Android is now the worldβs largest earthquake detection network
Google leverages the massive scale of Android to do phone-based earthquake tracking.
Back in 2016, Ars reported on an interesting use for the bundle of sensors we carry around every day in our smartphonesβearthquake detection. The accelerometers in your phone make a passable-enough seismometer, and together with location data and enough users, you could detect earthquakes and warn users as the shocks roll across the landscape. The University of California-Berkeley, along with funding from the state of California, built an app called "MyShake" and a cheap, effective earthquake detection network was born, at least, it was born for people who installed the app.
https://arstechnica.com/gadgets/2020/08/android-is-now-the-worlds-largest-earthquake-detection-network/
#Google #Android #Earthquake #detection #network
Google leverages the massive scale of Android to do phone-based earthquake tracking.
Back in 2016, Ars reported on an interesting use for the bundle of sensors we carry around every day in our smartphonesβearthquake detection. The accelerometers in your phone make a passable-enough seismometer, and together with location data and enough users, you could detect earthquakes and warn users as the shocks roll across the landscape. The University of California-Berkeley, along with funding from the state of California, built an app called "MyShake" and a cheap, effective earthquake detection network was born, at least, it was born for people who installed the app.
https://arstechnica.com/gadgets/2020/08/android-is-now-the-worlds-largest-earthquake-detection-network/
#Google #Android #Earthquake #detection #network
Forwarded from BlackBox (Security) Archiv
Visual Threat Intelligence
The most comprehensive database of detected deepfakes with actionable insights
π ππΌ https://sensity.ai/
#deepfake #threat #detection #deeptrace
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
The most comprehensive database of detected deepfakes with actionable insights
π ππΌ https://sensity.ai/
#deepfake #threat #detection #deeptrace
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Sensity
Sensity AI: Best All-In-One Deepfake Detection Software 2024
Sensity AI thanks to an all-in-one approach can guarantee the best deepfake detection software capabilities currently available in the marketplace
Forwarded from BlackBox (Security) Archiv
Maltrail
Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g.
π‘Architecture
Maltrail is based on the Traffic -> Sensor <-> Server <-> Client architecture. Sensor(s) is a standalone component running on the monitoring node (e.g. Linux platform connected passively to the SPAN/mirroring port or transparently inline on a Linux bridge) or at the standalone machine (e.g. Honeypot) where it "monitors" the passing Traffic for blacklisted items/trails (i.e. domain names, URLs and/or IPs). In case of a positive match, it sends the event details to the (central) Server where they are being stored inside the appropriate logging directory (i.e. LOG_DIR described in the Configuration section). If Sensor is being run on the same machine as Server (default configuration), logs are stored directly into the local logging directory. Otherwise, they are being sent via UDP messages to the remote server (i.e. LOG_SERVER described in the Configuration section).
π ππΌ https://github.com/stamparm/maltrail#introduction
π ππΌ ipsum:
https://github.com/stamparm/ipsum
#stamparm #maltrail #ipsum #tool #malicious #detection #blacklist
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g.
zvpprsensinaix.com
for Banjori malware), URL (e.g. hXXp://109.162.38.120
/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231
for known attacker) or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic mechanisms that can help in discovery of unknown threats (e.g. new malware).π‘Architecture
Maltrail is based on the Traffic -> Sensor <-> Server <-> Client architecture. Sensor(s) is a standalone component running on the monitoring node (e.g. Linux platform connected passively to the SPAN/mirroring port or transparently inline on a Linux bridge) or at the standalone machine (e.g. Honeypot) where it "monitors" the passing Traffic for blacklisted items/trails (i.e. domain names, URLs and/or IPs). In case of a positive match, it sends the event details to the (central) Server where they are being stored inside the appropriate logging directory (i.e. LOG_DIR described in the Configuration section). If Sensor is being run on the same machine as Server (default configuration), logs are stored directly into the local logging directory. Otherwise, they are being sent via UDP messages to the remote server (i.e. LOG_SERVER described in the Configuration section).
π ππΌ https://github.com/stamparm/maltrail#introduction
π ππΌ ipsum:
https://github.com/stamparm/ipsum
#stamparm #maltrail #ipsum #tool #malicious #detection #blacklist
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
GitHub
GitHub - stamparm/maltrail: Malicious traffic detection system
Malicious traffic detection system. Contribute to stamparm/maltrail development by creating an account on GitHub.
Forwarded from BlackBox (Security) Archiv
This media is not supported in your browser
VIEW IN TELEGRAM
Thailand shop installs system to keep doors shut to customers not wearing masks
Twitter user Niall Harbison shared a video of the shop which has a door fitted with a machine that scans the face of the customer for a mask and also records the body temperature. The doors open only if the machine detects a mask and the customer doesnβt have a fever.
π ππΌ https://indianexpress.com/article/trending/trending-globally/thailand-face-mask-detection-machine-6716001/
π ππΌ https://nitter.net/NiallHarbison/status/1312668730791403520#m
#thailand #corona #facemask #detection #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Twitter user Niall Harbison shared a video of the shop which has a door fitted with a machine that scans the face of the customer for a mask and also records the body temperature. The doors open only if the machine detects a mask and the customer doesnβt have a fever.
π ππΌ https://indianexpress.com/article/trending/trending-globally/thailand-face-mask-detection-machine-6716001/
π ππΌ https://nitter.net/NiallHarbison/status/1312668730791403520#m
#thailand #corona #facemask #detection #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag