Let's Encrypt's New Root and Intermediate Certificates

Hacker News

On Thursday, September 3rd, 2020, Let’s Encrypt issued six new certificates: one root, four intermediates, and one cross-sign. These new certificates are part of our larger plan to improve privacy on the web, by making ECDSA end-entity certificates widely…

20 September 2020

TenFourFox FPR27b1 available (now with sticky Reader View)

Planet Mozilla

TenFourFox Feature Parity Release 27 beta 1 is now available (downloads, hashes, release notes). The big user-facing update for FPR27 is a first pass at "sticky" Reader View. I've been paying attention more to improving TenFourFox's implementation of…

12 September 2020

What’s new in CryptoKit

News - Apple Developer

People expect apps to be secure and their data to be protected. You may need to perform cryptographic operations to implement features such as authentication, message encryption, or to meet regulatory requirements. CryptoKit is a Swift framework that makes…

8 September 2020

Checking Data Consistency for RDS for MySQL

Percona Database Performance Blog

MySQL for RDS and DBaaS, in general, are very controlled environments by the vendors, meaning that there are missing things like a SUPER grant for the root user (and any user in general). This has some implications on operations, one of them being the…

8 September 2020

Which GPUs to get for deep learning

Hacker News

Deep learning is a field with intense computational requirements, and your choice of GPU will fundamentally determine your deep learning experience. But what features are important if you want to buy a new GPU? GPU RAM, cores, tensor cores? How to make a…

7 September 2020

Artificial Intelligence Can Create Sound Tracks for Silent Videos

InfoQ - AI, ML & Data Engineering

Researchers Ghose and Prevost created a deep learning algorithm which, given a silent video, can generate a realistic sounding synchronised soundtrack. They trained the neural network to classify the class of the sound to generate, and they also trained a…

7 September 2020

Attackers Found Building Malicious Container Images Directly on Host

InfoQ - Containers

Aqua’s cyber security research team, ‘Nautilus’ has found a new attack technique targeting misconfigured Docker Daemon API ports to build an image directly on the target host container infrastructure, in order to mine cryptocurrency. Further investigation…

7 September 2020