top Tor Project Mulls How Feds Took Down Hidden Websites
If you have so much resources as government of USA, what's the problem to get for example 500 servers in different places around the world with lets say 1 gigabit each. I assure you that they would know everything while standing in front and at the exit, sometimes even whole road. Tor client is picking those servers with best throughput first logically, it's not really random. Maybe even they already did that, maybe NSA and they are feeding public with exploit version. I would do that if i were them...
top Cell Transplant Allows Paralyzed Man To Walk
The man was from Poland, the operation was in Poland and was conducted by polish team in hospital in Poland.
top China Staging a Nationwide Attack On iCloud and Microsoft Accounts
Don't be naive. It's so easy to do it without warning. I can tell you at least 3 different methods of doing that. Remember, it's not just a single hacker, but government that controls whole traffic, that can impersonate not only any domain but any ip they want, they control BGP.
top Smart Battery Tells You When It's About To Explode
It's only me or everything this days is "smart", i mean someone will write couple of line of codes and suddenly it's smart... And in reality it's just dumb simple and NOT smart because it's just couple of static lines of code. It's really a marketing gimmick this days call something smart..
about a month and a half ago
top Mystery Gamer Makes Millions Moving Markets In Japan
If you think that stock brokers and big wall street companies have something you don't have then you are wrong. There is no magic in it, there is no hidden, secret formula. It's about watching news and reading quarterly financial reports of companies. If company made a lot more in that quarter then EVERYONE knows that the stock will go up.. so everyone buys making the stock go higher... Anyway this is for average Joe.. 97% of profits from stock market in big companies from wall street are from high frequency trading.
top The "Rickmote Controller" Can Hijack Any Google Chromecast
If you would know anything about cryptography possibilities then you would know that you can exchange data even using unsecured channel... Use standard with asymmetric key encryption. Even simple DiffieÃ"Hellman key exchange solves all your problems.