Posts

Cryptanalysis protection

  Bloom-Blum-Shub The Bloom-Blum-Shub algorithm is very interesting and, if certain conditions are met, allows you to generate crypto-resistant pseudo-random numbers of large size. But if you generate numbers of 1024 bits or 2048 bits, then all the prime numbers that you can use in this algorithm have long been known. The required pairs of prime numbers for the algorithm are even smaller. And there is a risk of successful cryptanalysis of your protected data. It makes sense to use multiple layers of data encryption so that decoded at one layer does not give a meaningful view of the data. And at each level, use algorithms to improve data quality. This is of little use for stream encryption. But for storing personal data, master keys, passwords, PIN codes, tokens it can be very, very successful. And at the same time synchronicity is maintained. Those. multiple generators will create the same keys (numbers) on any number of generator instances. The downside is that generator instances nee

How to beat you

  Scope of planning When you query a search engine for pictures on a specific topic (for example, an airplane with stirrup engines) and select one of the ones found, you are training a Neural Network. Millions of users, requesting a search engine and making a choice, train it even more extensively. But your queries and choices can be recorded and used to train future versions of Neural Networks (and do it faster). Therefore, the emergence of Large Distributed Fake Systems is inevitable, which will introduce incorrect training data into Neural Networks (or Artificial Intelligence). And the scale of systems generating queries and making choices must be enormous to have an advantage or maintain a leading position in the development of Neural Networks. New reality

Naval unmanned attack boats

  Opinion Naval unmanned attack boats have demonstrated their effectiveness. The issue of protecting ships from them is very important. This is probably important for existing ships. One option is narrow pontoons along each side. With a streamlined shape, they will slow down the ship less, but will significantly reduce roll and prevent an unmanned boat from hitting the side of the ship. This is some kind of trimaran. Moreover, it is possible to provide for the release of pontoons to achieve maximum speed. The bow and stern of the ship will remain uncovered. But these are narrow sectors that can be protected with rapid-fire systems. Ships systems

Tech Position

  UAV Development The development of a simple and reliable operating system that can be installed on outdated Android smartphones will open up unlimited opportunities for the mass creation of cheap UAV control systems. Smartphones can be purchased at recycling prices. Their purchase, sale and transportation are not limited in any way. The smartphone contains all the necessary elements for autopilot. More accurate sensors (for example, a barometer) can be connected via a USB connector. The computing power of the processor does not degrade over time and does not depend on the availability of chip production in the country. Old smartphones may also be widely used in mining systems. UAV Development

Photo Web Cam

  Combat Java Sys A different system for storing, viewing and managing images is being prepared instead of an FTP hosting (server). It is possible that the FTP client will be saved in the application. Direct control of the camera will be provided - Press a button and take a picture. Android APP

Global Photo Web Cam

  Direct Cell Interesting topic for Combat Photo Web Cam use on moving platforms. Particularly interesting after successful data transfer using Direct to Cell technology to/from Starlink Android Project

Global Web Cam

Image
  Photo Web Cam Android APP