Tuesday, October 15, 2024

The engineered memories are a multipurpose tool.



Have you seen the movie "Total Recall"? That movie involves a scene where the main character makes a virtual trip to Mars. Virtual memories make it possible to create things and experiments that we never imagined. Virtual reality is a tool that we can use for education. Virtual reality allows us to go to the second reality or alternative reality. We can make a sandbox into a solarium and use the IR and UV light to make synthetic sunlight.  

Then we can put the virtual reality glasses on and look at the film of a sunny beach at some place like Hawaii. The AI can create characters that are connected with the AI chatbots. And those characters can discuss with us. That kind of virtual reality-based second life or alternative reality can allow us to create things like virtual trips to the sunny south. That thing allows us to see what kind of place that travel destination is. 

In real life, researchers think of the possibility of engineering memories. This thing can make it possible to create a treatment for brain damage. This type of research can be a new tool for many other things. All our experiences are based on memories. In the same way, everything that we learn and can do depends on memories. This is why this type of research interests many authorities, from civil to military. 

Engineered memories can help Alzheimer's patients. But there are many other things there that are useful. And one of them is educational. 

The ability to engineer memories is a tool for ultimate learning. That allows people to pass things like university studies in a very short time. This kind of ability is one of the things that people who live in isolated places might need. They need skills to fix their house and give emergency aid to injured people. And engineered memories can help them to make things that they need. There is always a doctor on board in expeditions but what if the doctor is injured? 

That thing requires a system that can teach things to people very fast. Otherwise. Those people might use the remote-AI-controlled robots. That makes those missions. That can require fast satellite communication. The helmet-based system where the action camera sends data to AI can make it possible to turn the AI assistant to the next level. The AI can tell the user what equipment that person must use, and it can tell what those things look like. But that doesn't replace the experience. 

But that is only one thing that this kind of tool that engineers memories can do. The ability to create synthetic memories is a tool, that can have many purposes. The ability to train military personnel in a very short time, and give them the target data straight into their brains is the thing, that makes this system interesting. 

Another thing is the ability to engineer memories makes it possible to brainwash people. This ability might interest people who are working with very high-risk law enforcement deep covert operations where the risk that the operator changes sides is high. And traitors can cause very big danger. 



https://scitechdaily.com/could-we-engineer-memories-new-johns-hopkins-findings-could-help-treat-alzheimers/


https://scitechdaily.com/neurons-rewrite-the-clock-new-discovery-reveals-how-we-truly-learn/

The RSA encryption algorithm has fallen.

Chinese researchers used quantum computers to break the RSA encryption. That thing means that the base algorithm has lost its trustworthiness. So to deny hackers' actions we should rethink our internet and its encryption quite soon, or we will be in trouble. 

Quantum computers and AI are tools that can break any code. That made using binary systems. When we think about principles. That the China has in the quantum race, we must ask how long they have cracked those protection algorithms. Quantum computers are tools that can bring the arms race into the new spheres. 

And that sphere is the cyber attack that can take down at least communication and positioning systems. The quantum computer can also hack things like GPS encryption. And that makes it possible to create effective spoofing attacks. Against global positioning systems. That kind of attack might have unexpected consequences. And it can cause danger to both, civil and military operations. 



That means we should protect data more effectively. 


The thing is that we should develop more effective encryption methods. One of them is that the transmitting system can use different physical routes for transmitting information. That system shares those data bites between two or more routes. That makes it hard to collect that data back to its entirety without encryption keys. 

And of course, those attackers must know physically, where the data cables that transport data are. The system can also use optical cables where the outside glass fibers transport only light that protects data from the outsider's eyes. In some other versions, the data travels in the hollow laser ray. 

That electromagnetic wormhole denies the outsider to see the information. In some other versions, the radio masers transport data through nanotubes that form a Faraday cage around that radio beam. That cage protects information that travels in those wires. 

In quantum network technology denies the attacker to see the information. The system involves a photonic system, that drives information storing it to photons. The photonic system can share data on different routes. And that makes it harder to steal information. 

Things like electromagnetic protections deny that the recon robots cannot send unauthorized signals from data centers. That thing also denies the mobile telephone messages. The protector can put data travel through the controlled relay stations. 





The new threat is the physical robots. 


Things like neural computers and other kinds of tools are things that can collect data from large areas. The new AI-based systems that can operate as physical and virtual modes are tools that leave everybody without protection. The small quadcopters and other robots like robot hovers can collect data from their environment. 

The robot hovers that computer viruses are infected and can pollute other systems. Those hovers can also send information about their entirety. Or they can transport the spy robot. 

The AI-controlled drone can connect itself to data cables. The system can have a toolbox that it can use to cut the data cable. And then it can connect those data cables to travel through itself. Then it can route all data through its modem, and attackers can get all data from that system into their hands. 

Those small systems can also observe screens and send data to other drones or receivers using radio masers or IR and UV lasers. And those physical systems require sharp and effective code. 


https://www.csoonline.com/article/3562701/chinese-researchers-break-rsa-encryption-with-a-quantum-computer.html

Images created by Bing. 

Tuesday, October 1, 2024

The AI can be the new tool for hacking.



The AI or LLM is a tool that can generate code very fast. There are no errors in that code, and that makes it possible to create complicated code with very high speed and accuracy. The generative pre-trained transformer, GPT is the tool that can make it possible to create complicated code by giving orders to the language model. But can those tools be used for hacking? 

Development of the hacking and malware tools should be denied. So that means hackers cannot make the code using GPT by ordering it to create spy- or other malware. 

The hackers can benefit codes and other types of data, that the GPT collects for them. However, the hackers must have the right skills to customize that code. This kind of AI is safe. Or it should be safe. We know that by using command series is possible for high-level coders to cheat the AI to create malware. And that is one thing that should keep us alerted. The AI is the tool that can turn traditional coding into history. 

The estrade is left for the top-level coders who can customize and modify the code, that the AI created. Those people give orders to AI to create code. And then that person can copy-paste that code to the coder editor. By connecting the AI with the code editor the coder can customize those codes. 

But we know. That there are people who are willing to pay for hacking and hacking tools. It's possible that somebody gets the AI's source code, and then customizes it. That kind of tool can be a very powerful tool for hacking. The knowledge about coding helps the hackers to create necessary customization into the codes. That changes the AI into a hacking and spyware generator. 

In regular AI creation, the malware is prohibited and denied. But there are almost certainly the military or intelligence versions of the well-known AI's. Those military and intelligence AIs allow to creation of malicious software. Those military GPT's source codes are secretive. But it's possible, that somebody sells those codes in black marketing. 

The AI can also control the attacks by using the captured computers. AI-based software can control the attacks from the neural networks. The system can switch the computer and its IP automatically. That makes it harder to deny or locate certain computers. The bot network can attack targeted systems using differnet IP addresses. 


https://www.freethink.com/robots-ai/ai-hacking

The mathematical work that shakes the world.

"As a graduate student, Maryam Mirzakhani (center) transformed the field of hyperbolic geometry. But she died at age 40 before she coul...