Monday, 22 April 2024

Learn more about our updated Terms of Service

vijay126.internet@blogger.com

We're updating our Terms of Service on May 22, 2024, so we wanted to let you know ahead of time.

These changes won't affect the way you use our services, but they should help make it easier for you to understand what to expect from Google — and what we expect from you — as you use our services.

You can see the new terms here. We also summarized the changes at the bottom of this email.

What do I need to do?

  • If you're under the age required to manage your own Google Account:
    • We sent this email to your parent or guardian so that they can help you understand our updates better.
    • Please discuss this email with your parent or guardian to decide if you need to do anything different with your account.
  • If you're a parent or guardian, and you allow your child to use the services:
    • Please review the updates to our terms with your child and help them decide whether they need to make any changes to their account.
    • Please remember that these terms apply to you and you're responsible for your child's activity on the services.
  • If you're the administrator of a Google Workspace corporate or educational account and you've enabled your users to access Google Additional Services:
    • Our new Terms of Service won't affect the Google Workspace agreement between Google and your organization. These new terms will only apply to those users to whom you've given access to Google Additional Services. You can always manage whether your users have access to Google Additional Services, and which ones, in your Admin console.
  • If you're a Google Workspace reseller whose customers have enabled their users to access Google Additional Services:
    • Our new Terms of Service won't affect your Google Workspace agreement with your customers. These new terms will only apply to your customers' users who've been given access to Google Additional Services. Your customers can always manage whether their users have access to Google Additional Services, and which ones, in their Admin console.
  • If you're any other user of the services:
    • Please read this email to understand our updated terms and your options for further action.
    • If you agree to the new terms, no further action is needed.

What's changing?

You can review the new Google Terms of Service here. At a glance, here's what this update covers:

  • Generative AI terms. We're moving our existing Generative AI Additional Terms to our main Terms of Service and adding other AI-related clarifications. For example – we won't claim ownership over original content generated by our AI-powered services.
  • More clarity on abusive activity. We're providing more examples and details about abuse and interference with our services that isn't allowed.
  • More details on limitations of liability. For users outside the US, we're adding clarifications to our limitations of liability and indemnity sections to avoid any misunderstandings in light of local laws or customs.
  • More clarity on disputes. We're clarifying that if you violate our terms, our remedies aren't limited to suspension or termination of your access to the services, but may include other remedies under applicable law. If problems or disputes arise between us about these terms, you'll have the opportunity to describe the issues and address them.
  • Updates to reflect how our services work. We're adding language about how our services work, and updating certain Google service brand names that have changed over time.
  • For users based in the European Economic Area (EEA) only:

If you don't agree to the new terms, you should remove your content and stop using the services. You can also end your relationship with us at any time, without penalty, by closing your Google Account.

Thank you for using Google services!

© 2024 Google LLC 1600 Amphitheatre Parkway, Mountain View, CA 94043

You have received this email to update you about important changes to Google's Terms of Service.

Read More :- "Learn more about our updated Terms of Service"

Sunday, 18 February 2024

New reasons prevent pages from being indexed on site mideprograming.blogspot.com

Message type: [WNC-20237597]
Search Console

New reason preventing your pages from being indexed

Search Console has identified that some pages on your site are not being indexed due to the following new reason:

If this reason is not intentional, we recommend that you fix it in order to get affected pages indexed and appearing on Google.

Google LLC, 1600 Amphitheatre Parkway Mountain View, CA 94043 | You've received this transactional email because your site is listed in Google Search Console | Unsubscribe from this type of message
Add partners who should receive messages for this Search Console account
Read More :- "New reasons prevent pages from being indexed on site mideprograming.blogspot.com"

Sunday, 28 January 2024

APPLE IPHONE X FACE ID CAN BE HACKED WITH SILICON MASK

Just a week after Apple released its brand new iPhone X on November 3, a team of researchers has claimed to successfully hack Apple's Face ID facial recognition technology with a mask that costs less than $150. They said Apple iPhone x face id can be hacked with silicon mask easily.

apple iPhone x face id hacked
Yes, Apple's "ultra-secure" Face ID security for the iPhone X is not as secure as the company claimed during its launch event in September this year.

"Apple engineering teams have even gone and worked with professional mask makers and makeup artists in Hollywood to protect against these attempts to beat Face ID," Apple's senior VP of worldwide marketing Phil Schiller said about Face ID system during the event.

"These are actual masks used by the engineering team to train the neural network to protect against them in Face ID."

However, the bad news is that researchers from Vietnamese cybersecurity firm Bkav were able to unlock the iPhone X using a mask.

Yes, Bkav researchers have a better option than holding it up to your face while you sleep. Bkav researchers re-created the owner's face through a combination of 3D printed mask, makeup, and 2D images with some "special processing done on the cheeks and around the face, where there are large skin areas" and the nose is created from silicone.

The researchers have also published a proof-of-concept video, showing the brand-new iPhone X first being unlocked using the specially constructed mask, and then using the Bkav researcher's face, in just one go.

"Many people in the world have tried different kinds of masks but all failed. It is because we understand how AI of Face ID works and how to bypass it," an FAQ on the Bkav website said.

"You can try it out with your own iPhone X, the phone shall recognize you even when you cover a half of your face. It means the recognition mechanism is not as strict as you think, Apple seems to rely too much on Face ID's AI. We just need a half face to create the mask. It was even simpler than we ourselves had thought."

Researchers explain that their "proof-of-concept" demo took about five days after they got iPhone X on November 5th. They also said the demo was performed against one of their team member's face without training iPhone X to recognize any components of the mask.

"We used a popular 3D printer. The nose was made by a handmade artist. We use 2D printing for other parts (similar to how we tricked Face Recognition 9 years ago). The skin was also hand-made to trick Apple's AI," the firm said.

The security firm said it cost the company around $150 for parts (which did not include a 3D printer), though it did not specify how many attempts its researchers took them to bypass the security of Apple's Face ID.

It should be noted that creating such a mask to unlock someone's iPhone is a time-consuming process and it is not possible to hack into a random person's iPhone.

However, if you prefer privacy and security over convenience, we highly recommend you to use a passcode instead of fingerprint or Face ID to unlock your phone.

More articles


Read More :- "APPLE IPHONE X FACE ID CAN BE HACKED WITH SILICON MASK"

C++ Std::Condition_Variable Null Pointer Derreference


This story is about a bug generated by g++ and clang compilers (at least)
The condition_variables is a feature on the standard library of c++ (libstdc++), when its compiled statically a weird asm code is generated.


Any example on the link below will crash if its compiled statically:
 https://en.cppreference.com/w/cpp/thread/condition_variable



In this case the condition_variable.wait() crashed, but this happens with other methods, a simple way to trigger it:




If this program is compiled dynamically the crash doesn't occur:

Looking the dissasembly there is a surprise created by the compiler:


Compilers:
    g++  9.2.1+20200130-2
    clang++ v9

Both compilers are generating the "call 0x00"

If we check this call in a dynamic compiled:




The implementation of condition_variable in github:
https://github.com/gcc-mirror/gcc/blob/b7c9bd36eaacac42631b882dc67a6f0db94de21c/libstdc%2B%2B-v3/include/std/condition_variable


The compilers can't copile well this code in static,  and same happens on  other condition_variable methods.
I would say the _lock is being assembled improperly in static, is not exacly a null pointer derreference but the effects are the same, executing code at address 0x00 which on linux is a crash on most of cases.

Related links
Read More :- "C++ Std::Condition_Variable Null Pointer Derreference"

Saturday, 27 January 2024

RainbowCrack


"RainbowCrack is a general purpose implementation of Philippe Oechslin's faster time-memory trade-off technique. In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea of time-memory trade-off is to do all cracking time computation in advance and store the result in files so called "rainbow table". It does take a long time to precompute the tables. But once the one time precomputation is finished, a time-memory trade-off cracker can be hundreds of times faster than a brute force cracker, with the help of precomputed tables." read more...

Website: http://www.antsight.com/zsl/rainbowcrack

Related word
Read More :- "RainbowCrack"