The Hidden Door in Technology: A Security Flaw Unveiled

91download.com supports a wide range of platforms, including YouTube, Facebook, Twitter, TikTok, Instagram, Dailymotion, Reddit, Bilibili, Douyin, Xiaohongshu and Zhihu, etc.
Click the download button below to parse and download the current video

The video belongs to the relevant website and the author. This site does not store any video or pictures.

Have you ever wondered if the technologies we trust implicitly could be harboring secrets of their own? Imagine a widely used Linux utility compromised by a hidden back door, a digital equivalent of a skeleton key waiting to be discovered. This isn't a scene from a cyber-thriller but a reality recently unearthed by Andres Frey, a developer at Microsoft.

The Discovery That Shook the Tech World

It began with a simple act of benchmarking during an Easter Long Weekend. Frey noticed an unusual spike in CPU usage during encrypted logins to the XZ compression utility. This utility, XZ utils, is a staple in the Linux ecosystem, used across numerous distributions. The discovery of a back door in such a fundamental tool could have been catastrophic if not caught in time.

The Intricacies of the Back Door

The back door operates insidiously, injecting code during SSH authentication to enable unauthorized remote access. The trail led to one of the utility's primary developers, giaan (also known as GIA t75), whose suspicious activities over several weeks raised red flags among the project's contributors. The question arises: was this an inside job, or had the developer's account been compromised?

A Plot Twist in the Tech Drama

The plot thickened as some contributors theorized that giaan's involvement was part of an elaborate long con, gradually obtaining deeper permissions through both genuine contributions and manipulative tactics. However, the true nature of giaan's intent remains shrouded in mystery, with no concrete evidence beyond their presence in open-source circles.

Amazon's Check-out Conundrum

In other tech news, Amazon's "Just Walk Out" system, which seemed to embody a cashierless utopia, was revealed to be anything but. The system, designed to automatically charge customers for items taken, relied on a network of cameras and sensors. However, it was discovered that a significant portion of transactions required human review, suggesting that the company wasn't replacing cashiers but merely outsourcing them.

Google's Privacy Policy Update

Google faced its own scrutiny, agreeing to delete a massive store of web data collected via Chrome's Incognito mode. The company's updated privacy policy and incognito mode landing page now explicitly state that data collection continues even in private browsing. This move came as part of a settlement to a class action lawsuit, potentially saving Google from a $5 billion penalty.

The Future of Processing Power

In the realm of hardware, Qualcomm's upcoming Snapdragon X Elite laptop processors, powered by ARM, have shown impressive benchmarks, outperforming Intel's Meteor Lake Core Ultra chips. With the new processors set to grace the Microsoft Surface lineup, it's a testament to the ongoing race for dominance in the tech world.

wrap-up: A World of Tech Surprises

From hidden back doors to outsourcing cashiers, the tech world is full of surprises. As we navigate this digital landscape, it's crucial to remain vigilant and informed. The next time you use a technology, take a moment to consider what secrets it might be keeping. Stay tuned for more tech news and insights, and remember, the digital world is as unpredictable as it is fascinating.

Currently unrated