91download.com supports a wide range of platforms, including YouTube, Facebook, Twitter, TikTok, Instagram, Dailymotion, Reddit, Bilibili, Douyin, Xiaohongshu and Zhihu, etc. Click the download button below to parse and download the current video
Have you ever wondered if the technologies we trust implicitly could be harboring secrets of their own? Imagine a widely used Linux utility compromised by a hidden back door, a digital equivalent of a skeleton key waiting to be discovered. This isn't a scene from a cyber-thriller but a reality recently unearthed by Andres Frey, a developer at Microsoft.
It began with a simple act of benchmarking during an Easter Long Weekend. Frey noticed an unusual spike in CPU usage during encrypted logins to the XZ compression utility. This utility, XZ utils, is a staple in the Linux ecosystem, used across numerous distributions. The discovery of a back door in such a fundamental tool could have been catastrophic if not caught in time.
The back door operates insidiously, injecting code during SSH authentication to enable unauthorized remote access. The trail led to one of the utility's primary developers, giaan (also known as GIA t75), whose suspicious activities over several weeks raised red flags among the project's contributors. The question arises: was this an inside job, or had the developer's account been compromised?
The plot thickened as some contributors theorized that giaan's involvement was part of an elaborate long con, gradually obtaining deeper permissions through both genuine contributions and manipulative tactics. However, the true nature of giaan's intent remains shrouded in mystery, with no concrete evidence beyond their presence in open-source circles.
In other tech news, Amazon's "Just Walk Out" system, which seemed to embody a cashierless utopia, was revealed to be anything but. The system, designed to automatically charge customers for items taken, relied on a network of cameras and sensors. However, it was discovered that a significant portion of transactions required human review, suggesting that the company wasn't replacing cashiers but merely outsourcing them.
Google faced its own scrutiny, agreeing to delete a massive store of web data collected via Chrome's Incognito mode. The company's updated privacy policy and incognito mode landing page now explicitly state that data collection continues even in private browsing. This move came as part of a settlement to a class action lawsuit, potentially saving Google from a $5 billion penalty.
In the realm of hardware, Qualcomm's upcoming Snapdragon X Elite laptop processors, powered by ARM, have shown impressive benchmarks, outperforming Intel's Meteor Lake Core Ultra chips. With the new processors set to grace the Microsoft Surface lineup, it's a testament to the ongoing race for dominance in the tech world.
From hidden back doors to outsourcing cashiers, the tech world is full of surprises. As we navigate this digital landscape, it's crucial to remain vigilant and informed. The next time you use a technology, take a moment to consider what secrets it might be keeping. Stay tuned for more tech news and insights, and remember, the digital world is as unpredictable as it is fascinating.
Share on Twitter Share on Facebook