does not mean a place to say whatever you want. It also does not mean a place where you can surround yourself with people who agree with you and ridicule anyone else.
I would also love to have a place where the top experts and creators feel comfortable reaching out and communicating in public without fear of abuse or harassment. Sadly, most of the top names avoid open online fora at this point because of the toxicity. It would be great to have more of them back and willing to interact on here.
Take a look through science, geopolitics, and spacex. Those are good examples of subs to for us to emulate.
You do not see insults thrown around, there are no memes, and users put real effort into their comments. You will also notice, if you look carefully, that they are aggressively moderated. Which brings us to our next section:
 

The Administration

There are 4 parts to this section: governance, moderators, transparency, and rule enforcement.

Governance:

The sub is not a public agora, where everyone is entitled to come and have their say.
It is a salon or a coffeehouse.
I am your host, and you are my valued guests. As such, I have the final say on issues.
There are two reasons for this:
  • That's how reddit is built. There is no other model, and every other sub you go to is under the same model. If you think there is a democracy anywhere on reddit, you have been fooled. If there is a community that takes actions based on community votes or willpower, that is just because the head mod has allowed this to happen.
  • I don't believe it wouldn't otherwise work. If there were some kind of mechanism to allow the enforcement of the community's will, then we would be royally screwed. Any group larger than ours could simply subscribe en masse, and then vote this place into a sub to discuss stamp collecting. And on top of that, reddit is highly sybillable and vulnerable to vote manipulation. As such, I think it is a highly desirable that reddit has the model it does. (And yes, I know I am biased and might be wrong. If that is the case, then I will learn a harsh lesson as my time investment here goes to waste.)
Everything you see about the goals for this place are declarations of things that I will strive for. It is a statement from myself to you as the community. In the manifesto, there is a reference to accountability to the community. This does not mean doing whatever the community wants. This means making an extra effort to be accessible, transparent, and fair to the community.
I do not expect anyone to trust me. Rather, I expect to earn your trust over time if I succeed in cultivating a useful space for you. For those who have joined early on, I thank you for your energy, and for placing at least some confidence in me not throwing your efforts away.

Moderators:

I have been asked about how other moderators have been and will be chosen. I will start with the first.
The other moderators at the moment are personal friends of mine. This is rather embarrassing, but the reason they are there is because it was quite lonely with just me here at the beginning, and I felt super uncool inviting people to a subreddit with just me. I asked them if they would be moderators so that the place looked a little less pathetic. They agreed. And if you check the moderator's logs, you will see that they have done precisely zero moderation (which is totally fine).
I'll be removing all of them (except one in case something happens to me and the place needs to get passed on), and from now on I will only add new moderators as they are needed.
For now, new moderators will be chosen at my discretion. Depending on the situation, I may consult the membership for advice, but the final say will be mine. Again, this is how all subreddits function.

Transparency:

I am committed to running this subreddit in a transparent manner.
  • publicmodlogs is here to stay.
  • if a non-spam comment is removed for breaking rules, the moderator doing so will leave it publicly visible that a comment has been deleted, and reply with an explanation.

Rule Enforcement:

The posting rules and guidelines leave room for interpretation.
Myself and any other future moderators will be responsible for interpreting the rules and acting accordingly.
If there is a a grey area, the determining factor will be answering the question: "Does this comment contribute to the community's goals?"
Content will not be removed because we disagree or just don't like your opinion. Content will not be removed because we are trying to hide something (remember, publicmodlogs).
Memes and jokes? Price speculation? They will be removed.
Content will be removed for being low-effort[*]. Content will be removed for being unkind. Content will be removed for being off-topic. Content will be removed for being aggressive toward an individual or entity.
Content will be removed for dragging in the meta-war going on between the two big subreddits and their respective tribes. This will not become another battleground, and I will be extra strict about enforcing that. Now, you can talk about that whole dispute. You can make calm observations about the goings-on, but if it even seems like an attempt to wage that war here, that content will be removed.
Trying to get the moderators to pick a side of the war is not allowed in this subreddit. I will neither condemn nor defend the actions of moderators on other forums. This is my first time moderating any kind of online community, and I intend to run it very differently than how the other Bitcoin communities are run. Any opinions that myself or the moderators express outside this subreddit are 100% personal, and are irrelevant to the moderation of this sub. Trying to drag that into our little garden here will get you banned really quickly. Speaking of which:
Bans will happen. Basically, users will get a single warning for breaking the rules. After that, they will get continually lengthier bans for each infringement. First ban is 1 day. Second ban is 3 days. Then 9 days. Then 27. You get the idea: 3x where x = number of previous bans. This is experimental and might change if it sucks.
 
[*] Just to be clear, low effort does not necessarily mean short. Sometimes short comments are acceptable, such as when asking for clarification, providing a source, etc.
 

The Plan

There are three phases to the plan:

(1) Bootstrapping

This has been the initial six months of the this sub's existence (since I acquired it earlier this year). It involved me personally reaching out to users one by one and trying to get people to join. It involved me posting 95% of the content, and responding to every single comment that anyone posted here.
During this phase, moderation was much more relaxed than it will be once we have reached The Destination. This was because having more traffic was a higher priority, so I was willing to tolerate a wider range of comments and posts than usual. I also made a point to reach out to users and explain in detail why they had content removed, and to thank them for their interest. Myself and any future moderators may not have the time to do this in future phases, though I'll try to do it as long as is reasonable.
We've more or less reached the end of this phase because now most of the content is produced by you, the members, and I believe that the survival and growth of the sub is no longer dependent on my comments and promotion.
This brings us to:

(2) Transition

We are just beginning this phase now. At this point, priorities shift from growth to content quality. In phase 1, growth was top priority. Now, they are on equal footing.
Moderation will tighten up, but still not to how strict it will be once we are in phase 3. I'll still err on the side of welcoming content over hardcore quality, but you might notice a growing expectation that you must put more effort and thought into expressing yourself clearly and kindly.
Comments and threads like these will no longer be tolerated: link, link
Near the end, we will also start phasing out threads like this: link

(3) Maintenance

At this phase, growth is no longer a priority, and the job of the moderators (hopefully plural at this point) will be to ensure high quality.
We won't be actively promoting the sub (although you still can!) and will likely have our hands full with quality control as the bar is at its highest.
Moderation will be strictest. Lazy comments will be removed for being low-effort. If there was a calm way to say something, but you were snarky, your comment will be gone. You get the idea.
Comments like these will no longer be tolerated: link, link
At this point, submission statements will also be required. If you post a link to an idea or piece of news, you will be expected to start the conversation by writing a single-paragraph introduction in the comments.
 

Conclusion

And that's where things will be going.
A lot of that might have sounded heavy-handed. That is intentional.
I would rather push away potential users now than have members be disappointed and angry later on when their expectations aren't met.
I will be stickying this thread and will continue to answer questions in the comments below.
[nice mode: activate]
Thank you so much to everyone who has come here so far. I know I sound like a hard-ass right now, but almost everyone new has been fucking fantastic, and it's been great to see real constructive dialogue going on. And please tell me what you think about this place and my moderation especially if you are happy with it! Even though I will call the shots around here, I want to know what people think, and people who are displeased tend to be much more vocal than those who are happy or content.
Again, thanks for all your help. I'm super excited about how things have gone, and where they'll go next!
submitted by makriath to BitcoinDiscussion [link] [comments]

Weekly Roundup | Random Chat | Notifications

News roundup for the previous week.
In International news
  1. Duterte named 2016 ‘Person of the Year’ by Chinese magazine: The president is hailed as the 2016 ‘Person of the Year’ by the prestigious Hong Kong international affairs newsweekly , Yazhou Zhoukan
  2. Chinese state tabloid warns Trump, end one China policy and China will take revenge
  3. Chinese companies to build world's tallest twin towers in Cambodia: The twin towers will be 560 meters high with 133 floors. The project will include commercial areas, offices, residential areas, exhibition halls, hotels, as well as a 4-floor underground parking lot
  4. Against China’s objections, Ted Cruz and Texas governor meet with Taiwanese president
  5. Pakistan has officially begun construction of a missile warship that the country hopes will guarantee the integrity of its vital trade corridor with China
  6. Cruz meeting with Taiwan president has 'no bearing' on U.S. China policy: White House
  7. Ex-Tibetan Exile Monk defrauded Chinese EB-5 Investors $Millions, pleads guilty to fraud
  8. Donald Trump has 'great meeting' with Alibaba boss Jack Ma
  9. China's Xi to promote 'inclusive' globalization at Davos
  10. Jared Kushner: the powerful son-in-law of Donald Trump and his ties with Chinese businesses
  11. China's Iran oil imports to hit record on new production: sources
  12. Trump's secretary of state pick says China should be barred from South China Sea islands. (Lol) On Taiwan, "I don’t know of any plans to alter the 'one China' position," Tillerson said
  13. Serbia signs railway upgrades deal with China's CCECC
  14. DEA opens shop in China to help fight synthetic drug trade: In a sign of improving cooperation between the U.S. and China to fight the global drug trade, the Drug Enforcement Administration will open a new office there and its top chief will visit next week for the first time in more than a decade
  15. South Korea considering complaint to China over THAAD retaliation
  16. Malaysia and China reach agreement on tackling crime, terrorism
  17. China issues white paper, warns small- and medium-sized countries not to take sides
  18. Nigeria ordered Taiwan to move its trade mission from the capital, Abuja, to the commercial hub, Lagos, following a visit by the Chinese foreign minister during which his government pledged to invest $40 billion into infrastructure in Africa’s most populous country
  19. China and Kyrgyzstan vowed to deepen security cooperation and jointly fight terrorist forces such as the East Turkistan Islamic Movement. This year marks the 25th anniversary of the establishment of diplomatic relations
  20. Philippines says any U.S. move against Beijing in S China Sea would be in its own interest
  21. China warns United States of 'military clash' over Tillerson comments
  22. U.S. is the most powerful country on the planet, yes, and biggest economy in the world. But China will be eventually just by virtue of its size. And so you can’t walk into a room and say, “Do it our way". - Chinese Nationalist aka. Secretary of State Kerry in remarks at the US Naval Academy
  23. More than 200 Taiwanese deportees still in China: A total of 223 Taiwanese who were deported over the past nine months from other nations on suspicion of telecommunications fraud are still being held in China, where they were deported
  24. Russia & China announce new ‘unspecified’ measures to US’ anti-missile system in S. Korea
  25. All aboard to fix the globalization 'bullet train', China's Xinhua says
  26. Before Trump gets his inauguration, China's president is to swipe some of the spotlight - I think China's trying to send a signal that it's the world's most responsible stakeholder.
  27. China's president will preach the advent of a new world order in Davos next week before the high priests of globalisation, who are facing an uprising from voters against their orthodoxy of open markets and borders.
  28. Turkey arrests two Chinese Uighurs over Istanbul nightclub attack
  29. China warns Trump that Taiwan policy is 'non-negotiable'
  30. Europe Turning to China as Uncertainty Over Trump's Foreign Policy Looms
  31. 2 Days From China To Europe By Rail? Russia Going For High-Speed Cargo Trains
  32. China projects to hit Singapore
  33. Silk Road route back in business as China train rolls into London
  34. How China's Asian Infrastructure Investment Bank Fared Its First Year
  35. China and Vietnam to 'manage' differences over South China Sea: communique
  36. How China rules the waves: Beijing has spent billions expanding its ports network to secure sea lanes and establish itself as a maritime power
In Domestic news
  1. Air China bans shark fin cargo, reflecting dramatic shift in attitudes
  2. China Lacks Anti-Discrimination Law With Teeth
  3. Foreign instructors face more policy regulations and changes, which will keep qualified non-native English speaking teachers from obtaining jobs in some Chinese regions
  4. China to launch 'environmental police' force
  5. China fears the rise overly 'effeminate' boys and is taking action
  6. China combats corruption within anti-corruption agency
  7. Obesity: the big, fat problem with Chinese cities
  8. China's Hongshui River floating walkway is TWICE the length of Manhattan
  9. China changes start date of war with Japan, says will bolster patriotic education
  10. China's making huge economic bets on green energy
  11. China Sets June Deadline to Stamp out Shoddy Steel Manufacturers
  12. China opens 'most beautiful' high-speed railway: China opens its latest high-speed railway connecting six provincial capital cities along its route from the east coast to the far southwest of the country, namely Shanghai, Hangzhou, Nanchang, Changsha, Guiyang and Kunming
  13. 50,000-meter Floating Walkway Opens on River in southwest China's Guizhou
  14. 'Rude' China police given hospitality lessons
  15. China detains 720, imposes $21.8 million of fines in pollution crackdown
  16. China rewrites history books to extend Sino-Japanese war by six years (Perfect example of the subtle Anti China manipulative narrative of Western media)
  17. Chinese authorities have published a draft regulation protecting minors’ rights in cyberspace that includes remedies for online bullying. No organisation or individual is allowed to threaten, insult or hurt minors online with words, pictures or video
  18. China school allows students to "borrow" marks to help ease exam stress
  19. In China, A Shift Away From Trade In Ivory and Shark Fins
  20. China has built the world’s largest bullet-train network
  21. Why China is counting its chickens
  22. China Orders Registration of App Stores
  23. Beijing to tackle air pollution
In SciTech news
  1. VR, Smart Gadgets, China Innovations Break Through All The Hype At CES 2017: What stood out among Chinese startups was healthtech wearable Vivalnk, AI robotics maker Ubtech; interactive smartwatch Mobvoi; intelligent hardware operating system Thundersoft, nanotechnology biosensors eNano Health
  2. Nokia brand launches its first Android smartphone... But it will only be available in China for $246.
  3. Tsinghua Unigroup to Build the World's Largest 3D NAND Flash Factory in Wuhan
  4. China Building World’s Highest Altitude Gravitational Wave Telescopes In Xizang
  5. Tpcast wireless VR - pretty excited to see another Chinese company lead in something that's hard tech.
  6. Consumer Electronics Show presents dazzling Chinese creations: CES 2017 has attracted over 3,800 companies worldwide, with 1,300 plus from China
  7. A colorful yet little known snout moth genus from China with five new species
  8. New Geological Map of the Moon Created By Chinese Scientists
  9. Long March 3B launches second TJSW spacecraft for China: China kicked off its 2017 campaign with the successful launch of the second Tongxin Jishu Shiyan Weixing (TJSW) spacecraft from the Xichang Satellite Launch Center
  10. Bionic woman: Chinese robot turns on the charm
  11. DJI and Seagate announce strategic partnership to advance data solutions for the UAV ecosystem: As drone cameras gain resolution and drone flight times grow longer, DJI and Seagate are focusing their efforts to securely and efficiently store, download and share the hundreds of gigabytes of data
  12. This New Computer Wants to Be the Ultimate AI Assistant for the Home: Baidu is teaming up with Chinese consumer tech company Ainemo to launch the device, called Little Fish, which is being positioned as a voice-centric home robot
  13. Is China still leading the graphene race? In addition to having more companies active in the production and sale of graphene than any other country, China also holds about 2/3rds of the global production capacity, according to Fullerex
  14. DJI – INTRODUCING DJI GS PRO
  15. Chinese scientists have built a camera capable of photographing objects it can’t directly see. The trick is to first randomize the light that the pixel detects, record the resulting light intensity, and then repeat this process thousands of times
  16. Baidu joins hands with China’s BAIC Motor Corp. to further develop its intelligent vehicle technology
  17. China to set up gravitational wave telescopes in Tibet: The telescope (Ngari), located 5,250 meters above sea level, will detect and gather precise data on primordial gravitational waves in the Northern Hemisphere. It is expected to be operational by 2021
  18. Chinese humanoid robot turns on the charm in Shanghai: "Jia Jia" can hold a simple conversation and make specific facial expressions when asked, and her creator believes the eerily life-like robot heralds a future of cyborg labour in China
  19. Robotic mannequin by Hong Kong Polytechnic University’s Institute of Textiles and Clothing
  20. Biologists Discover New Type of Microbial Photosynthesis: Prof. Beyenal and his colleagues from the United States and China report today on the unique metabolic process seen for the first time in a pair of bacteria (Prosthecochloris aestuarii and Geobacter sulfurreducens)
  21. Chinese commercial space player ExPace sent three small satellites into orbit on a Kuaizhou-1A solid-fuelled rocket as the corporation looks to gain a foothold in the domestic and international launch market
  22. A major breakthrough in 3-D printed medicine could bring hope to nearly 1.8 billion patients with cardiovascular disease. Chinese scientists working for Sichuan Revotek have successfully 3-D printed blood vessels and implanted them in rhesus monkeys
  23. Chinese Tech Company Takes On Microsoft With Super Cheap Tablet
In Economic news
  1. Chinese smartphones gained 40% of Indian market last year: survey Lenovo and Xiaomi took the second and third spots respectively, while India’s domestic brands saw a drop in market share
  2. McDonald's sells China business for $2.9bn
  3. This Chinese Carmaker Hopes to Be the First to Crack the U.S.
  4. Why you shouldn’t believe the horror stories about China’s economy
  5. Alibaba job boom: Jack Ma chats with Trump about how to create 1 million US jobs over 5 years
  6. US Steel Tariffs Against China Are Working: Americans Losing Jobs, Becoming Poorer As A Result
  7. China Ready to Step Up Scrutiny of U.S. Firms If Trump Starts Feud: Sources Options include subjecting well-known U.S. companies or ones with large Chinese operations to tax or antitrust probes. Other possible measures include anti-dumping investigations
  8. Obama got tough on China. It cost U.S. jobs and raised prices: 35% tariff on Chinese tires. Study from Peterson Institute of International Economics found higher prices cost an extra $1.1b, which translated to an estimated 3,731 jobs lost. China's retaliation cost American chicken producers $1b
  9. China logs record outbound investment
  10. China’s Pink Economy Is Leading the Country's Battle for LGBT Rights
  11. Narrowing talent recruitment gap between local and foreign companies in China: Report
  12. China turns to robots as workers age
  13. China banks extend record 12.65 trillion yuan in loans in 2016 as debt worries mount
  14. Trump Concerns Have Hedge Fund Investor Looking to China
  15. The humble ballpoint pen has become a new symbol of China's innovation economy
  16. ANZ sells UDC Finance to China's HNA Group in $628m deal
  17. How debt differs in China, the US and Japan
  18. A Trade War That Cannot Be Won
  19. China Expected to Poach More Taiwan Chip Execs
  20. China's Bitcoin Exchanges Quietly Made Policy Updates Overnight
  21. Finally! China celebrates ballpoint breakthrough
  22. China’s reputation for low-cost manufacturing under attack
  23. REPORT: China will merge media outlets to increase influence 'in the area of financial information'
  24. Hong Kong’s Property Billionaires Are the World's Richest
In Military news
  1. Does China’s deep-sea tech upgrade point to submarine signals network under Pacific? China had deployed hundreds of buoys, including nearly 20 deep anchor points, in the Western ­Pacific since 2014
  2. Report: China Could Have 351 Navy Ships By 2020. Plans to add more YUZHAO LPDs (amphibs which can carry 800 troops, 4 helicopters and 20 armored vehicles), new Type 055 cruiser (equipped with missiles, lasers and rail-gun weapons), HOBEI-glass guided missile patrol boats and JIANGDAO light frigates
  3. Genuinely Domestic Design: Introducing China’s HJ-8 Anti-Tank Missile
  4. Beijing freezes military ties with Seoul
  5. Female Navy Forces Show Strength Aboard China's 1st Aircraft Carrier: Around 100 officers set sail on voyage. Song said 'I believe such a moment highlights all female officers in China's navy. It is relevant to all service women who dedicated themselves for the rejuvenation of the Chinese nation'
  6. China’s third aircraft carrier may soon be in the pipeline: China’s second aircraft carrier, CV-17 is currently at an advanced stage of construction at Dalian Shipbuilding in north-eastern China
  7. Taiwan scrambles jets, navy as China aircraft carrier enters Taiwan Strait
  8. For the first time, a Chinese submarine has docked at a port in Malaysia, signaling deepening military ties between the two countries, which are already partners in the development of the Beijing- led Maritime Silk Road
  9. Chinese bomber flies round contested Spratlys in show of force - U.S. official
  10. China aircraft carrier Liaoning tested
Other Notables
  1. Chinese Exclusion Act of 1882 curriculum resources: Who came to the United States at the end of the nineteenth and beginning of the twentieth century? Why did they come? What was their experience like when they arrived?
  2. Glass ball turned into egg, Chinese artist displays incredible magic: Chinese artist displays incredible magic in N China's Wuqiao, the birthplace of Chinese acrobatics
  3. Can Internet Slang Develop Traditional Chinese? Many new words and terms appear each year, but linguists are concerned about the impact of Internet slang
  4. The rise, fall, and comeback of the Chinese economy over the last 800 years
  5. Another Chinese Actress in Relationship with Younger Man: Chinese actress Li Bingbing is in a relationship with a man 10 years younger than her. The 43-year-old celebrity admit she is in a relationship with Xu Wennan, an executive at an investment company
  6. If the U.S. withdraws, China wonders whether it is ready to lead the world
  7. Pictures: Group Wedding Ceremony Held in NE China's Heilongjiang
  8. The train route from China to London (used from January 2017) [634 x 440]
  9. Trump May Actually Be The Greatest Gift China Could Ask For In Africa
  10. Shanghai Tower: how China's tallest skyscraper was built
  11. Sweet commercial for the Oppo R9s
  12. A fair review of President Obama’s legacy
  13. The King's Avatar, Tencent 2017 eSports anime series PV
  14. ancient Chinese art featuring American/Japanese pop icons
  15. China's Snow Eagle 601 Aircraft Makes First Landing at Kunlun Station in Antarctica
  16. Lessons in respect at China's Confucius kindergartens
  17. Mythological creatures come alive in Big Fish art
  18. Real patriots see the continuous progress China is making
  19. Chinese-Indian joint archaeological team discovers Chinese cultural relics in India: The Chinese pottery that's been found has been identified as coming from several different provinces and ranging from the 8th century to the 14th century
  20. How ethnicity and religion can influence financial habits: people of Chinese heritage tended to save more than Caucasian counterparts, even low income earners prioritising savings, leading to the conclusion that inherent cultural factors such as Confucianism emphasise frugality and familial concerns
  21. What If China's Money Stream Stops Flowing to Hollywood?
  22. What China’s sexiest grandpa tells us about the country's global plans
  23. China's new topsy-turvy bridge actually has three bridges woven into one
  24. Zhou Youguang, often credited as the "father of (Hanyu) Pinyin", passed away at 111.
  25. Donnie Yen bringing knives to a gunfight
  26. 前进中国 Progressing China 2016
  27. International ice sculptors gather in China for annual festival
  28. Bizarre tale of the Queen, 'Jack' the bonsai tree and a first-class jaunt from China
  29. When all of China goes on vacation at once
  30. Giant panda cubs kick start Chinese New Year 2017 celebrations
  31. Chinese newlyweds make the most of Tasmania's blooming lavender
submitted by AutoModerator to Sino [link] [comments]

Bitcoin e Blockchain: 10 fatti che non puoi ignorare - YouTube How Does Bitcoin Work? - YouTube Andreas Popp: Was steckt hinter der Bitcoin-Hysterie ... Paano kumita sa Coins ph sa pag Buy and Sell ng Bitcoin ...

This page describes the behavior of the reference client.The Bitcoin protocol is specified by the behavior of the reference client, not by this page. In particular, while this page is quite complete in describing the network protocol, it does not attempt to list all of the rules for block or transaction validity.. Type names used in this documentation are from the C99 standard. The Current Unix Timestamp. 1603664722 seconds since Jan 01 1970.(UTC) This epoch translates to: 10/25/2020 @ 10:25pm (UTC) 2020-10-25T22:25:22+00:00 in ISO 8601 Sun, 25 Oct 2020 22:25:22 +0000 in RFC 822, 1036, 1123, 2822 Sunday, 25-Oct-20 22:25:22 UTC in RFC 2822 2020-10-25T22:25:22+00:00 in RFC 3339 Teams. Q&A for Work. Stack Overflow for Teams is a private, secure spot for you and your coworkers to find and share information. Timestamp to which to set the notification timestamp. Typ: Zeitstempel (erlaubte Formate) torevid. Revision to set the notification timestamp to (one page only). Typ: Ganzzahl newerthanrevid. Revision to set the notification timestamp newer than (one page only). Typ: Ganzzahl continue. Falls weitere Ergebnisse verfügbar sind, dies zum Fortfahren verwenden. titles. Eine Liste der Titel, an ... The Bitcoin universe is vast. So is Bitcoin.com. Check our Wiki, where you can learn everything you were afraid to ask.Or read our news coverage to stay up to date on the latest. Or delve into ...

[index] [8328] [3376] [43124] [4806] [145] [11727] [20738] [35296] [39115] [19928]

Bitcoin e Blockchain: 10 fatti che non puoi ignorare - YouTube

Start trading Bitcoin and cryptocurrency here: http://bit.ly/2Vptr2X Bitcoin is the first decentralized digital currency. All Bitcoin transactions are docume... Gier frisst Hirn. Diese einfache Erkenntnis ist nicht neu. Denken wir nur an die börseneuphorische dot.com-Blase, die sich vor knapp 20 Jahren weltweit aufba... Domande per Monty? https://start.askmonty.it/ Iscriviti per più video http://bit.ly/1TtDf4j Vuoi ricevere la mia OGNITANTOLETTER ? http://marcomontemagno.... Share ko lang kung paano kumita sa pag buy and sell ng Bitcoin sa Coins.ph. Register here: https://coins.ph/m/join/wohxkq (bonus 50 pesos) Or enter this PROM... Thanks to Away for sponsoring this video! Go to https://www.awaytravel.com/techquickie and use promo code techquickie to get $20 off your next order! Bitcoin...

#