It's been years since I last asked this, so let's try again: is there yet a way to Shazam a bunch of files in bulk to identify their contents? I'd like to run such a thing over the archived DNA webcasts to generate actual playlists after the fact.
There used to be a thing called Echoprint but I never got it to work, and it's gone now anyway.
Apparently Slack had a massive breach back in 2015 for which they are only just now issuing password resets. The breach wasn't just of encrypted passwords but also injected a key logger to capture plaintext passwords.
In the subsequent days and weeks, I reset all of my passwords, threw away all my computers, bought new computers, factory-reset my phone, rotated all of my Keybase devices (i.e., rotated my "keys"), and reestablished everything from the ground up. It cost Keybase and me a lot of time, money and stress. In the end, I was pretty sure but not 100% convinced that if I had been "rooted", that the attackers couldn't follow me to my new setup. But with these things, you can never know for sure. It's a really scary thing to go through. [...]
Also, Slack's announcement seems to say 1% of accounts were still compromised (after 4 years), but we are wondering: how many were compromised then? And what percentage of messages did the compromised accounts have access to? 10%? 50%? Only the hackers know, but it's likely much more than 1%.
And finally, we know the original compromise was in 2015, but I was only notified of a suspicious login in 2019. Were our Dutch friends sifting through our messages for four years before Slack notified us of a suspicious login? [...]
Keybase messages are end-to-end encrypted, and only our users control their decryption keys. A break-in our of our servers, even one injecting code, cannot yield unencrypted messages or jeopardize message integrity.
Now, grain of salt and all, being from a competitor, but I'm with Keybase on this one. I can't see any good reason to choose Slack over Keybase unless you are making the decision that you want the slider between "convenience" and "security" to be wayyyyyy over to the left.
I've been lightly using Keybase for a little while now. Setup is definitely complex, but once its running, it's good at what it does -- which is to say, IRC channels with end to end crypto, but also mission-critical EMOJI.
We show optical waves passing through a nanophotonic medium can perform artificial neural computing. Complex information is encoded in the wavefront of an input light. The medium transforms the wavefront to realize sophisticated computing tasks such as image recognition. At the output, the optical energy is concentrated in well-defined locations, which, for example, can be interpreted as the identity of the object in the image. These computing media can be as small as tens of wavelengths and offer ultra-high computing density. [...]
Fig. 2. (a) NNM trained to recognize handwritten digits. The input wave encodes the image as the intensity distribution. On the right side of the NNM, the optical energy concentrates to different locations depending on the image's classification labels.