Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $23,106
28%  
Woo hoo!! And we're now over 28%!! Thank you all very much!! God bless.

Keyword: code

Brevity: Headers | « Text »
  • WikiLeaks Vault 7 Marble: Latest Leaks Show CIA Ability To Hide Origins Of Attack

    03/31/2017 4:55:39 PM PDT · by markomalley · 9 replies
    International Business Times ^ | 3/31/17 | AJ Dellinger
    WikiLeaks continued its ongoing release of documents from the CIA Friday with a collection of files detailing the agency’s ability to obscure its activities and make it difficult for investigators to attribute the origins of attacks and hacking.The latest release from what WikiLeaks calls Vault 7 is titled “ Marble ” and contains documentation of files that are purportedly part of the CIA Core Library of malware code. WikiLeaks describes Marble as part of the CIA’s “anti-forensics approach.” The name “Marble” refers to a specific algorithm that scrambles and unscrambles data.Marble is one of the more technical releases that WikiLeaks...
  • Chinese spyware code was copied from America's NSA: researchers

    02/22/2021 5:09:14 AM PST · by Oldeconomybuyer · 15 replies
    Reuters ^ | February 22, 2021 | By Raphael Satter
    WASHINGTON - Chinese spies used code first developed by the U.S. National Security Agency to support their hacking operations, Israeli researchers said on Monday, another indication of how malicious software developed by governments can boomerang against their creators. Tel Aviv-based Check Point Software Technologies issued a report noting that some features in a piece of China-linked malware it dubs “Jian” were so similar they could only have been stolen from some of the National Security Agency break-in tools leaked to the internet in 2017. Yaniv Balmas, Checkpoint’s head of research, called Jian “kind of a copycat, a Chinese replica.” The...
  • Report: ‘At Least a Dozen’ Republican Senators Walked Out of Impeachment Trial

    02/12/2021 6:13:38 PM PST · by SeekAndFind · 145 replies
    Breitbart ^ | 02/12/2021 | Joel B. Pollak
    At least a dozen Republican Senators reportedly walked out of the Senate impeachment trial on Thursday, after lead House impeachment manager Rep. Jamie Raskin (D-MD) tried to argue that years of Trump rallies were incitement to violence.National Review reporter John McCormack reported several Republican Senators left the chamber during part of Raskin’s presentation, and missed the subsequent argument of Rep. Ted Lieu (D-CA), who argued that Trump was a future danger.Inside the Senate chamber:Trump’s 2016 rivals Rubio, Cruz, and Graham watched intently as video documented Trump’s 2015-2020 remarks making light of or justifying political violence.Graham, Rubio, and Cruz then left...
  • Zodiac ‘340 Cipher’ Cracked by Code Experts 51 Years After it Was Sent to the S.F. Chronicle

    12/11/2020 1:16:26 PM PST · by nickcarraway · 42 replies
    San Francisco Chronicle ^ | Dec. 11, 2020 | Kevin Fagan
    The solution to what’s known as the 340 Cipher, one of the most vexing mysteries of the Zodiac Killer’s murderous saga, has been found by a code-breaking team from the United States, Australia and Belgium. The cipher, sent in a letter to The Chronicle in November 1969, has been puzzling authorities and amateur sleuths since it arrived 51 years ago. Investigators hoped the Zodiac, who killed five people in the Bay Area in 1968 and 1969, would reveal his name in one of his many ciphers, but there is no such name in the 340. According to code-breaking expert David...
  • Researchers reveal 'extremely serious' vulnerabilities in e-voting machines [2006]

    12/01/2020 12:26:22 PM PST · by Jyotishi · 17 replies
    Princeton University ^ | September 13, 2006 | Teresa Riordan
    In a paper published on the Web today, a group of Princeton computer scientists said they created demonstration vote-stealing software that can be installed within a minute on a common electronic voting machine. The software can fraudulently change vote counts without being detected. "We have created and analyzed the code in the spirit of helping to guide public officials so that they can make wise decisions about how to secure elections," said Edward Felten, http://www.cs.princeton.edu/~felten/ the director of the Center for Information Technology Policy, a new center http://www.princeton.edu/main/news/archive/S13/34/75A49/index.xml at Princeton University that addresses crucial issues at the intersection of society...
  • Iran's Secret Plan if Attacked by US Codenamed "Judgement Day"

    04/29/2006 2:13:00 PM PDT · by DoctorZIn · 22 replies · 1,233+ views
    Asharq Alawsat ^ | 4.29.2006 | DoctorZin
    Ali Nouri Zadeh, Asharq Alawsat: Eight fundamentalist Islamist organizations have received large sums of money in the last month from the Iranian intelligence services, as part of a project to strike U.S military and economic installations across the Middle East Asharq Al-Awsat has learned. The plan, which also includes the carrying out of suicide operations targeting US and British interests in the region, as well as their Arab and Muslim allies, in case Iran is attacked, was drawn up by a number of experts guerilla warfare and terrorist operations, and was revealed by a senior source in the Iranian armed...
  • With the walls closing in on Obama, Ben Rhodes weaves a sticky narrative web

    04/30/2019 11:28:00 AM PDT · by detective · 21 replies
    American Thinker ^ | April 30, 2019 | Monica howalter
    Now that the Mueller report is out, effectively exonerating President Trump of colluding with the Russians to steal the election from Hillary Clinton, the Trump administration has begun investigations as to the origins of the phony Steele dossier and the illegal surveillance of his campaign. It's a trail that's unlikely to lead anywhere but to the office of embittered President Obama, and independent reporter Nicholas Ballasy got a chance to ask the Obama administration's former deputy national security adviser, Ben Rhodes, whether he thought this investigation would eventually lead. His response was about what you might expect — nowhere Obama...
  • Elon Musk Bullish On Tesla Robotaxis, Cathie Wood & Sam Korus Show Us The Money

    07/12/2020 4:43:38 PM PDT · by RomanSoldier19 · 16 replies
    https://cleantechnica.com ^ | July 11th, 2020 | by Zachary Shahan
    ully self-driving vehicles that can go where they please and operate anywhere regulators allow them to do so are a tricky thing to think about, for three reasons. First of all, the technology isn’t here yet. It’s hard to believe in it until it exists, and it’s hard to know how long until it is truly available. Secondly, as a person who drives a Tesla Model 3 with the Full Self-Driving package, I see a handful of edge cases just in my measly amount of driving that seem tricky and hard to resolve. Sometimes the problem is confusing lines at...
  • Susan Rice Tweets “Suicide Hotline” Phone Number And Gets Instantly Bombarded With “Clinton Body Count” Warnings

    06/27/2020 5:46:55 PM PDT · by Beave Meister · 52 replies
    Wayne Dupree.com ^ | 6/27/2020 | MISSY CRANE
    The “Clinton Body Count” is an urban legend where people claim that the Clintons have their enemies or associates who “know too much” murdered, but they make it look like a suicide. The term comes from a rather long list of friends, enemies, and associates of the Clintons who have been found dead from “apparent suicide.” If you go on Twitter the hashtag #ClintonBodyCount is very active and filled with all sorts of juicy tidbits and theories. While the #ClintonBodyCount is mostly a funny joke, like with all “jokes” there’s truth in it…why do so many of Clintons “associates” die?...
  • (New Judicial Watch Documents) JW v DOJ Strzok-Page Emails Prod 21 00154

    04/21/2020 8:55:24 PM PDT · by bitt · 13 replies
    Judicial Watch ^ | 4/21/2020 | staff
    Lots of incriminating stuff. Here's a good tweet explaining what's in there: https://twitter.com/AnonymousAda/status/1252708336514076672
  • An ‘Off-the-Shelf, Skeleton Project’: Experts Analyze the App That Broke Iowa

    02/06/2020 7:34:01 AM PST · by C19fan · 20 replies
    Vice ^ | February 5, 2020 | Jason Koebler, Joseph Cox, and Emanuel Maiberg
    The app used to report early results in Iowa's Democratic Presidential primary caucus was rudimentary in many ways, according to analyses by multiple Android app development experts and cybersecurity professionals who decompiled and studied the app after it was obtained by Motherboard. The app, called IowaReporterApp and developed by a company called Shadow Inc., malfunctioned during the caucus, causing mass chaos and delaying the public reporting of results until Tuesday evening. The app was designed to rapidly report early results, not tabulate final vote counts. That means its failure will not result in the election result being altered. But, until...
  • Defector Testifies Against Terror Suspect

    01/31/2004 3:14:47 PM PST · by Lessismore · 2 replies · 114+ views
    Deutsche Welle ^ | 30.01.2004
    Mzoudi was a liaison to al Qaeda, witness said. A man claiming to be a former Iranian spy testified Friday that Abdelghani Mzoudi, the second man to be tried for an alleged role in the Sept. 11 attacks, was involved in the preparations to hit the World Trade Center. The witness, who goes by the alias Hamid Reza Zakeri, took the stand at the Hanseatic Higher Regional Court in Hamburg and claimed that Mzoudi, was "responsible for part of the organization" of the suicide attacks that destroyed the twin towers in New York and damaged the Pentagon. Zakeri testified Mzoudi...
  • 9 lies programmers tell themselves

    11/12/2019 3:41:01 AM PST · by ShadowAce · 70 replies
    InfoWorld ^ | 28 October 2019 | Peter Wayner
    Programmers have pride with good reason. No one else has the power to reach into a database and change reality. The more the world relies on computers to define how the world works, the more powerful programmers become.Alas, pride goeth before the fall. The power we share is very real, but it’s far from absolute and it’s often hollow. In fact, it may always be hollow because there is no perfect piece of code. Sometimes we cross our fingers and set limits because computers make mistakes. Computers too can be fallible, which we all know from too much firsthand experience....
  • Mueller’s ‘Pit Bull’ Arranged Meeting With Reporters To Discuss Manafort Investigation

    07/08/2018 9:38:27 PM PDT · by Texas Fossil · 44 replies
    The Daily Caller ^ | 11:48 PM 07/08/2018 | Chuck Ross
    Justice Department documents released on Friday confirm that the DOJ attorney known as Robert Mueller’s “pit bull” arranged a meeting with journalists in April 2017 to discuss an investigation into Paul Manafort.The documents show that Andrew Weissmann arranged a meeting with DOJ and FBI officials and four Associated Press reporters on April 11, 2017, just over a month before Mueller was appointed special counsel.Manafort’s lawyers obtained the documents on June 29 and revealed them in a briefing filed in federal court in Virginia. The attorneys are pushing for a hearing into what they say are possible leaks of secret grand...
  • Bristol academic cracks Voynich code, solving century-old mystery of medieval text

    05/15/2019 5:12:44 AM PDT · by vannrox · 52 replies
    PHYS ^ | 15may19 | by University of Bristol
    A University of Bristol academic has succeeded where countless cryptographers, linguistics scholars and computer programs have failed—by cracking the code of the 'world's most mysterious text', the Voynich manuscript. Although the purpose and meaning of the manuscript had eluded scholars for over a century, it took Research Associate Dr. Gerard Cheshire two weeks, using a combination of lateral thinking and ingenuity, to identify the language and writing system of the famously inscrutable document. In his peer-reviewed paper, The Language and Writing System of MS408 (Voynich) Explained, published in the journal Romance Studies, Cheshire describes how he successfully deciphered the manuscript's...
  • CORTEZ GIVES TWITTER A LESSON ON 'CODE SWITCHING' AFTER CONSERVATIVES CRITICIZE HER ACCENT

    04/08/2019 1:48:40 PM PDT · by Libloather · 92 replies
    Newsweak ^ | 4/07/19 | GILLIAN EDEVANE
    New York Congresswoman Alexandria Ocasio-Cortez continued to defend herself against claims promoted by Donald Trump, Jr. and others that she changes her accent to pander to minority audiences. In a string of Saturday evening tweets, the first-term Democrat wrote that her habit of "code-switching" was informed by years of navigating professional and social environments as a woman of color. "Next time you‘re told straight hair is 'unprofessional' and that speaking like your parents do is 'uneducated,' then you can complain about code-switching," she wrote, referring to the practice of changing speech patterns based on environment. "Code-switching is a tool communities...
  • NJ anti-gun AG is trying to take down the free access of Gun blueprints on the Internet (my title)

    02/07/2019 4:59:17 AM PST · by vannrox · 17 replies
    Code is free speech ^ | FR post 7FEB19 | Editorial staff
    UPDATE: FEBRUARY 5, 2019After Threat of Prosecution, Free Speech Advocates Seek Restraining Order Against New Jersey Attorney General Gurbir Grewal in Federal Civil Rights Lawsuit TRENTON, N.J. (February 5, 2019) — Today, attorneys for six advocacy organizations and one individual, Firearms Policy Coalition founder Brandon Combs, filed a new lawsuit and a motion seeking a restraining order and preliminary injunction against New Jersey Attorney General Gurbir Grewal. The case was filed just days after Grewal’s Office of the Attorney General sent a threat of prosecution to Cloudflare, a major Internet services company headquartered in San Francisco, about www.CodeIsFreeSpeech.com. A copy of...
  • SOURCES: CHINA HACKED HILLARY CLINTON’S PRIVATE EMAIL SERVER

    08/28/2018 6:46:14 AM PDT · by E. Pluribus Unum · 107 replies
    The Daily Caller ^ | 9:22 PM 08/27/2018 | Richard Pollock | Reporter
    A Chinese-owned company penetrated former Secretary of State Hillary Clinton’s private server, according to sources briefed on the matter. The company inserted code that forwarded copies of Clinton’s emails to the Chinese company in real time. The Intelligence Community Inspector General warned of the problem, but the FBI subsequently failed to act, Texas Republican Rep. Louie Gohmert said during a July hearing. A Chinese-owned company operating in the Washington, D.C., area hacked Hillary Clinton’s private server throughout her term as secretary of state and obtained nearly all her emails, two sources briefed on the matter told The Daily Caller News...
  • BREAKING: E-mails Show FBI Brass Discussed Dossier Briefing Details With CNN

    05/21/2018 8:49:01 PM PDT · by Bigtigermike · 55 replies
    Newly revealed e-mails show that former Federal Bureau Investigation (FBI) deputy director Andrew McCabe was keenly aware of CNN’s internal understanding of a secret briefing about the infamous Steele dossier, days before CNN published any stories on the matter. The e-mails, which were obtained by Sen. Ron Johnson (R-Wisc.), also reveal that top officials used coded language to refer to the salacious and unverified allegations made by Steele. Former FBI director James Comey briefed then-President-Elect Donald Trump on January 6, 2017, on at least one unproven allegation contained in Steele’s dossier, which was jointly funded by the Hillary Clinton campaign...
  • Who Can Crack this Code (something fun on a Friday night)

    04/20/2018 6:36:19 PM PDT · by ealgeone · 64 replies
    vanity | 04-20-18 | ealgeone
    5-12-5-5-12 4-1-21-1 What does this mean?