hardwareConcurrency is a one way we check for obvious bots. Servers have 64, 128, 256 cores (or more). PCs and Smartphones that humans use don't have that many cores. https://lnkd.in/gvWXmPHh #adtech #adfraud #programmatic FouAnalytics "see Fou yourself"
Keri Thomas的动态
最相关的动态
-
Do You Remember Your First Palm Pilot? Before smartphones ruled the world, IT pros, tech geeks, and business warriors had one device strapped to their belts: the Palm Pilot. ??? Graffiti handwriting ?? Syncing with your PC (if you could get the cable to work) ?? Beaming contacts via IR like some kind of Jedi ? Overclocking it just to open apps slightly faster ?? Running out of memory because a 2MB Palm IIIx felt "huge" at the time We all thought we looked so futuristic tapping away on this thing. ?? But for the real Palm power users out there… who remembers installing HackMaster to tweak system settings? Or using a foldable Stowaway keyboard to turn it into a mini workstation? ?? Did you ever: ? Overclocked your Palm with Afterburner ? Tried to tether it to a Nokia for "mobile internet" ? Installed a Linux distro (because why not?) ? Used it to "warwalk" for Wi-Fi before it was cool Bonus points if you still have one in a drawer somewhere. ???? #PalmPilot #ThrowbackTech #ITMemories #90sTech #TechNostalgia
要查看或添加评论,请登录
-
-
#AFIR won't be dull. Installing thousands of payment devices on as many fast chargers was always going to be a challenge. Probably during at least 2/10 fast charging visits I encountered screens like this one shared yesterday by #Raffael, at SMATRICS #Meggenhofen (yes IONITY and Tesla are there too). This screen in particular, worries me as a nerd, because when I started out with phone ROMS back in the day, Android 4.4.4 was pretty popular already.. Those times are "quite a while ago", so what did we learn today? See you at a fast charger soon! #alwaysbecharging #fastcharging #infrastrucure #security #android
要查看或添加评论,请登录
-
-
Android is a difficult target to exploit nowadays, GPU drivers still provide a rich and complex attack surface to untrusted apps though Another reason why so many Android security researchers are looking into GPU driver vulnerabilities is the fact that these bugs sometimes result in arbitrary read/write primitives from the GPU side, where a device-specific MMU (SMMU) controls which addresses are readable/writable This can be quite convenient, when working out bypasses for the numerous exploit mitigations that need to be circumvented on modern Android kernels Last year at ClevCode, we had been working for months on an Adreno GPU driver 0day we found, gradually improving reliability from ~70% to ~100%, and exploitation time from 2 minutes down to a couple of seconds, and from using hardcoded symbol addresses to having no hardcoded address dependencies Then JUST when we had perfected it, the bug was found and killed independently by a certain prolific Google Project Zero hacker .. ?? For us, finding the bug was pretty quick in that particular case, getting the reliability up & time requirements down kernel-specific took a lot of work though
Rooting Android: Exploiting Your GPU On Smartphone (CVE-2024-23380) discovered by Google's Android Red Team #BlackHat2024 PoC exploit is not available for download. [slides] https://lnkd.in/edSZhkqc
要查看或添加评论,请登录
-
It is common knowledge that government spies can look into your computer and smartphone. This is no longer possible with these devices. https://lnkd.in/erZKAygu
要查看或添加评论,请登录
-
Despite a slowdown in smartphone units, ARM royalties were significantly up due to transition from version 8 to version 9 architecture bringing more compute performance. Market should pick up in H2. #ARM #Royalties #ArchitectureUpgrade
要查看或添加评论,请登录
-
Rooting Android: Exploiting Your GPU On Smartphone (CVE-2024-23380) discovered by Google's Android Red Team #BlackHat2024 PoC exploit is not available for download. [slides] https://lnkd.in/edSZhkqc
要查看或添加评论,请登录
-
?? Computerised gate access is necessary for many storage facilities to protect the building from unwanted intruders. ?? PIN pads are the most common solution?–?but are less secure than smartphones and need more administration.? ?? Deciding for a smartphone-based access system can be a step towards a fully digitalised access system,?which streamlines?operations so the facility runs more efficiently. #selfstorage #smartaccess #pinpad #gateaccess #selfstorageeurope
要查看或添加评论,请登录
-
-
Android is a difficult target to exploit nowadays, GPU drivers still provide a rich and complex attack surface to untrusted apps though Another reason why so many Android security researchers are looking into GPU driver vulnerabilities is the fact that these bugs sometimes result in arbitrary read/write primitives from the GPU side, where a device-specific MMU (SMMU) controls which addresses are readable/writable This can be quite convenient, when working out bypasses for the numerous exploit mitigations that need to be circumvented on modern Android kernels Last year at ClevCode, we had been working for months on an Adreno GPU driver 0day we found, gradually improving reliability from ~70% to ~100%, and exploitation time from 2 minutes down to a couple of seconds, and from using hardcoded symbol addresses to having no hardcoded address dependencies Then JUST when we had perfected it, the bug was found and killed independently by a certain prolific Google Project Zero hacker .. ?? For us, finding the bug was pretty quick in that particular case, getting the reliability up & time requirements down kernel-specific took a lot of work though
Rooting Android: Exploiting Your GPU On Smartphone (CVE-2024-23380) discovered by Google's Android Red Team #BlackHat2024 PoC exploit is not available for download. [slides] https://lnkd.in/edSZhkqc
要查看或添加评论,请登录
-
One of the biggest challenges in observability is preprocessing the telemetry data (logs, metrics, traces, etc) that is sent by telemetry forwarders like (fluentbit, otel-collector, vector etc.). e.g. 66.249.65.159 - - [06/Nov/2014:19:10:38 +0600] "GET /news/53f8d72920ba2744fe873ebc.html HTTP/1.1" 404 177 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 6_0 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5376e Safari/8536.25 (compatible; Googlebot/2.1; +https://lnkd.in/eHGXq7x)" The above log line is not really very useful for analysis. While regex and other methods of parsing can solve this trivial problem, anything more complex becomes extremely hard. OpenObserve pipelines allow you to build observability pipelines in most easy and powerful way compared to any other observability platform. It will make your life super easy.
要查看或添加评论,请登录
-
-
Looking to transform your data on the fly before it’s stored in OpenObserve? Meet Pipelines – the perfect way to clean, enrich, and customize your data right after it’s sent from the source. Simplify real-time data transformation and make your analytics seamless! ??
One of the biggest challenges in observability is preprocessing the telemetry data (logs, metrics, traces, etc) that is sent by telemetry forwarders like (fluentbit, otel-collector, vector etc.). e.g. 66.249.65.159 - - [06/Nov/2014:19:10:38 +0600] "GET /news/53f8d72920ba2744fe873ebc.html HTTP/1.1" 404 177 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 6_0 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5376e Safari/8536.25 (compatible; Googlebot/2.1; +https://lnkd.in/eHGXq7x)" The above log line is not really very useful for analysis. While regex and other methods of parsing can solve this trivial problem, anything more complex becomes extremely hard. OpenObserve pipelines allow you to build observability pipelines in most easy and powerful way compared to any other observability platform. It will make your life super easy.
要查看或添加评论,请登录
-
Team Leader (Security R&D) w Nethone
2 个月Simple checking its value is not good enough - even very basic bots and "out-of-the-box." bot solutions spoof this value. You have check the integrity of this API and detect various hooking techniques. Also, bots using mobile devices will natively return sane values.